(CE-408) CIS-Theory+Lab Course-Fall-2022
(CE-408) CIS-Theory+Lab Course-Fall-2022
COURSE OBJECTIVE:
The objective of this course is to introduce concepts related to cryptography and Network Security.
Different security algorithms and mechanisms will be presented and solutions to security threats will be
discussed.
COURSE OUTLINE:
Introduction to data and network security, goals, threats and attacks, Kill chain models, Advanced Persistent
Threats, Security mechanisms, Difference between Cryptography and cryptanalysis, Traditional
substitution and transposition cipher, Modern symmetric-key cryptography, Simplified DES, DES design
principals, Double DES, Triple DES, Concept of Blockchain with its applications, and Block cipher modes
of operation, Raijndael Algorithm, Mechanism of encryption in AES, Principles of Public Key
Cryptosystem, RSA Algorithm, Diffie-Hellman Key Exchange, Application of cryptographic Hash
functions, Secure Hash Algorithm (SHA), Key management and distribution, Network Security
Mechanisms, IPSec, Virtual Private Network, Firewalls and Intrusion Detection and Prevention Systems
COURSE LEARNING OUTCOMES (CLOs) and its mapping with Program Learning Outcomes
(PLOs):
CLO Bloom’s
Course Learning Outcomes (CLOs) PLOs
No. Taxonomy
Explain fundamental security objectives, PLO_1 C2
1
security attacks, services, and mechanisms (Engineering knowledge) (Understanding)
Apply various algorithms and security PLO_3
C3
2 mechanisms to provide confidentiality, integrity, (Design/Development of
(Applying)
and authentication Solutions)
Identify appropriate techniques to analyze the PLO_2 C4
3
problems in the discipline of network security (Problem Analysis) (Analyzing)
Page 1 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
GRADING POLICY:
Page 2 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
Recommended Book:
Stallings, William. Cryptography and Network Security: Principles and Practice, 7th
Edition, published by Pearson Education, 2017
Reference Books:
Forouzan, Behrouz A. Cryptography and Network Security, January 2010 Edition 2nd,
Published by Tata McGraw-Hill, ISBN-10: 007070208X
Week
Topics Laboratory Synchronization
No.
Introduction to data security
Security goals
1 Security Attacks and Related Tools
Security attacks
Security mechanisms
Classical Encryption Techniques
Traditional substitution ciphers (Mono- Classical Encryption Techniques
2 alphabetic)- Additive Cipher (Caesar cipher, Mono alphabetic
Mono-alphabetic Ciphers Cont. Multiplicative Ciphers, play fair, hill cipher)1
& Affine Ciphers1
Affine Ciphers
Classical Encryption Techniques II
Traditional substitution ciphers (Poly
3 (Polyalphabetic, transposition
alphabetic)
cipher)2
Traditional transposition ciphers2
Block Cipher and Data Encryption Standards
Modern Encryption Techniques
4 Simplified DES key generation
Simplified DES (S-DES)3
Simplified DES encryption, decryption3
DES design principals & Algorithm, Key
generation Modern Encryption Techniques Data
5
DES Encryption, Decryption Encryption Standard (DES)4
Advance Encryption Standard4
AES Key Generation Simplified Advance Encryption
6
AES Encryption5 Standard (S-AES)5
Page 3 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
RSA Continue
Public Key Cryptography – RSA6
8 Diffie-Hellman Key Exchange7
Algorithm, Diffie Hellman7
Cryptographic Hash Function
SHA8
9 Digital signatures9 SHA 512-Algorithm8
RSA and DSS approach
User Authentication Protocol10
10 Remote User Authentication Principles Digital Signature Algorithm9
Kerberos
Electronic Email Security
Configure Routers for Syslog, NTP,
11 Email threats and comprehensive email security
and SSH Operations
S/MIME/TLS
Pretty Good Privacy (PGP)
12 PGP Services AAA Authentication Server 10
IP Security
IP Security Policies11
IPsec Site-to-Site Virtual Private
13 IP Security Header
Network (VPN)11
Internet Key Exchange
Firewalls
14 Firewall characteristics and access policy Open Ended Lab
Types of firewalls
Firewall location and configuration
15 Lab Exam/ Project Viva
Revision
Page 4 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
LECTURE PLAN
Course Title: Cryptography and Network Security
Course Code: CE-408
Week
Week Dates Topics Required Reading Key Date
No.
