Security Trends, Legal, Ethical and Professional Aspects of Security
Security Trends, Legal, Ethical and Professional Aspects of Security
Planned Completion
S.No. Period Unit Topic Planned and Covered
Date Date
Unit-I
1 4 Security trends, Legal, Ethical and Professional Aspects of security 18.08.21
2 3 Need for Security at Multiple levels, Security Policies 19.08.21
3 2 Model of network security – Security attacks, services and 21.08.21
mechanisms
4 4 OSI security architecture 25.08.21
5 3 I Classical encryption techniques - substitution techniques 26.08.21
6 2 Classical encryption techniques -substitution techniques 27.08.21
7 4 Transposition techniques 01.09.21
8 3 Steganography- Foundations of modern cryptography- perfect
02.09.21
security
9 2 Information theory – product cryptosystem – cryptanalysis 03.09.21
Unit-II
10 4 Algebraic structures - Modular arithmetic 08.09.21
11 3 Euclid’s algorithm- Congruence and matrices 09.09.21
12 1 Groups, Rings, Fields- Finite fields 18.09.21
13 6 SDES – Block cipher Principles of DES 18.09.21
14 4 II Strength of DES – Differential and linear cryptanalysis 22.09.21
15 3 Block cipher design principles – Block cipher mode of operation 23.09.21
16 2 Evaluation criteria for AES 24.09.21
17 1 RC4 25.09.21
18 6 Key distribution 25.09.21
Unit-III
19 4 Primes – Primarily Testing – Factorization 29.09.21
20 3 Euler‘s totient function 30.09.21
21 2 III Fermat‘s and Euler‘s Theorem 01.10.21
22 4 Chinese Remainder Theorem 06.10.21
23 3 Exponentiation and logarithm 07.10.21
1
Topic Planned and Covered Planned Completion
S.No. Period Unit
Date Date
24 2 RSA cryptosystem, Key distribution 08.10.21
25 1 Key management Diffie Hellman key exchange 09.10.21
III
26 6 ElGamal cryptosystem – Elliptic curve arithmetic 09.10.21
27 4 Elliptic curve cryptography 13.10.21
Unit-IV
28 1 Authentication requirement – Authentication function – MAC 16.10.21
29 6 Hash function – Security of hash function and MAC 16.10.21
30 1 SHA –Digital signature and authentication protocols 23.10.21
31 6 DSS 23.10.21
32 4 IV Entity Authentication 27.10.21
33 3 Biometrics, Passwords, Challenge Response protocols 28.10.21
34 2 Authentication applications 29.10.21
35 1 Kerberos 30.10.21
36 6 X.509 30.10.21
Unit-V
37 4 Electronic Mail security 10.11.21
38 3 Electronic Mail security – PGP 11.11.21
39 2 PGP, S/MIME 12.11.21
40 1 IP security 13.11.21
41 6 V Web security 13.11.21
42 4 System security 17.11.21
43 3 Intruders 18.11.21
44 2 Malicious software – viruses 19.11.21
45 1 Firewalls 20.11.21
Course Objective:
Course Outcome:
1. Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
2
2. Apply the different cryptographic operations of symmetric cryptographic algorithms
3. Apply the different cryptographic operations of public key cryptography
4. Apply the various Authentication schemes to simulate different applications.
5. Understand various Security practices and System security standards
TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.
REFERENCES:
1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt. Ltd
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a
PUBLIC World, Prentice Hall, ISBN 0-13-046019-2