0% found this document useful (0 votes)
418 views3 pages

Security Trends, Legal, Ethical and Professional Aspects of Security

The document is a lesson plan for a Cryptography and Network Security course taught during the 2021-2022 academic year. It outlines the topics to be covered over 45 class periods across 5 units. The units cover security trends and techniques, classical and modern cryptography algorithms, public key cryptography, authentication, and network security applications. The course objectives are to understand cryptography theories/algorithms, approaches to secure networks, and apply authentication/cryptography. The textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Arul Senthil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
418 views3 pages

Security Trends, Legal, Ethical and Professional Aspects of Security

The document is a lesson plan for a Cryptography and Network Security course taught during the 2021-2022 academic year. It outlines the topics to be covered over 45 class periods across 5 units. The units cover security trends and techniques, classical and modern cryptography algorithms, public key cryptography, authentication, and network security applications. The course objectives are to understand cryptography theories/algorithms, approaches to secure networks, and apply authentication/cryptography. The textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Arul Senthil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chettinad College of Engineering and Technology, Karur

Department of Electronics and communication


Academic year: 2021-2022 (ODD Semester)
Lesson Plan
Subject & Subject Code: CS8792 Cryptography and Network Security Branch/Year/Sec.: CSE/IV
Name of the Faculty: Mrs.S.Aruljothi, AP/CSE

Planned Completion
S.No. Period Unit Topic Planned and Covered
Date Date
Unit-I
1 4 Security trends, Legal, Ethical and Professional Aspects of security 18.08.21
2 3 Need for Security at Multiple levels, Security Policies 19.08.21
3 2 Model of network security – Security attacks, services and 21.08.21
mechanisms
4 4 OSI security architecture 25.08.21
5 3 I Classical encryption techniques - substitution techniques 26.08.21
6 2 Classical encryption techniques -substitution techniques 27.08.21
7 4 Transposition techniques 01.09.21
8 3 Steganography- Foundations of modern cryptography- perfect
02.09.21
security
9 2 Information theory – product cryptosystem – cryptanalysis 03.09.21
Unit-II
10 4 Algebraic structures - Modular arithmetic 08.09.21
11 3 Euclid’s algorithm- Congruence and matrices 09.09.21
12 1 Groups, Rings, Fields- Finite fields 18.09.21
13 6 SDES – Block cipher Principles of DES 18.09.21
14 4 II Strength of DES – Differential and linear cryptanalysis 22.09.21
15 3 Block cipher design principles – Block cipher mode of operation 23.09.21
16 2 Evaluation criteria for AES 24.09.21
17 1 RC4 25.09.21
18 6 Key distribution 25.09.21
Unit-III
19 4 Primes – Primarily Testing – Factorization 29.09.21
20 3 Euler‘s totient function 30.09.21
21 2 III Fermat‘s and Euler‘s Theorem 01.10.21
22 4 Chinese Remainder Theorem 06.10.21
23 3 Exponentiation and logarithm 07.10.21

1
Topic Planned and Covered Planned Completion
S.No. Period Unit
Date Date
24 2 RSA cryptosystem, Key distribution 08.10.21
25 1 Key management Diffie Hellman key exchange 09.10.21
III
26 6 ElGamal cryptosystem – Elliptic curve arithmetic 09.10.21
27 4 Elliptic curve cryptography 13.10.21
Unit-IV
28 1 Authentication requirement – Authentication function – MAC 16.10.21
29 6 Hash function – Security of hash function and MAC 16.10.21
30 1 SHA –Digital signature and authentication protocols 23.10.21
31 6 DSS 23.10.21
32 4 IV Entity Authentication 27.10.21
33 3 Biometrics, Passwords, Challenge Response protocols 28.10.21
34 2 Authentication applications 29.10.21
35 1 Kerberos 30.10.21
36 6 X.509 30.10.21
Unit-V
37 4 Electronic Mail security 10.11.21
38 3 Electronic Mail security – PGP 11.11.21
39 2 PGP, S/MIME 12.11.21
40 1 IP security 13.11.21
41 6 V Web security 13.11.21
42 4 System security 17.11.21
43 3 Intruders 18.11.21
44 2 Malicious software – viruses 19.11.21
45 1 Firewalls 20.11.21

Course Objective:

1. To understand Cryptography Theories, Algorithms and Systems.


2. To understand necessary Approaches and Techniques to build protection mechanisms in order to secure
computer networks.

Course Outcome:

1. Understand the fundamentals of networks security, security architecture, threats and vulnerabilities

2
2. Apply the different cryptographic operations of symmetric cryptographic algorithms
3. Apply the different cryptographic operations of public key cryptography
4. Apply the various Authentication schemes to simulate different applications.
5. Understand various Security practices and System security standards

TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.
REFERENCES:
1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt. Ltd
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a
PUBLIC World, Prentice Hall, ISBN 0-13-046019-2

Prepared By Verified By Approved by

Faculty in-Charge HoD Principal

You might also like