Scheme and Detailed Syllabus: M.Tech. Cyber Security
Scheme and Detailed Syllabus: M.Tech. Cyber Security
[Revised syllabus to be effective from session 2019 for batch 2019-21 and ]subsequent batc
Contact hours /
Sub.
Sem Title of the subject Credits week
Code
L T P
Following list has to be used for offering programme elective I and II. Additional Elective
can be added as and when required after taking departmental approval.
Contact hours /
Sub.
Title of the subject Credits week
Code
L T P
Group A(Program Elective I & II)
1CS51 Cloud Computing 4 3 1
1CS52 E Commerce 4 4
1CS53 Neural Networks 4 3 2
1CS54 Data Mining 4 3 2
1CS55 Information Security and Privacy 4 3 1
1CS56 Security Analysis of Protocols 4 3 1
Group A(Program Elective III & IV)
2CS57 Banking Technology and Management 4 4
2CS58 Big Data Analytics 4 3 2
2CS59 Machine Learning 4 3 1
2CS60 Cloud Computing and Security 4 3 1
2CS61 Introduction of evolutionary computing 4 4
2CS62 Internet of Things and Security 4 3 2
Students can also elect subjects offered by online MOOC portals (NPTEL, SWAYAM, etc.)
as Program Elective after departmental approval.
Group A (Program Elective)
Unit I
Introduction: Security protocols, Security properties, Public-key certificates and infrastructures,
Cryptographic hash functions, Digital signatures, Security protocol vulnerabilities
Unit II
Security Protocols: Needham- Schroeder public-key protocol and its security analysis, Protocols for
anonymity, Anonymity and MIX networks, Fairness and contract signing, Fair exchange and contract
signing protocols, Game-based verification of contract signing protocols. Yahalom protocol: Secrecy,
Authentication, Non-repudiation, Anonymity; Dolev-Yao threat model.
Unit III
Finite-state checking (Murphi), Infinite-state symbolic analysis (SRI constraint solver), Probabilistic
model checking (PRISM)
Unit IV
CSP: Basic building blocks, Parallel operators, Process behaviour, Modelling security protocols in
CSP - Trustworthy processes, Modelling an intruder, protocol goals.
Unit V
Transformations: Transformations on protocols, Safe simplifying transformations, Structural
transformations. Formal analysis: Formal definitions of security for symmetric ciphers, Formal model
for secure key exchange. Theorem proving - Rank functions, Secrecy of shared key, Authentication.
Books recommended:
Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe, Bill Roscoe: Modelling &
Analysis of Security Protocols, Addison Wesley.
Unit I
Wireless Networking Trends, Key Wireless Physical Layer Concepts: Frequency, Wavelength, Phase,
Coding and modulation, Shannon Theorem, Hamming Distance, Multiple Access Methods, Doppler
Shift; Signal Propagation: Reflection, Diffraction, Scattering, Fading, Shadowing, Multipath,
MultiAntenna Systems, Beam forming, MIMO, OFDM; Wireless Local Area Networks: IEEE 802.11,
Amendments; Wireless Personal Area Networks,
Unit II
GSM: Overview, Architecture, GSM Security Principles; General Packet Radio Services (GPRS):
Overview, Architecture; Universal Mobile Telecommunication System (UMTS): Overview,
Architecture and Subsystems; LTE: Overview, Architecture and Subsystems;
Unit III
Radio Frequency Identification (RFID); WiMAX (Physical layer, Media access control, Mobility and
Networking); Multi hop wireless networks: Position & topology base ad-hoc routing protocols,
Proactive and Reactive routing protocols. Route disruption, diversion, routing state based attacks,
SRP, Ariadne, SAODV, ARAN, SMT secure routing protocols, Wireless Sensor Networks,
Unit IV
Security of wireless networks: GSM, UMTS, WEP, IEEE 802.11i, Public Wifi hotspots, Bluetooth;
Vehicular Ad-hoc Networks: vulnerabilities, challenges, Security architecture
Unit V
Naming & addressing principles, attacks and protection techniques, Misbehaviour at MAC layer of
CSMA/CA, its impact and preventive measures, Mobile IPv4, Mobile IPv6, TCP over Wireless
Networks
Books recommended:
Jochen Schiller, “Mobile Communications”, PHI.
K Makki, P Reiher,et. all. “Mobile and Wireless Network Security and Privacy”,Springer,
2007
Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, Principles of Mobile
Computing, Springer, New York, 2003
Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile and Pervasive
Computing,McGraw-Hill
Butty L. &Hubaux J.P. (2007): Security and Cooperation in Wireless Networks: Thwarting
Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University
Press.
Unit I
Number Theory: Introduction - Divisibility - Greatest common divisor - Prime numbers -
Fundamental theorem of arithmetic - Mersenne primes - Fermat numbers - Euclidean algorithm -
Fermat’s theorem - Euler totient function - Euler’s theoerem. Congruences: Definition - Basic
properties of congruences - Residue classes - Chinese remainder theorem.
Unit II
Algebraic Structures: Groups – Cyclic groups, Cosets, Modulo groups - Primitive roots - Discrete
logarithms. Rings – Sub rings, ideals and quotient rings, Integral domains. Fields – Finite fields – GF
(pn), GF(2n ) - Classification - Structure of finite fields. Lattice, Lattice as Algebraic system, sub
lattices, some special lattices.
