0% found this document useful (0 votes)
217 views8 pages

(CE-408) CIS-Theory+Lab Course-Fall-2022

This document provides information about the Cryptography and Network Security course offered at Sir Syed University of Engineering & Technology. The course is worth 3+1 credits and has prerequisites of Discrete Mathematics and Computer Communication and Networks. It will be taught in a synchronous/hybrid manner in the 8th semester. The objective is to introduce concepts of cryptography and network security. Topics include encryption algorithms, blockchain, public key cryptography, and network security mechanisms. Student learning will be assessed through quizzes, assignments, exams, and labs related to the topics. The labs are synchronized to reinforce topics taught in theory classes.

Uploaded by

nawal 109
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
217 views8 pages

(CE-408) CIS-Theory+Lab Course-Fall-2022

This document provides information about the Cryptography and Network Security course offered at Sir Syed University of Engineering & Technology. The course is worth 3+1 credits and has prerequisites of Discrete Mathematics and Computer Communication and Networks. It will be taught in a synchronous/hybrid manner in the 8th semester. The objective is to introduce concepts of cryptography and network security. Topics include encryption algorithms, blockchain, public key cryptography, and network security mechanisms. Student learning will be assessed through quizzes, assignments, exams, and labs related to the topics. The labs are synchronized to reinforce topics taught in theory classes.

Uploaded by

nawal 109
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

(SSUET/QR/111)

SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY


COMPUTER ENGINEERING DEPARTMENT

COURSE INFORMATION SHEET


(For Theory + Lab Based Course)
Session: Fall-2022
Course Title: Cryptography and Network Security
Course Code: CE-408
Credit Hours: 3+1
Semester: 8th
MS-204 Discrete Mathematics / CE-402 Computer
Pre-Requisites:
Communication and Networks
Najam ul Islam Farooqi, Dr. Rukaiya, Rabia Siddiqui,
Instructor Name:
Naved Anwer
[email protected], [email protected],
Email and Contact Information:
[email protected], [email protected]
WhatsApp Group CE-408 CNS
Office Hours: 8:30 am – 5:00 pm
Mode of Teaching:
Synchronous/Asynchronous/ Hybrid/Blended

COURSE OBJECTIVE:
The objective of this course is to introduce concepts related to cryptography and Network Security.
Different security algorithms and mechanisms will be presented and solutions to security threats will be
discussed.

COURSE OUTLINE:
Introduction to data and network security, goals, threats and attacks, Kill chain models, Advanced Persistent
Threats, Security mechanisms, Difference between Cryptography and cryptanalysis, Traditional
substitution and transposition cipher, Modern symmetric-key cryptography, Simplified DES, DES design
principals, Double DES, Triple DES, Concept of Blockchain with its applications, and Block cipher modes
of operation, Raijndael Algorithm, Mechanism of encryption in AES, Principles of Public Key
Cryptosystem, RSA Algorithm, Diffie-Hellman Key Exchange, Application of cryptographic Hash
functions, Secure Hash Algorithm (SHA), Key management and distribution, Network Security
Mechanisms, IPSec, Virtual Private Network, Firewalls and Intrusion Detection and Prevention Systems

COURSE LEARNING OUTCOMES (CLOs) and its mapping with Program Learning Outcomes
(PLOs):
CLO Bloom’s
Course Learning Outcomes (CLOs) PLOs
No. Taxonomy
Explain fundamental security objectives, PLO_1 C2
1
security attacks, services, and mechanisms (Engineering knowledge) (Understanding)
Apply various algorithms and security PLO_3
C3
2 mechanisms to provide confidentiality, integrity, (Design/Development of
(Applying)
and authentication Solutions)
Identify appropriate techniques to analyze the PLO_2 C4
3
problems in the discipline of network security (Problem Analysis) (Analyzing)

Page 1 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT

Use appropriate tools to apply different PLO_5 C3


4 cryptographic algorithms and network security (Modern Tool Usage) (Applying)
mechanisms

COMPLEX ENGINEERING PROBLEM/ACTIVITY:


Complex Engineering Problem Included: Yes
Details Nature and details of Complex Engineering Problem (CEP):
It will be given in Assignment # 03.

