0% found this document useful (0 votes)
18 views3 pages

1 Lecture Plan

Uploaded by

necncse2021b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

1 Lecture Plan

Uploaded by

necncse2021b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

NARAYANA ENGINEERING COLLEGE::NELLORE || GUDUR

Department of CSE
Lecture Plan
Course Details
Class: Final Year, B. Tech Semester: IV-I Year: 2021-2022
Course Title: Information Security Course Code: 15A05702 Credits: 3
Program/Dept.: Computer Science and Engineering Section: CSE-A & B Batch: 2018-22
Regulation: R-15 Faculty: Dr P Penchalaiah / D Murahari Reddy
Lecture Planned Unit Delivered Textbooks /
Topics to be Covered
No. Date No. Date References
08-Oct-21
1. 1 Introduction to Security Concept s and its importance T1,R1
11-Oct-21
2. 1 OSI architecture T1
12-Oct-21
3. 1 Security attacks T1
18-Oct-21
4. 1 A model for network security and symmetric cipher T1
20-Oct-21
5. 1 Substitution ciphers T1
21-Oct-21
6. 1 Substitution ciphers T1
22-Oct-21
7. 1 Substitution ciphers T1
25-Oct-21
8. 1 Transposition cipher T1
26-Oct-21
9. 1 Block cipher principles T1
27-Oct-21
10. 1 Data encryption standard T1
28-Oct-21
11. 1 Strength of DES, linear and differential cryptanalysis T1,R2
29-Oct-21
12. 1 Block cipher modes of operations T1
01-Nov-21
13. 1 AES T1
02-Nov-21
14. 1 RC4 T1
03-Nov-21
15. 2 Integer arithmetic T2
05-Nov-21
16. 2 Modular arithmetic T2
08-Nov-21
17. 2 Matrices, Linear congruence T2
09-Nov-21
18. 2 Matrices, Linear congruence T2
10-Nov-21
19. 2 Algebraic structures T2
11-Nov-21
20. 2 GF(2n) fields T2
12-Nov-21
21. 2 Primes T2
15-Nov-21
22. 2 Primality testing, factorization T2
16-Nov-21
23. 2 Chinese remainder theorem T2
17-Nov-21
24. 2 Quadratic congruence T2
18-Nov-21
25. 2 Exponentiation and logarithm T2
19-Nov-21
26. 2 Principles of public key cryptography T2,T1
22-Nov-21
27. 2 RSA algorithm T2,T1
28. 23-Nov-21 2 Diffie hellman key exchange T2,T1
24-Nov-21
29. 2 Elgamal cryptography system T2,T1
25-Nov-21
30. 2 Elliptic curve and cryptography T2,T1
26-Nov-21
31. 3 Applications requirements and security-Hash functions T1
29-Nov-21
32. 3 Hash function based on cipher block chaining T1
30-Nov-21
33. 3 Secure hash algorithms (SHA) T1
01-Dec-21
34. 3 Message authentication requirements T1
06-Dec-21
35. 1 Revision- Unit-1
07-Dec-21
36. 1 Revision- Unit-1
08-Dec-21
37. 2 Revision- Unit-2
09-Dec-21
38. 2 Revision- Unit-2
10-Dec-21
39. 3 Message authentication functions T1
13-Dec-21
40. 3 Security of MACS T1
14-Dec-21
41. 3 HMAC T1
15-Dec-21
42. 3 MAC based on block ciphers T1
16-Dec-21
43. 3 Authentication encryption T1
17-Dec-21
44. 3 Digital Signatures-RSA with SHA & DSS T1
20-Dec-21
45. 3 Digital Signatures-RSA with SHA & DSS T1
21-Dec-21
46. 4 Symmetric key distribution using symmetric encryption T2
22-Dec-21
47. 4 Symmetric key distribution using symmetric encryption T2
23-Dec-21
48. 4 Symmetric key distribution using asymmetric T2
24-Dec-21
49. 4 Distribution of public keys T2
27-Dec-21
50. 4 X.509 certificates, public key infrastructure T2
28-Dec-21 Remote user authentication principles, Symmetric
51. 4 T1
Encryption
29-Dec-21
52. 4 Remote user authentication-asymmetric encryption T1
30-Dec-21
53. 4 Federal identity management T1
31-Dec-21
54. 4 Pretty good privacy T1
03-Jan-22
55. 4 S/MIME T1
04-Jan-22
56. 5 SSL architecture, four protocols, T2
05-Jan-22
57. 5 SSL message formats T2
06-Jan-22
58. 5 Transport layer security T2
07-Jan-22
59. 5 Https,ssh T2
10-Jan-22
60. 5 IPSEC, Two modes, Two Security Protocols T2
61. 11-Jan-22 Security association, security policy, internet key
5 T2
exchange
62. 12-Jan-22
5 Description of the system, Trust and Trusted Systems T2
63. 17-Jan-22
5 Buffer Overflow and Malicious Software T2
64. 18-Jan-22
5 Malicious programs, IDS, firewalls T2
65. 19-Jan-22
3 Revision- Unit-3
66. 20-Jan-22
3 Revision- Unit-3
67. 21-Jan-22
4 Revision- Unit-4
68. 24-Jan-22
4 Revision- Unit-4
69. 25-Jan-22
5 Revision- Unit-5
70. 27-Jan-22
5 Revision- Unit-5
71. 28-Jan-22
Previous Papers Discussion
72. 29-Jan-22
Previous Papers Discussion

Name of the Text Book/Reference Book


Text books:
T1. “Cryptography and Network Security”, Behrouz A. Frouzan and Debdeep Mukhopadhyay, Mc Graw Hill
Education, 2nd edition, 2013.
T2. “Cryptography and Network Security: Principals and Practice”, William Stallings, Pearson Education , Fifth
Edition, 2013.
References:
R1. “Network Security and Cryptography”, Bernard Menezes , Cengage Learning.
R2. “Cryptography and Security”, C.K. Shymala, N. Harini and Dr. T.R. Padmanabhan, Wiley-India.
R3. “Applied Cryptography, Bruce Schiener, 2nd edition, John Wiley & Sons.
R4. “Cryptography and Network Security”, Atul Kahate, TMH.
R5. ‘Introduction to Cryptography”, Buchmann, Springer.
R6. ‘Number Theory in the Spirit of Ramanujan”, Bruce C.Berndt, University Press
R7. “Introduction to Analytic Number Theory”, Tom M.Apostol, University Press

You might also like