Unit III
Probability Theory: Introduction – Concepts of Probability - Conditional Probability - Baye’s
Theorem - Random Variables – discrete and continuous- central Limit Theorem-Stochastic
ProcessMarkov Chain.
Unit IV
Coding Theory: Introduction - Basic concepts: codes, minimum distance, equivalence of codes,
Linear codes - Linear codes - Generator matrices and parity-check matrices - Syndrome decoding –
Hamming codes - Hadamard Code - Goppa codes.
Unit V
Pseudorandom Number Generation: Introduction and examples - Indistinguishability of Probability
Distributions - Next Bit Predictors - The Blum-Blum-Shub Generator – Security of the BBS
Generator.
Books recommended:
D. S. Malik, J. Mordeson, M. K. Sen, Fundamentals of abstract algebra, Tata McGraw Hill
Unit I
Topics in Data Structures : Various Trees, Linked List, Heap, Stack, Queues. Abstract Data Types
using Python and C Language.
Unit II
Topics in Data Base Management Systems: Entity–Relationship model (E-R model) – E-R Diagrams,
Functional Dependencies – Non-loss Decomposition, First, Second, Third Normal Forms,
Dependency Preservation – Boyce/Codd Normal Form- Multi-Valued Dependencies and Fourth
Normal Form – Join Dependencies and Fifth Normal Form, Two Phase Commit, ACID Property, Two
Phase Locking –Intent Locking – Deadlock- Serializability, Magnetic Disks – RAID – Tertiary
storage – File Organization
Unit III
Topics in Algorithms: Algorithm Development, Complexity analysis, Sorting, Searching, BFS, DFS,
Minimum Spanning Tree, Prim’s and Kruskal’;s algorithms, Greedy algorithms – Divide and conquer
– Dynamic programming – backtracking– algorithm analysis
Unit IV
Topics in Operating System: Overview of operating systems, functionalities and characteristics of OS,
concept of a process, operations on processes, process states, concurrent processes, process control
block, process context, Job and processor scheduling, scheduling algorithms, Deadlock: prevention,
detection, avoidance, banker’;s algorithm, Memory organization and management, storage allocation
Android OS, iOS, Linux OS file structure and security features
Unit V
Topics in Computer networks: OSI Model and each layer working, properties and related protocols in
security areas.
Books recommended:
Introduction to Algorithms by Thomas H. Cormen
Unit I
Introduction to cyber crime and cyber law, cyber space and information technology, Nature and scope
of cyber crime, Jurisdiction of cyber crime.
Unit II
Important definitions under IT Act 2000, Cyber crime issues: unauthorized access, White collar
crimes, viruses, malwares, worms, Trojans, logic bomb, Cyber stalking, voyeurism, obscenity in
internet, Software piracy,
Unit III
IT Act 2000, offences under IT Act and IT (amendment) Act, 2008. CRPC overview, Case studies,
Role of intermediaries, Electronic evidence, Cyber terrorism, espionage, warfare and protected system
Unit IV
Overview of amended laws by the IT Act, 2000: The Indian Penal Code, 1860, The Indian Evidence
Act, 1872, The Banker’s Book Evidence Act, 1891, The Reserve Bank of India Act, 1934, Cyber
Theft and the Indian Telegraph Act, 1885. Relevant Case laws. Digital Signatures and certificate -
legal issues
Unit V
Intellectual Property rights: Introduction to IP, Copyright, Related Rights, Trademarks, Geographical
Indications, Industrial Design, Patents, Licensing and transfer of technology, WIPO Treaties,
Copyrights Act, Patents Act, Trademarks Act
Books recommended:
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, Raghu
Santanam, M. Sethumadhavan, Information Science Reference
Pfleeger, Charles P. and Shari L. Pfleeger. Security in Computing, 4th Edition. Upper Saddle
River, NJ: Prentice Hall, 2008
Cybercrime: Security and Surveillance in the Information Age, Douglas Thomas; Brian
Loader
Crime in the Digital Age: Controlling Telecommunications and Cyberspace Illegalities, Peter
N. Grabosky
Mark F Grady, FransescoParisi, “The Law and Economics of Cyber Security”, Cambridge
University Press, 2006
Group A (Program Elective)
Unit I
Passwords, security questions, challenge-response, Cryptographic hash functions, Biometrics,
Phishing
Unit II
Web security model, Web authentication and session management, Cross-site request forgery, SQL
injection, cross-site scripting, Logic flaws in Web applications, Clickjacking
Unit III
Online tracking, Symmetric encryption, Kerberos, Memory corruption attacks and defenses, Viruses
and rootkits.
Unit IV
Spam, Attacks on TCP/IP, DNS, BGP. Denial of service, Worms and botnets, Advance Persistent
Threats
Unit V
Firewall and intrusion detection, Public Key Cryptography, SSL and certificates, Anonymity
networks, Side channel attacks: acoustics and reflections
Books recommended:
Network Security (2nd edition) by Kaufman, Perlman, and Speciner -- required textbook!