CEP will be based on CLO3, students will be asked to


develop a "Network Security Solution to a given scenario”.
To investigate the problem, students must use in-depth
knowledge related to the following concepts: Network
Security Mechanisms

Attributes could be: WP1, WP3, WK8, WA4


WP1: Depth of knowledge required
WP3: Depth of analysis required
WK8: Research Literature
WA4: Investigation
Assessment in: Assignment # 03
Complex Engineering Activity Details Included: Not included

RELATIONSHIP BETWEEN ASSESSMENT TOOLS AND CLOS:

CLO-1 CLO-2 CLO-3 CLO-4


Assessment Tools
(Marks 25) (Marks 39) (Marks 16) (Marks 20)
Quizzes 5% (01) 7.5% (03) 5% (01) -

Assignments 5% (01) 5% (02) 10% (02) -

Midterm Exam 40% (08) 30% (12) - -

Final Exam 75% (15) 55% (22) 65% (13) -

Lab Assessment - - - 100% (20)

GRADING POLICY:

Assessment Tools Percentage


Quizzes 5%
Assignments 5%
Midterm Exam 20%
Final Exam 50%
Lab Assessment 20%
TOTAL 100%

Page 2 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
Recommended Book:

 Stallings, William. Cryptography and Network Security: Principles and Practice, 7th
Edition, published by Pearson Education, 2017

Reference Books:

 Forouzan, Behrouz A. Cryptography and Network Security, January 2010 Edition 2nd,
Published by Tata McGraw-Hill, ISBN-10: 007070208X

COURSE BREAKDOWN WITH LAB SYNCHRONIZATION:

- Both sides same Colors: Lab is synchronized with the topic


- Red Color: Lab is not synchronized (conducted before theory)
- No Color: Lab is to introduce new hardware or software skill /
Open Ended Lab / Lab is relevant to a topic taught in
pre-requisite and required for upcoming labs

Week
Topics Laboratory Synchronization
No.
Introduction to data security
Security goals
1 Security Attacks and Related Tools
Security attacks
Security mechanisms
Classical Encryption Techniques
Traditional substitution ciphers (Mono- Classical Encryption Techniques
2 alphabetic)- Additive Cipher (Caesar cipher, Mono alphabetic
Mono-alphabetic Ciphers Cont. Multiplicative Ciphers, play fair, hill cipher)1
& Affine Ciphers1
Affine Ciphers
Classical Encryption Techniques II
Traditional substitution ciphers (Poly
3 (Polyalphabetic, transposition
alphabetic)
cipher)2
Traditional transposition ciphers2
Block Cipher and Data Encryption Standards
Modern Encryption Techniques
4 Simplified DES key generation
Simplified DES (S-DES)3
Simplified DES encryption, decryption3
DES design principals & Algorithm, Key
generation Modern Encryption Techniques Data
5
DES Encryption, Decryption Encryption Standard (DES)4
Advance Encryption Standard4
AES Key Generation Simplified Advance Encryption
6
AES Encryption5 Standard (S-AES)5

Page 3 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT

Blockchain and its Applications


Block Cipher Operation
7 Open Ended Lab
Modes of Block Cipher
Public-key cryptography-RSA6

RSA Continue
Public Key Cryptography – RSA6
8 Diffie-Hellman Key Exchange7
Algorithm, Diffie Hellman7
Cryptographic Hash Function
SHA8
9 Digital signatures9 SHA 512-Algorithm8
RSA and DSS approach
User Authentication Protocol10
10 Remote User Authentication Principles Digital Signature Algorithm9
Kerberos
Electronic Email Security
Configure Routers for Syslog, NTP,
11 Email threats and comprehensive email security
and SSH Operations
S/MIME/TLS
Pretty Good Privacy (PGP)
12 PGP Services AAA Authentication Server 10
IP Security
IP Security Policies11
IPsec Site-to-Site Virtual Private
13 IP Security Header
Network (VPN)11
Internet Key Exchange
Firewalls
14 Firewall characteristics and access policy Open Ended Lab
Types of firewalls
Firewall location and configuration
15 Lab Exam/ Project Viva
Revision

