|
Objectives:
To provide students with knowledge of basic concepts of computer security including network
security and cryptography.
Expected Learning Outcomes:
Understand the principles and practices of cryptographic techniques. Understand a variety of
generic security threats and vulnerabilities, and identify & analyze particular security problems
for a given application. Understand various protocols for network security to protect against the
threats in a network
Unit I
Introduction: Security Trends, The OSI Security Architecture, Security
Attacks, Security Services, Security Mechanisms
Classical Encryption Techniques: Symmetric Cipher Model, Substitution
Techniques, Transposition Techniques, Steganography, Block Cipher
Principles, The Data Encryption Standard, The Strength of DES, AES (round
details not expected), Multiple Encryption and Triple DES, Block Cipher
Modes of Operation, Stream Ciphers
Public-Key Cryptography and RSA: Principles of Public-Key
Cryptosystems, The RSA Algorithm
15L
Unit II
Key Management: Public-Key Cryptosystems, Key Management,
Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, Message Authentication Codes, Hash Functions,
Security of Hash Functions and Macs, Secure Hash Algorithm, HMAC
Digital Signatures and Authentication: Digital Signatures, Authentication
Protocols, Digital Signature Standard
Authentication Applications: Kerberos, X.509 Authentication, Public-Key
Infrastructure
15L
Unit III
Electronic Mail Security: Pretty Good Privacy, S/MIME
IP Security: Overview, Architecture, Authentication Header, Encapsulating
Security Payload, Combining Security Associations, Key Management
Web Security: Web Security Considerations, Secure Socket Layer and
Transport Layer Security, Secure Electronic Transaction
Intrusion: Intruders, Intrusion Techniques, Intrusion Detection
Malicious Software: Viruses and Related Threats, Virus Countermeasures,
DDOS
Firewalls: Firewall Design Principles, Types of Firewalls
15L
Textbook(s):
1) Cryptography and Network Security: Principles and Practice 5th Edition, William
Stallings, Pearson,2010
Additional Reference(s):
1) Cryptography and Network Security, Atul Kahate, Tata McGraw-Hill, 2013.
2) Cryptography and Network, Behrouz A Fourouzan, Debdeep Mukhopadhyay, 2
nd
Edition,TMH,2011