Network Security Protocols - S8 CSE-2019 Scheme-Syllabus
Network Security Protocols - S8 CSE-2019 Scheme-Syllabus
YEAR OF
NETWORK SECURITY CATEGORY L T P CREDIT INTRODUCTION
CST434
PROTOCOLS
PEC 2 1 0 3 2019
Preamble: This course helps the learners to explore various network and system security
protocols. This course covers authentication protocols, firewalls and security protocols from
different layers such as data link, network, transport and application. The concepts covered in
this course enable the learners in effective use of security protocols for securing network
applications.
Course Outcomes: After the completion of the course, the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination (%)
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
Each of the two internal examinations has to be conducted out of 50 marks. First series test
shall be preferably conducted after completing the first half of the syllabus and the second
series test shall be preferably conducted after completing remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly completed module), each with 7 marks. Out
of the 7 questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, 4/e,
Pearson Ed.
2. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
Public World”, 2/e, PHI.
References
1. Behrouz A. Forouzan, DebdeepMukhopadhyay, “Cryptography and Network Security”, 3/e,
Tata McGraw Hill.
2. Tyler Wrightson, “Wireless Network Security A Beginner’s Guide”, 2012, Tata McGraw Hill.
3. William Stallings, “Network Security Essentials: Applications and Standards”, 4/e, Prentice
Hall.
4. Schiller J., Mobile Communications, 2/e, Pearson Education.
5. Roberta Bragg et. al., “Network Security: The Complete Reference”, Tata McGraw Hill
2. Is it possible for the receiver to reorder SSL record blocks that arrive out of order?
If so, explain how it can be done. If not, why?
Course Outcome 4 (CO4):
1. Devise a protocol based on a pre-shared secret key that hides identities and gives
Perfect Forward Secrecy (PFS) for identity hiding. Make two variants, one in
which an active attacker can learn only the initiator’s identity, and one in which an
active attacker can learn only the target’s identity.
2. Explain the tasks performed by the payment gateway during Payment
Authorization in SET.
Course Outcome 5 (CO5):
1. List the weaknesses of a packet-filtering router.
2. Give the relevance of pair wise keys and group keys in IEEE 802.11i.
3. State the design goals of firewalls.
Reg No:_______________
Name:_________________
2. Specify the significance of key pair recovery. When is the key pair updated?
5. Explain the significance of Alert protocol in SSL and list out any three Alert
messages with their uses.
6. Specify the purpose of MAC during the change cipher spec TLS exchange.
COMPUTER SCIENCE AND ENGINEERING
7. What is the advantage, if any, of not including the MAC in the scope of packet
encryption in SSH packets?
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Describe the requirements for a public-key certificate scheme. (8)
OR
12. (a) Specify the purpose of the X.509 standard. How is an X.509 certificate
revoked? (8)
(b) Describe the management functions of a PKI. What is a cross certificate? (6)
13. (a) List the services provided by PGP and explain how authentication and (8)
confidentiality are provided.
OR
14. (a) Give the format of a PGP message and specify the significance of each (8)
field in the message.
15. (a) Explain the parameters that identify an SSL session state. (8)
(b) Differentiate between transport mode and tunnel mode in IPSec. (6)
OR
16. (a) The IPsec architecture document states that when two transport mode SAs (8)
arebundled to allow both AH and ESP protocols on the same end-to-end
flow, only one ordering of security protocols seems appropriate: performing
the ESP protocol before performing the AH protocol. Why is this approach
COMPUTER SCIENCE AND ENGINEERING
(b) List and explain the purpose each Alert Codes supported by SSL. (6)
OR
(b) “The HTTPS capability is built into all modern web browsers”. Justify. (6)
OR
20. (a) Compare the features of three types of firewalls. (8)
(b) Compare the Wireless LAN protocols WEP, WPA and WPA2 (6)
TEACHING PLAN
No Contents No.of
Lecture
Hours
(35 Hrs)
1
2.1 Pretty Good Privacy (PGP) – Operational Description