0% found this document useful (0 votes)
13 views9 pages

SVES C&NS Course-Descriptor

The document outlines the course descriptor for 'Cryptography and Network Security' (CS603PC) at SRI Venkateswara Engineering College, detailing its structure, prerequisites, evaluation methodologies, and learning outcomes. The course aims to provide students with foundational skills in analyzing network security threats and developing protective policies. It includes various instructional methodologies and assessment patterns to evaluate students' understanding of cryptographic algorithms, security mechanisms, and web security concepts.

Uploaded by

sves exambranch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

SVES C&NS Course-Descriptor

The document outlines the course descriptor for 'Cryptography and Network Security' (CS603PC) at SRI Venkateswara Engineering College, detailing its structure, prerequisites, evaluation methodologies, and learning outcomes. The course aims to provide students with foundational skills in analyzing network security threats and developing protective policies. It includes various instructional methodologies and assessment patterns to evaluate students' understanding of cryptographic algorithms, security mechanisms, and web security concepts.

Uploaded by

sves exambranch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

SRI VENKATESWARA ENGINEERING COLLEGE,

SURYAPET-508213

COMPUTER SCIENCE AND ENGINEERING


COURSE DESCRIPTOR

Course Title CRYPTOGRYAND NETWORK SECURITY


Course Code CS603PC
Programme B.Tech
Semester III year CSE
II - Sem
Course Type Core
Regulation JNTUH- R16
Theory Practical
Course Structure Lectures Tutorials Credits Laboratory Credits
3 4 3 2

Chief Coordinator Mr. B.Ramji, Sr.Assistant Professor

I. COURSE OVERVIEW:
This course provides an introduction to the field of network security. Specific topics to be
examined include threats and vulnerabilities to network architectures and protocols. The course is
designed to provide fundamental skills needed to analyze the internal and external security
threats against a network, and to develop security policies that will protect an organization’s
information. Students will learn how to evaluate network and Internet security issues and design.

II. COURSE PRE-REQUISITES:


Level Course Code Semester Prerequisites
UG CS502PC III-I Data Communication and
Computer Networks

III. MARKSDISTRIBUTION:

IV.
Subject SEE Examination Internal Total Marks
Examination
Cryptography and Network 75 Marks 25 Marks 100
Security

V. DELIVERY / INSTRUCTIONAL METHODOLOGIES:


✔ Chalk & Talk ✔ Quiz ✔ Assignments ✔ MOOCs
✔ LCD / PPT ✔ Seminars ✘ Mini Project ✔ Videos
✘ Open Ended Experiments

VI. EVALUATION METHODOLOGY:


The course will be evaluated for a total of 100 marks, with 25 marks for Continuous Internal
Assessment (CIA) and 75 marks for Semester End Examination (SEE). Out of 25 marks allotted
for CIA during the semester, marks are awarded by taking average of two CIA examinations or
the marks scored in the make-up examination.
Page | 1
Semester End Examination (SEE): The SEE is conducted for 75 marks of 3 hours duration.
The syllabus for the theory courses is divided into five units and each unit carries equal
weightage in terms of marks distribution. The question paper pattern is as follows. Two full
questions with “either‟ or ‟choice” will be drawn from each unit. Each question carries 10
marks. There could be a maximum of two sub divisions in a question.

The emphasis on the questions is broadly based on the following criteria:


50 % To test the objectiveness of the concept.
50 % To test the analytical skill of the concept OR to test the application skill of the concept.

Continuous Internal Assessment (CIA):


CIA is conducted for a total of 25 marks (Table 1), with 20 marks for Continuous Internal
Examination (CIE), 05 marks for Quiz/ Alternative Assessment Tool (AAT).
Table 1: Assessment pattern for CIA
Component Theory
Total Marks
Type of Assessment CIE Exam Quiz / AAT
CIA Marks 20 05 25

Continuous Internal Examination (CIE):


Two CIE exams shall be conducted at the end of the 8 th and 16th week of the semester respectively. The
CIE exam is conducted for 25 marks of 2 hours duration consisting of two parts. Part–A shall
have five compulsory questions of one mark each. In part–B, four out of five questions have to
be answered where, each question carries 5 marks. Marks are awarded by taking average of
marks scored in two CIE exams.