1 12-10-2022 Chapter 1: Computer and Network Security Sta:Pg. 21
to Concept Foro-chap 1:pg 1-32
15-10-2022 Sta:Pg. 27
Security attacks
Foro-chap 1:pg 3-5
Sta:Pg. 29
Security Mechanisms
Foro-chap 1:pg 6-8
2 18-10-2022 Sta:Pg. 86
Chapter 3: Classical Encryption Techniques
to Foro-chap 3:pg 55-60
23-10-2022 Traditional substitution ciphers Assignment#01
Sta:Pg. 92-94
(Mono-alphabetic)- Additive Cipher, Ceasar
Foro-chap 3:pg 61-64
cipher
Mono-alphabetic Ciphers Cont. Sta:Pg. 98
Multiplicative cipher Foro-chap 3:pg 65-66
Sta:Pg. 99
Affine Ciphers
Foro-chap 3:pg 66-68
3 25-10-2022 Traditional substitution ciphers (Poly Sta:Pg. 107
to alphabetic) Foro-chap 3:pg 69-80
30-10-2022 Sta:Pg.108 Quiz#01
Traditional transposition ciphers
Foro-chap 3:pg 81-86
Chapter 4: Block Cipher and Data Sta:Pg.119
Encryption Standards Foro-chap 6:pg 159
Simplified DES key generation Power point lecture 5
Simplified DES encryption, decryption Power point lecture 5
4 01-11-2022 Data encryption standard
Sta:Pg. 129
to DES design principals & Algorithm, key
Foro-chap 6:pg 160-173
06-11-2022 generation
Sta:Pg. 131
DES Encryption, Decryption
Foro-chap 6:pg 160-173
5 08-11-2022 Sta:Pg. 172-178
Chapter 6: Advance Encryption Standard
to Foro-chap 7:pg 191-192
13-11-2022 Sta:Pg. 190-192 Assignment#02
AES Key Generation Foro-chap 7:pg 193-195,
pg 207-211
Sta:Pg. 179-189
AES Encryption
Foro-chap 7:pg 195-201
6 15-11-2022 Sta:Pg. 179-189
AES Encryption
to Foro-chap 7:pg 202-207
20-11-2022 Sta:Pg. 208
Chapter 7: Block Cipher Operation
Foro-chap 8:pg 225
Sta:Pg. 213-221
Modes of Block Cipher
Foro-chap 7:pg 226-238
7 22-11-2022 Chapter 9: Public-key cryptography Sta:Pg. 284-293
to
RSA Foro-chap 10:pg 301-305
27-11-2022
Sta:Pg. 294-294
RSA Continue
Foro-chap 10:pg 301-305
Page 5 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
8 Midterm Examination
(05-12-2022)
9 11-12-2022 Chapter 10: Other Public Key Crypto
to System Sta:Pg. 314-316
13-12-2022 Diffie-Hellman Key Exchange
Sta:Pg. 340-347 Quiz#02
Chapter 11: Cryptographic Hash Function
Foro-chap 12:pg 363-367
Sta:Pg. 355-364
SHA
Foro-chap 12:pg 367-375
10 18-12-2022 Sta:Pg. 420-426
Chapter 13: Digital signatures
to Foro-chap 13:pg 389-394
20-12-2022 Sta:Pg. 426-430 Assignment#03
RSA and DSS approach
Foro-chap 13:pg 396-400
Chapter 15: User Authentication Protocol Sta:Pg. 474
Remote User Authentication Principles Sta:Pg. 474-478
Sta:Pg. 482-495
Kerberos
Foro-chap 15:pg 443-447
11 20-12-2022 Sta:Pg. 613-624
Chapter 19: Electronic Email Security
to Foro-chap 16:pg 467
25-12-2022 Email threats and comprehensive email Sta:Pg. 613-624
security Foro-chap 16:pg 467
Sta:Pg. 627-638
S/MIME/TLS
