BSc CS sem 5 Information and Network Security techmax/notes download





Objectives: To provide students with knowledge of basic concepts of computer security including network security and cryptography. Expected Learning Outcomes: Understand the principles and practices of cryptographic techniques. Understand a variety of generic security threats and vulnerabilities, and identify & analyze particular security problems for a given application. Understand various protocols for network security to protect against the threats in a network Unit I Introduction: Security Trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography, Block Cipher Principles, The Data Encryption Standard, The Strength of DES, AES (round details not expected), Multiple Encryption and Triple DES, Block Cipher Modes of Operation, Stream Ciphers Public-Key Cryptography and RSA: Principles of Public-Key Cryptosystems, The RSA Algorithm 15L Unit II Key Management: Public-Key Cryptosystems, Key Management, Diffie-Hellman Key Exchange Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions, Security of Hash Functions and Macs, Secure Hash Algorithm, HMAC Digital Signatures and Authentication: Digital Signatures, Authentication Protocols, Digital Signature Standard Authentication Applications: Kerberos, X.509 Authentication, Public-Key Infrastructure 15L Unit III Electronic Mail Security: Pretty Good Privacy, S/MIME IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Key Management Web Security: Web Security Considerations, Secure Socket Layer and Transport Layer Security, Secure Electronic Transaction Intrusion: Intruders, Intrusion Techniques, Intrusion Detection Malicious Software: Viruses and Related Threats, Virus Countermeasures, DDOS Firewalls: Firewall Design Principles, Types of Firewalls 15L Textbook(s): 1) Cryptography and Network Security: Principles and Practice 5th Edition, William Stallings, Pearson,2010 Additional Reference(s): 1) Cryptography and Network Security, Atul Kahate, Tata McGraw-Hill, 2013. 2) Cryptography and Network, Behrouz A Fourouzan, Debdeep Mukhopadhyay, 2 nd Edition,TMH,2011