Quiz / Alternative Assessment Tool (AAT):


Two Quiz exams shall be online examination consisting of 20 multiple choice questions and are
be answered by choosing the correct answer from a given set of choices (commonly four).
Marks shall be awarded considering the average of two quizzes for every course. The AAT may
include seminars, assignments, term paper, open ended experiments, five minutes video and
MOOCs.
VII. HOW PROGRAM OUTCOMES ARE ASSESSED:
Proficiency
Program Outcomes (POs) Strength
assessed by
PO1 Engineering knowledge: Apply the knowledge of 3 Assignments
mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex
engineering problems.
PO2 Problem analysis: Identify, formulate, review research 2 Assignments
literature, and analyze complex engineering problems
reaching substantiated conclusions using first
principles of mathematics, natural sciences, and
engineering sciences.
PO3 Design/development of solutions: Design solutions for 3 Guest Lectures
complex engineering problems and design system
components or processes that meet the specified needs with
appropriate consideration for the public health and safety, and
the cultural, societal, and environmental considerations.
PO4 Conduct investigations of complex problems: Use research- 2 5 minutes
based knowledge and research methods including design of Video/ Seminars
experiments, analysis and interpretation of data, and synthesis
of the information to provide valid conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate 3 Seminars / Term
techniques, resources, and modern engineering and IT tools Paper/ 5 minutes
including prediction and modeling to complex engineering video
Page | 2
activities with an understanding of the limitations.
3 = High; 2 = Medium; 1 = Low
VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:
Proficiency
Program Specific Outcomes (PSOs) Strength
assessed by
PSO1 Professional Skills: The ability to research, understand and 2 Lectures,
implement computer programs in the areas related to Assignments
algorithms, system software, multimedia, web design, big
data analytics, and networking for efficient analysis and
design of computer-based systems of varying complexity.
PSO2 Software Engineering Practices: The ability to apply 2 Seminars
standard practices and strategies in software service
management using open-ended programming environments
with agility to deliver a quality service for business success
PSO3 Successful Career and Entrepreneurship: The ability to 2 Guest Lectures
employ modern computer languages, environments, and
platforms in creating innovative career paths, to be an
entrepreneur, and a zest for higher studies.
3 = High; 2 = Medium; 1 = Low

IX. COURSE OBJECTIVES (COs):


The course should enable the students to:
I Learn the basic categories of threats to computers and networks
II Understand various cryptographic algorithms and be familiar with public-key cryptography .
III Apply authentication functions for providing effective security.
IV Analyze the application protocols to provide web security.
V Discuss the place of ethics in the information security area.

X. COURSE OUTCOMES (COs):


CO’S COURSE OUTCOMES CLO’S COURSE LEARNING OUTCOMES
CO 1 Understand the basic Understand the different types of attacks,
CLO 1
Concepts of attacks on security mechanisms, security services.
computer, computer CLO 2 Explain various substitution techniques
security. such as play-fair cipher, mono-alphabetic
cipher and hill cipher.
CLO 3 Understand various Transposition
techniques such as row transposition and
rail-fence.
CLO 4 Describe the role of private and public
key in encryption and decryption and key
size.
CLO 5 Apply the symmetric algorithm for
message transmission and analyze the
security level of it.
CLO 6 Understand various asymmetric key
encryption algorithms for message
encryption and decryption.
CO 2 Understand the concepts of CLO 7 Understand the block cipher modes of
symmetric key ciphers. operation for encryption and decryption.
CLO 8 Describe the need of stream ciphers in
message encryption.
CLO 9 Understand the role of elliptic curve
cryptography in security.
CLO 10 Analyze the drawbacks of RSA and able
to design a security algorithm which
overcomes that drawbacks.
CO 3 Describe the message CLO 11 Explain the role of the message
authentication algorithm authentication in message transmission.

Page | 3
CO’S COURSE OUTCOMES CLO’S COURSE LEARNING OUTCOMES
and hash functions. CLO 12 Explain the need of digital signature in
message transmission.
CLO 13 Explain and demonstrate the role of
different types of hash functions for
providing security.
CLO 14 Understand the differences between the
symmetric and symmetric cryptography
algorithms for providing security.
CO 4 Understand the concepts of CLO 15 Explain S/MIME and PGP for
e-mail security. transmitting mail from sender to receiver.
CLO 16 Explain IP security for internet protocol
and analyze how it provides security.
CO 5 Understand the concepts of CLO 17 Describe the security socket layer and
web security. transport layer security for web security.
CLO 18 Demonstrate various types of intrusion
detection techniques.
CLO 19 Understand various types of viruses and
its vulnerabilities.
CLO 20 Describe various types of firewalls and
analyze the security levels of these.