Page 4 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT

LECTURE PLAN
Course Title: Cryptography and Network Security
Course Code: CE-408

Week
Week Dates Topics Required Reading Key Date
No.
1 12-10-2022 Chapter 1: Computer and Network Security Sta:Pg. 21
to Concept Foro-chap 1:pg 1-32
15-10-2022 Sta:Pg. 27
Security attacks
Foro-chap 1:pg 3-5
Sta:Pg. 29
Security Mechanisms
Foro-chap 1:pg 6-8
2 18-10-2022 Sta:Pg. 86
Chapter 3: Classical Encryption Techniques
to Foro-chap 3:pg 55-60
23-10-2022 Traditional substitution ciphers Assignment#01
Sta:Pg. 92-94
(Mono-alphabetic)- Additive Cipher, Ceasar
Foro-chap 3:pg 61-64
cipher
Mono-alphabetic Ciphers Cont. Sta:Pg. 98
Multiplicative cipher Foro-chap 3:pg 65-66
Sta:Pg. 99
Affine Ciphers
Foro-chap 3:pg 66-68
3 25-10-2022 Traditional substitution ciphers (Poly Sta:Pg. 107
to alphabetic) Foro-chap 3:pg 69-80
30-10-2022 Sta:Pg.108 Quiz#01
Traditional transposition ciphers
Foro-chap 3:pg 81-86
Chapter 4: Block Cipher and Data Sta:Pg.119
Encryption Standards Foro-chap 6:pg 159
Simplified DES key generation Power point lecture 5
Simplified DES encryption, decryption Power point lecture 5
4 01-11-2022 Data encryption standard
Sta:Pg. 129
to DES design principals & Algorithm, key
Foro-chap 6:pg 160-173
06-11-2022 generation
Sta:Pg. 131
DES Encryption, Decryption
Foro-chap 6:pg 160-173
5 08-11-2022 Sta:Pg. 172-178
Chapter 6: Advance Encryption Standard
to Foro-chap 7:pg 191-192
13-11-2022 Sta:Pg. 190-192 Assignment#02
AES Key Generation Foro-chap 7:pg 193-195,
pg 207-211
Sta:Pg. 179-189
AES Encryption
Foro-chap 7:pg 195-201
6 15-11-2022 Sta:Pg. 179-189
AES Encryption
to Foro-chap 7:pg 202-207
20-11-2022 Sta:Pg. 208
Chapter 7: Block Cipher Operation
Foro-chap 8:pg 225
Sta:Pg. 213-221
Modes of Block Cipher
Foro-chap 7:pg 226-238
7 22-11-2022 Chapter 9: Public-key cryptography Sta:Pg. 284-293
to
RSA Foro-chap 10:pg 301-305
27-11-2022
Sta:Pg. 294-294
RSA Continue
Foro-chap 10:pg 301-305

Page 5 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
8 Midterm Examination
(05-12-2022)
9 11-12-2022 Chapter 10: Other Public Key Crypto
to System Sta:Pg. 314-316
13-12-2022 Diffie-Hellman Key Exchange
Sta:Pg. 340-347 Quiz#02
Chapter 11: Cryptographic Hash Function
Foro-chap 12:pg 363-367
Sta:Pg. 355-364
SHA
Foro-chap 12:pg 367-375
10 18-12-2022 Sta:Pg. 420-426
Chapter 13: Digital signatures
to Foro-chap 13:pg 389-394
20-12-2022 Sta:Pg. 426-430 Assignment#03
RSA and DSS approach
Foro-chap 13:pg 396-400
Chapter 15: User Authentication Protocol Sta:Pg. 474
Remote User Authentication Principles Sta:Pg. 474-478
Sta:Pg. 482-495
Kerberos
Foro-chap 15:pg 443-447
11 20-12-2022 Sta:Pg. 613-624
Chapter 19: Electronic Email Security
to Foro-chap 16:pg 467
25-12-2022 Email threats and comprehensive email Sta:Pg. 613-624
security Foro-chap 16:pg 467
Sta:Pg. 627-638
S/MIME/TLS
Foro-chap 16:pg 492-499
12 27-12-2022 Sta:Pg. 638-639
Pretty Good Privacy (PGP)
to Foro-chap 16:pg 470-472
01-01-2023 PGP Services Foro-chap 16:pg 470-472 Quiz#03

