0% found this document useful (0 votes)
93 views29 pages

Information Security System Notes

Uploaded by

xerim26570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views29 pages

Information Security System Notes

Uploaded by

xerim26570
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Jaipur Engineering College & Research Centre, Jaipur

Department of Computer Science & Engineering

Information Security System


[6CS4-03]
Notes

Prepared By:

Kanishk Jain
Ashish Ameria

Assistant Prof., CSE


VISION AND MISSION OF INSTITUTE
VISION
To become renowned centre of outcome based learning and work towards academic,
professional, cultural and social enrichments of the lives of individual and communities”

MISSION

M1. Focus on evaluation of learning outcomes and motivate students to inculcate research
aptitude by project based learning.

M2. Identify areas of focus and provide platform to gain knowledge and solutions based on
informed perception of Indian, regional and global needs.

M3. Offer opportunities for interaction between academia and industry.

M4. Develop human potential to its fullest extent so that intellectually capable and
imaginatively gifted leaders can emerge in a range of professions.

VISION AND MISSION OF DEPARTMENT

VISION
To become renowned Centre of excellence in computer science and engineering and make
competent engineers & professionals with high ethical values prepared for lifelong learning.

MISSION

M1: To impart outcome based education for emerging technologies in the field of computer
science and engineering.

M2: To provide opportunities for interaction between academia and industry.

M3: To provide platform for lifelong learning by accepting the change in technologies

M4: To develop aptitude of fulfilling social responsibilities.


COURSE OUTCOMES

On completion of the course, students will be able to:

CO1: Identify different security attacks, Mechanism, classical and modern encryption techniques.

CO2: Apply random number generation, AES and S-box theory and Implement public key
cryptosystem.

CO3: Evaluate message authentication and digital signatures using hash function and IP security.

CO4: Analyze & Implement Water marking technique and strong password protocol in Information
Security System.
PROGRAM OUTCOMES (PO)

1. Engineering knowledge: Apply the knowledge of mathematics, science,


engineering fundamentals, and an engineering specialization to the solution of
complex engineering problems.
2. Problem analysis: Identify, formulate, research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles
of mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems and design system components or processes that meet the specified
needs with appropriate consideration for the public health and safety, and the
cultural, societal, and environmental considerations.
4. Conduct investigations of complex problems: Use research-based knowledge
and research methods including design of experiments, analysis and
interpretation of data, and synthesis of the information to provide valid
conclusions.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources,
and modern engineering and IT tools including prediction and modeling to
complex engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual
knowledge to assess societal, health, safety, legal and cultural issues and the
consequent responsibilities relevant to the professional engineering practice.
7. Environment and sustainability: Understand the impact of the professional
engineering solutions in societal and environmental contexts, and demonstrate
the knowledge of, and need for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and norms of the engineering practice.
9. Individual and team work: Function effectively as an individual, and as a
member or leader in diverse teams, and in multidisciplinary settings.
10. Communication: Communicate effectively on complex engineering activities
with the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make
effective presentations, and give and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding
of the engineering and management principles and apply these to one’s own
work, as a member and leader in a team, to manage projects and in
multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability
to engage in independent and life-long learning in the broadest context of
technological change.
Program Educational Objectives (PEO)

1. To provide students with the fundamentals of Engineering Sciences with more


emphasis in Computer Science & Engineering by way of analyzing and exploiting
Engineering challenge

2. To train students with good scientific and engineering knowledge so as to


comprehend, analyze, design, and create novel products and solutions for the real life
problems.

3. To inculcate professional and ethical attitude, effective communication skills,


teamwork skills, multidisciplinary approach, entrepreneurial thinking and an ability to
relate engineering issues with social issues.

4. To provide students with an academic environment aware of excellence, leadership,


written ethical codes and guidelines, and the self-motivated life-long learning needed
for a successful professional career.

5. To prepare students to excel in Industry and Higher education by Educating Students


along with High moral values and Knowledge.
MAPPING CO-PO

Cos/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 3 3 2 2 1 1 1 1 1 1 1 3

CO2 3 3 3 3 2 1 1 1 1 2 1 3

CO3 3 3 3 3 2 1 1 2 1 2 1 3

CO4 3 3 3 3 2 2 2 2 1 2 1 3

Program Specific Outcome’s (PSO)

PSO1: Ability to interpret and analyze network specific and cyber security issues, automation
in real word environment.

PSO2: Ability to Design and Develop Mobile and Web-based applications under realistic
constraints.
Syllabus
LECTURE PLAN
JAIPUR ENGINEERING COLLEGE AND RESEARCH CENTRE
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
LECTURE PLAN
Subject: Information Security System ( 6CS4-03) Year/Sem: III/ VI
No. of Lecture Reqd./(Avl.) : 30 / 30
Semester Starting: Semester Ending:

Unit
No./
Lect.
Total Topics to be Delivered Lect. No.
Reqd.
Lecture
Reqd.
Unit-1
Objective, Scope , Outcome of the course. 1 1
(1)
Introduction to security attacks 1 2
services and mechanisms 1 3
Unit-2 Classical encryption techniques 1 4
(6) substitution ciphers and transposition ciphers, 1 5
crypt analysis 1 6
Stream and block ciphers 1 7
Modern Block Ciphers: Block ciphers structure 1 8
Data Encryption Standard(DES), Strength of DES 1 9
Unit 3- Design principle of block cipher 1 10
(6) AES with Structure, Key Expansion 1 11
Multiple Encryption and triple DES 1 12
Cipher Block Chaining Mode, Cipher feedback mode, Counter mode 1 13

BC-1 IDEA 64 Bit Encryption & MD5 Message Digest Algorithm 1 14

Public Key Cryptosystems: Requirements 1 15


Public Key Cryptosystems: Analysis 1 16
Unit 4- RSA Cryptosystem 1 17
(6) Rabin Cryptosystem 1 18
Elgamal Cryptosystem 1 19
Elliptic Curve Cryptosystem 1 20
Cryptographic Hash Functions, Hash Function based on Cipher Block Chaining 1 21
Secure Hash Algorithm 1 22
Unit 5-
Message Authentication Code 1 23
(5)
MAC based on Hash Function & Block Cipher 1 24
Digital Signature, Various Digital Signature Schemes, NIST Digital Signature 1 25

BC-2 IP Security with Strong Password Protocols 1 26

Key Management & Distribution, X.509 Certificates 1 27


Unit 6- Remote User Authentication 1 28
(4) Web Security Threats, SSL Architecture 1 29
Transport Layer Security, HTTPs & SSH 1 30
References:
1) Stalling Williams: Cryptography and Network Security: Principles and Practices, 4th Edition, Pearson Education
2) Trappe & Washington, Introduction to Cryptography, 2nd Ed. Pearson.
3) Kaufman Charlie [Link]; Network Security: Private Communication in a Public World, 2nd Ed., PHI/Pearson

You might also like