XI. COURSE LEARNING OUTCOMES (CLOs):


CLO At the end of the course, the student will have the PO’s Strength of
Code CLO’s Mapped
ability to: Mapping
ACS013.01 CLO 1 Understand the different types of attacks, security PO1, PO2 2
mechanisms, security services.
ACS013.02 CLO 2 Explainvarious substitution techniques such as PO1, PO2 2
play-fair cipher, mono-alphabetic cipher and hill
cipher.
ACS013.03 CLO 3 Understand various Transposition techniques such PO2, PO5 3
as row transposition and rail-fence.
ACS013.04 CLO 4 Describe the role of private and public key in PO3 3
encryption and decryption and key size.
ACS013.05 CLO 5 Apply the symmetric algorithm for message PO2, PO3 3
transmission and analyze the security level of it.
ACS013.06 CLO 6 Understand various asymmetric key encryption PO2, PO5 3
algorithms for message encryption and decryption.
ACS013.07 CLO 7 Understand the block cipher modes of operation for PO3, PO4 2
encryption and decryption.
ACS013.08 CLO 8 Describe the need of stream ciphers in message PO2, PO4 1
encryption.
ACS013.09 CLO 9 Understand the role of elliptic curve cryptography PO2 3
in security.
ACS013.10 CLO 10 Analyze the drawbacks of RSA and able to design a PO2, PO3 2
security algorithm which overcomes that
drawbacks.
ACS013.11 CLO 11 Explain the role of the message authentication in PO1, PO2 2
message transmission.
ACS013.12 CLO 12 Explain the need of digital signature in message PO2, PO5 2
transmission.
ACS013.13 CLO 13 Explain and demonstrate the role of different types PO1, PO2 3
of hash functions for providing security.

Page | 4
CLO At the end of the course, the student will have the PO’s Strength of
Code CLO’s Mapped
ability to: Mapping
ACS013.14 CLO 14 Understand the differences between the symmetric PO1, PO2 3
and symmetric cryptography algorithms for
providing security.
ACS013.15 CLO 15 Explain S/MIME and PGP for transmitting mail PO2, PO3 2
from sender to receiver.
ACS013.16 CLO 16 Explain IP security for internet protocol and PO2 3
analyze how it provides security.
ACS013.17 CLO 17 Describe the security socket layer and transport PO2 2
layer security for web security.
ACS013.18 CLO 18 Demonstrate various types of intrusion detection PO1, PO2 3
techniques.
ACS013.19 CLO 19 Understand various types of viruses and its PO2, PO3 2
vulnerabilities.
ACS013.20 CLO 20 Describe various types of firewalls and analyze the PO4 2
security levels of these.
3 = High; 2 = Medium; 1 = Low

XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF


PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Program Specific Outcomes


Program Outcomes (POs)
(PSOs)
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3

CO 1 3 3 3 3 2
CO 2 2 2 2 2
CO 3 3 2 3 2 2
CO 4 2 3 2 2
CO 5 3 2 3 3 2 2 2

XIII. MAPPING COURSE LEARNING OUTCOMES LEADING TO THE ACHIEVEMENT


OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Program Specific
Program Outcomes (POs)
CLOs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CLO 1 3 2 2
CLO 2 3 2 3
CLO 3 3 3 2
CLO 4 3 3
CLO 5 3 3 2
CLO 6 3 3 2
CLO 7 3 2 2
CLO 8 1 2 2
CLO 9 3
CLO 10 2 2 3
CLO 11 3 2 2
CLO 12 1 3 2
CLO 13 3 2 2

Page | 5
Program Specific
Program Outcomes (POs)
CLOs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CLO 14 3 2 2
CLO 15 2 3 2 3
CLO 16 2 2
CLO 17 2 2
CLO 18 3 3 2
CLO 19 2 3 2
CLO 20 3 2
3 = High; 2 = Medium; 1 = Low

XIV. ASSESSMENT METHODOLOGIES–DIRECT


PO1, PO2, PO1, PO2,
0.5 PO3, PO4, SEE Exams PO3, PO4, Assignments PO1 Seminars PO2
PO5 PO5
Laboratory Student
- - Mini Project - Certification -
Practices Viva
Term Paper -

XV. ASSESSMENT METHODOLOGIES-INDIRECT

✔ Early Semester Feedback ✔ End Semester OBE Feedback

✘ Assessment of Mini Projects by Experts

XVI. SYLLABUS
ATTACKS ON COMPUTERS AND COMPUTER
UNIT-I Classes: 14
SECURITY
Security Concepts: Introduction, The need for security, Security approaches, Principles of
security, Types of Security attacks, Security services, Security Mechanisms, A model for
Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher
text, substitution techniques, transposition techniques, encryption and decryption, symmetric and
asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

UNIT -II SYMMETRIC KEY CIPHERS Classes: 12


Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block
cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key
cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange,
Knapsack Algorithm.