Sta:Pg. 662-667
Chapter 20: IP Security
Foro-chap 18:pg 549-552
13 03-01-2023 Sta:Pg. 662-667
IP Security, Services and Policies
to Foro-chap 18:pg 552-562
08-01-2023 IP Security Header Sta:Pg. 673-680
Sta:Pg. 684-692
Internet Key Exchange
Foro-chap 18:pg 563-566
14 10-01-2023 Chapter 23: Firewalls Online resource
to
Firewall characteristics and access policy Online resource
15-01-2023
Types of firewalls Online resource
15 17-01-2023 Firewall location and configuration Online resource
to
22-01-2023
Revision -
Revision -
16 Make Up
Class for 16
Week may
- - -
be adjusted
before
Midterm
Final Examination
(31-01-2022)
Sta: William Stallings, Foro: Behrouz A. Forouzan

Page 6 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT

LAB PLAN
Course Title: Cryptography and Network Security
Course Code: CE-408
Week Required
Lab Date Objective
No. Reading
12-10-2022
Lab Manual
1 to Lab 1: Security Attacks and Related Tools
Pg: 5 to 11
15-10-2022
18-10-2022
Lab 2: Classical Encryption Techniques (ceasar cipher, Mono Lab Manual
2 to
alphabetic Ciphers) Pg: 12 to 15
23-10-2022
25-10-2022
Lab 3: Classical Encryption Techniques II (Polyalphabetic, Lab Manual
3 to
transposition cipher) Pg: 16 to 19
30-10-2022
01-11-2022
Lab Manual
4 to Lab 4: Modern Encryption Techniques Simplified DES (S-DES)
Pg: 20 to 22
06-11-2022
08-11-2022
Lab 5: Modern Encryption Techniques Data Encryption Standard Lab Manual
5 to
(DES) Pg: 23 to 24
13-11-2022
15-11-2022
6 Lab Manual
to Lab 6 : Simplified Advance Encryption Standard (S-AES)
Pg: 25 to 29
20-11-2022
22-11-2022
Lab Manual
7 to Lab 7: Open Ended Lab
Pg: 30
27-11-2022
Mid Term Examination
8
(05-12-2022 to 10-12-2022)
11-12-2022
Lab Manual
9 to Lab 8: Public Key Cryptography – RSA Algorithm
Pg: 31 to 33
13-12-2022
15-12-2022
Lab Manual
10 to Lab 9: SHA-512 Algorithm
Pg: 34 to 37
18-12-2022
20-12-2022
Lab Manual
11 to Lab 10: Digital Signature Algorithm (DSA)
Pg: 38 to 40
25-12-2022
27-12-2022
Lab Manual
12 to Lab 11: Configure Routers for Syslog, NTP, and SSH Operations
Pg: 41 to 46
01-01-2023
03-01-2023
13 Lab Manual
to Lab 12: AAA Authentication Server
Pg: 47 to 50
08-01-2023
10-01-2022
to Lab Manual
14 Lab 13: IPsec Site-to-Site Virtual Private Network (VPN)
15-01-2023 Pg: 51 to 58

Page 7 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
Make Up
Lab may be
15 adjusted Lab14: Open ended Lab Lab Manual
before Pg: 59
Midterm
Lab Examination
16
(23-01-2023 to 27-01-2023)

Page 8 of 8

You might also like