1 Chapter
1 Chapter
Practical
PR1 Practical of Elective-I 100 2 6
PR2 Practical of Elective-II 100 2 6
PR3 Project Implementation 50 1 3
PR4 Practical of Skill Enhancement 50 1 3
EII-I
Information and Network Security
• Objectives:
• To provide students with knowledge of basic concepts of
computer security including network security and
cryptography.
• Expected Learning Outcomes:
• Understand the principles and practices of cryptographic
techniques. Understand a variety of generic security
threats and vulnerabilities, and identify & analyze
particular security problems for a given application.
Understand various protocols for network security to
protect against thethreats in a network
Syllabus
Introduction: Security Trends, The OSI Security Architecture, Security
Attacks, Security Services, Security Mechanisms
Classical Encryption Techniques: Symmetric Cipher Model, Substitution
Unit I Techniques, Transposition Techniques, Steganography, Block Cipher 15L
Principles, The Data Encryption Standard, The Strength of DES, AES
(round details not expected), Multiple Encryption and Triple DES, Block
Cipher Modes of Operation, Stream Ciphers
Public-Key Cryptography and RSA: Principles of Public-Key
Cryptosystems, The RSA Algorithm
Key Management: Public-Key Cryptosystems, Key Management, Diffie-Hellman
Key Exchange
Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, Message Authentication Codes, Hash Functions,
Unit II
Security of Hash Functions and Macs, Secure Hash Algorithm, HMAC
Digital Signatures and Authentication: Digital Signatures, Authentication
Protocols, Digital Signature Standard
Authentication Applications: Kerberos, X.509 Authentication, Public-Key
Infrastructure
◆ Security attacks are classified as either passive attacks, which include unauthorized reading of
a message of file and traffic analysis or active attacks, such as modification of messages or files,
◆ A security mechanism is any process (or a device incorporating such a process) that is designed
protocols.
◆ Security services include authentication, access control, data confidentiality, data integrity,
Fabricate message
3. Replay involves the passive
capture of a data unit and its
subsequent retransmission to
produce an unauthorized effect
Active Attack: Replay
4. The denial of service prevents or inhibits
the normal use or management of
communications facilities.
This attack may have a specific target;
For example, an entity may suppress all
messages directed to a particular
destination
Active Attack: denial of service