0% found this document useful (0 votes)
158 views3 pages

Info. Security

This document outlines the course details for the Information Security elective at Gujarat Technological University. The course is a 4 credit course taught over 7 hours per week in semester 7. It covers topics in symmetric and asymmetric cryptography, hashing, digital signatures, key management and authentication. Assessment includes a theory exam worth 70 marks and practical exams worth 30 marks. Course outcomes include exploring symmetric cryptography techniques, implementing symmetric and asymmetric algorithms, exploring hashing and digital signatures, and using authentication and key management standards. Students complete at least 10 practical experiments covering course content.

Uploaded by

tirth_diwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views3 pages

Info. Security

This document outlines the course details for the Information Security elective at Gujarat Technological University. The course is a 4 credit course taught over 7 hours per week in semester 7. It covers topics in symmetric and asymmetric cryptography, hashing, digital signatures, key management and authentication. Assessment includes a theory exam worth 70 marks and practical exams worth 30 marks. Course outcomes include exploring symmetric cryptography techniques, implementing symmetric and asymmetric algorithms, exploring hashing and digital signatures, and using authentication and key management standards. Students complete at least 10 practical experiments covering course content.

Uploaded by

tirth_diwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

GUJARAT TECHNOLOGICAL UNIVERSITY

Bachelor of Engineering
Subject Code: 3170720
Semester – VII
Subject Name: Information Security

Type of course: Elective

Prerequisite: Mathematical concepts: Random numbers, Number theory, finite fields

Rationale: The use of the Internet for various purpose including social, business, communication and other day
to day activities has been in common place. The information exchanged through Internet plays vital role for their
owners and the security of such information/data is of prime importance. Knowing the concepts, principles and
mechanisms for providing security to the information/data is very important for the students of Computer
Engineering/Information technology. The subject covers various important topics concern to information security
like symmetric and asymmetric cryptography, hashing, message and user authentication, digital signatures, key
distribution and overview of the malware technologies. The subject also covers the applications of all of these in
real life applications.

Teaching and Examination Scheme:

Teaching Scheme Credits Examination Marks Total


L T P C Theory Marks Practical Marks Marks
ESE (E) PA (M) ESE (V) PA (I)
3 0 2 4 70 30 30 20 150

Content:

Sr. No. Content Total


Hrs

1 Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and 03


Transposition techniques
2 Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) 08
with example, strength of DES, Design principles of block cipher, AES with structure, its
transformation functions, key expansion, example and implementation

3 Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, 04
Cipher Feedback mode, Output Feedback mode, Counter mode
4 Public Key Cryptosystems with Applications, Requirements and Cryptanalysis, RSA 08
algorithm, its computational aspects and security, Diffie-Hillman Key Exchange
algorithm, Man-in-Middle attack
5 Cryptographic Hash Functions, their applications, Simple hash functions, its requirements 05
and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm
(SHA)
6 Message Authentication Codes, its requirements and security, MACs based on Hash 05
Functions, Macs based on Block Ciphers
7 Digital Signature, its properties, requirements and security, various digital signature 04
schemes (Elgamal and Schnorr), NIST digital Signature algorithm
8 Key management and distribution, symmetric key distribution using symmetric and 04
asymmetric encryptions, distribution of public keys, X.509 certificates, Public key
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3170720
infrastructure

9 Remote user authentication with symmetric and asymmetric encryption, Kerberos 04

Suggested Specification table with Marks (Theory):

Distribution of Theory Marks

R Level U Level A Level N Level E Level C Level


7 14 21 14 7 7

Legends: R: Remembrance; U: Understanding; A: Application, N: Analyze and E: Evaluate C: Create


and above Levels (Revised Bloom’s Taxonomy)

Reference Books:

1. Cryptography And Network Security, Principles And Practice Sixth Edition, William Stallings, Pearson
2. Information Security Principles and Practice By Mark Stamp, Willy India Edition
3. Cryptography & Network Security, Forouzan, Mukhopadhyay, McGrawHill
4. Cryptography and Network Security Atul Kahate, TMH
5. Cryptography and Security, C K Shyamala, N Harini, T R Padmanabhan, Wiley-India
6. Information Systems Security, Godbole, Wiley-India
7. Information Security Principles and Practice, Deven Shah, Wiley-India
8. Security in Computing by Pfleeger and Pfleeger, PHI
9. Build Your Own Security Lab : A Field Guide for network testing, Michael Gregg, Wiley India

Course Outcomes:

Sr. CO statement Marks %


No. weightage
CO-1 Explore the basic principles of the symmetric cryptography and 10
techniques with their strengths and weaknesses from perspective of
cryptanalysis
CO-2 Implement and analyze various symmetric key cryptography algorithms 25
and their application in different context.
CO-3 Compare public key cryptography with private key cryptography and 25
Implement various asymmetric key cryptography algorithms.
CO-4 Explore the concept of hashing and implement various hashing 20
algorithms for message integrity.
CO-5 Explore and use the techniques and standards of digital signature, key 20
management and authentication.

List of Experiments:

Minimum 10 practices are to be performed covering the contents of the syllabus. Use of the tools for performing
practices is highly recommended.
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code:
List of e-Learning Resources:

1. Software: cryptool (www.cryptool.org)


2. Software: Wireshark (www.wireshark.org)
3. http://www.cryptix.org/
4. http://www.cryptocd.org/
5. http://www.cryptopp.com/
6. https://nptel.ac.in/
7. https://www.coursera.org/

Page 3 of 3

w.e.f. AY 2018-19

You might also like