MESSAGE AUTHENTICATION ALGORITHM AND


UNIT -III Classes: 08
HASH FUNCTIONS
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA- 512),
Message authentication codes: Authentication requirements, HMAC, CMAC, Digital
signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric
Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys,
Kerberos, X.509 Authentication Service, Public – Key Infrastructure

Page | 6
UNIT -IV E-MAIL SECURITY Classes: 10
Transport-level Security: Web security considerations, Secure Socket Layer and Transport
Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security,
Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security

UNIT -V WEB SECURITY Classes: 09


E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security
architecture, Authentication Header, Encapsulating security payload, Combining security
associations, Internet Key Exchange Case Studies on Cryptography and security: Secure
Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment
Transactions, Cross site Scripting Vulnerability.
Text Books:
1. Cryptography and Network Security - Principles and Practice: William
Stallings,
Pearson Education, 6th Edition
1. 2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3 rd
Edition
Reference Books:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R
Padmanabhan,
Wiley India, 1st Edition.
2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc
Graw Hill, 3rd
Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE
Learning
Web References:
1. http://bookboon.com/en/search?q=INFORMATION+SECURITY 2.
2. https://books.google.co.in/books/about/Cryptography_Network_Security_Sie_2E.html?id=
Kokjwdf0E7QC
3. https://books.google.co.in/books/about/Information_Security.html?id=Bh45pU0_E_4C
E-Text Books:
1. https://books.google.co.in/books/about/Information_Security.html 2
2. http://www.amazon.in/Cryptography-Network-Security-BehrouzForouzan/dp/007070208X

XVII.COURSE PLAN:
The course plan is meant as a guideline. Probably there may be changes.
Course
Lecture Topics to be covered Learning
Reference
No Outcomes
(CLOs)
1 Understand and explore the basics of security and the need for CLO 1 T1:1.1,1.
security. 2
Understand security approaches, principles of security, types of T1:1.3,1.4,
2-4 CLO 1
security attacks, security services and security mechanisms. 1.5,1.6
5-6 Discuss substitution and transposition techniques. CLO2 T1:2.2,2.3
Understands the security depends on location of encryption devices
7 CLO3 T1:2.5
in network
8 Discuss various public and private cryptography encryption and CLO 4 T1: 3.1
decryption, key size.

Page | 7
Discuss various symmetric cryptography encryption and decryption CLO5 T1: 3.2-3.5,
9-11
algorithms 5.1,5.2, 6.1.
Demonstrate the various asymmetric cryptography encryption and CLO6 T1:
12-14 decryption algorithms 9.1,9.2,10.
1, 10.4
Demonstrate various security aspects of block ciphers for entering CLO7 T1:6.2
15
into secure network
16 Discuss various security aspects of stream ciphers for entering into CLO8 T1:6.3
Course
Lecture Topics to be covered Learning
Reference
No Outcomes
(CLOs)
secure network
Understand RSA algorithm encryption and decryption with CLO10 T1: 9.1,9.2
17
examples.
T1:
18 Illustrate elliptic curve cryptography with examples. CLO9
10.2,10.3
CLO 11 T1:11.1-
19-21 Understand various methods of message authentication algorithms
11.3
CLO12 T1:13.1-
22 Discuss the importance of digital signature for data transmission.
13.3
T1:11.4,11
23-24 Demonstrate various techniques of hash function with examples. CLO 13 .5
25-26 CLO 14 T1:12.1-
Discuss the importance of different hash algorithms
12.4
27-30 Understand PGP functionality and its importance. CLO 15 T1:15.1
31-33 Understand S/MIME functionality and its importance. CLO 15 T1:15.2
CLO 16 T1:16.1-
34-36 Discuss how devices are managed on IP network.
16.5
Demonstrate how SSL and TLS provides security in World Wide T1:17.1-
37-39 CLO 17
Web 17.3
CLO 20 T1:20.1-
40-41 Understand various types of firewalls and its importance. 20.2
CLO19 T1:19.1-
42-43 Understand various types of viruses and its vulnerabilities.
19.4
Discuss different Inter branch payment transactions cross site CLO 18 T1:18.1-
44-45
scripting. 18.3

XVIII. GAPS IN THE SYLLABUS - TO MEET INDUSTRY / PROFESSION REQUIREMENTS:


S No Description Proposed Relevance with Relevance with
actions POs PSOs
1 Security mechanisms implementation Work Shops/ PO2, PO3 PSO1, PSO2
on real world problems Guest Lectures
/ NPTEL/
Laboratory
Practices
2 Working Process of intrusion Work Shops/ PO1, PO3, PO5 PSO2, PSO2
detection and avoidance Laboratory
Practices
3 Laboratory practice on IP security for Work Shops/ PO1, PO2, PSO1, PSO2
providing security to IP network. Laboratory PO3, PO4
Practices/
Guest Lectures

Prepared by:
Mr. B.Ramji, Sr.Assistant Professor in CSE

Page | 8
HOD, CSE

Page | 9

You might also like