Foro-chap 16:pg 492-499
12 27-12-2022 Sta:Pg. 638-639
Pretty Good Privacy (PGP)
to Foro-chap 16:pg 470-472
01-01-2023 PGP Services Foro-chap 16:pg 470-472 Quiz#03
Sta:Pg. 662-667
Chapter 20: IP Security
Foro-chap 18:pg 549-552
13 03-01-2023 Sta:Pg. 662-667
IP Security, Services and Policies
to Foro-chap 18:pg 552-562
08-01-2023 IP Security Header Sta:Pg. 673-680
Sta:Pg. 684-692
Internet Key Exchange
Foro-chap 18:pg 563-566
14 10-01-2023 Chapter 23: Firewalls Online resource
to
Firewall characteristics and access policy Online resource
15-01-2023
Types of firewalls Online resource
15 17-01-2023 Firewall location and configuration Online resource
to
22-01-2023
Revision -
Revision -
16 Make Up
Class for 16
Week may
- - -
be adjusted
before
Midterm
Final Examination
(31-01-2022)
Sta: William Stallings, Foro: Behrouz A. Forouzan
Page 6 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
LAB PLAN
Course Title: Cryptography and Network Security
Course Code: CE-408
Week Required
Lab Date Objective
No. Reading
12-10-2022
Lab Manual
1 to Lab 1: Security Attacks and Related Tools
Pg: 5 to 11
15-10-2022
18-10-2022
Lab 2: Classical Encryption Techniques (ceasar cipher, Mono Lab Manual
2 to
alphabetic Ciphers) Pg: 12 to 15
23-10-2022
25-10-2022
Lab 3: Classical Encryption Techniques II (Polyalphabetic, Lab Manual
3 to
transposition cipher) Pg: 16 to 19
30-10-2022
01-11-2022
Lab Manual
4 to Lab 4: Modern Encryption Techniques Simplified DES (S-DES)
Pg: 20 to 22
06-11-2022
08-11-2022
Lab 5: Modern Encryption Techniques Data Encryption Standard Lab Manual
5 to
(DES) Pg: 23 to 24
13-11-2022
15-11-2022
6 Lab Manual
to Lab 6 : Simplified Advance Encryption Standard (S-AES)
Pg: 25 to 29
20-11-2022
22-11-2022
Lab Manual
7 to Lab 7: Open Ended Lab
Pg: 30
27-11-2022
Mid Term Examination
8
(05-12-2022 to 10-12-2022)
11-12-2022
Lab Manual
9 to Lab 8: Public Key Cryptography – RSA Algorithm
Pg: 31 to 33
13-12-2022
15-12-2022
Lab Manual
10 to Lab 9: SHA-512 Algorithm
Pg: 34 to 37
18-12-2022
20-12-2022
Lab Manual
11 to Lab 10: Digital Signature Algorithm (DSA)
Pg: 38 to 40
25-12-2022
27-12-2022
Lab Manual
12 to Lab 11: Configure Routers for Syslog, NTP, and SSH Operations
Pg: 41 to 46
01-01-2023
03-01-2023
13 Lab Manual
to Lab 12: AAA Authentication Server
Pg: 47 to 50
08-01-2023
10-01-2022
to Lab Manual
14 Lab 13: IPsec Site-to-Site Virtual Private Network (VPN)
15-01-2023 Pg: 51 to 58
Page 7 of 8
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER ENGINEERING DEPARTMENT
Make Up
Lab may be
15 adjusted Lab14: Open ended Lab Lab Manual
before Pg: 59
Midterm
Lab Examination
16
(23-01-2023 to 27-01-2023)
Page 8 of 8