Csi ZG513 Course Handout
Csi ZG513 Course Handout
Course Objectives:
No Course Objective
Information security is an important area of
information technology and this course on
Network Security help audience to
understand the three important security
CO1
goals in the networks - Confidentiality,
Integrity and Availability and cryptographic
techniques to implement these security
goals.
The course provides a top down approach to
explore the security implementations in
CO2
different network layers - application,
transport and network.
The course provides a necessary review of
mathematical concepts to implement
different cryptographic techniques to
achieve the network security goals and then
CO3
provides a deeper dive to the field of
cryptography - symmetric and asymmetric
key cryptography and methods to
implement them.
The course consolidates and sums up the
learning taking few case studies and
CO4
examples from latest trends and industry
deployments.
Text Book(s):
Stallings William: Cryptography and
T1 Network Security - Principles and Practice,
Pearson India, 6th Edition, 2014.
Content Structure
M1: Introduction
Type Description
RL1.1.1 = Introduction - Information Security
Objectives
RL1.1
RL1.1.2 = Standardization in Information
Security & OSI Security Architecture
RL1.2.1 = Security Attacks
RL1.2 RL1.2.2 = Security Mechanisms
RL1.2.3 = Security Services
RL1.3.1 = Reference Model for Network
Security
RL1.3
RL1.3.2 = Techniques to Implement Network
Security - An Introduction
Learning Outcomes:
No Learning Outcomes
Knowledge to visualize the security goals
LO1
clearly in the networks.
Knowledge of mathematical background
LO2 and different cryptographic techniques to
provides security in the networks.
Ability to compare merits and demerits of
LO3 different Cryptographic techniques and take
decisions while securing a network.
Ability to analyze a network for security
LO4
flaws and fool proofing.
Glossary of Terms
• Contact Hour (CH) stands for a hour long live session with students conducted either
in a physical classroom or enabled through technology. In this model of instruction,
instructor led sessions will be for 22 CH.
• Pre CH = Self Learning done prior to a given contact hour
• During CH = Content to be discussed during the contact hour by the course
instructor
• Post CH = Self Learning done post the contact hour
• Contact Hour (CS) stands for a two-hour long live session with students conducted
either in a physical classroom or enabled through technology. In this model of
instruction, instructor led sessions will be for 11 CS.
• Pre CS = Self Learning done prior to a given contact session
• During CS = Content to be discussed during the contact session by the course
instructor
• Post CS = Self Learning done post the contact session
• RL stands for Recorded Lecture or Recorded Lesson. It is presented to the student
through an online portal. A given RL unfolds as a sequences of video segments
interleaved with exercises
• SS stands for Self-Study to be done as a study of relevant sections from textbooks and
reference books. It could also include study of external resources.
• LE stands for Lab Exercises
• HW stands for Home Work.
• M stands for module. Module is a standalone quantum of designed content. A typical
course is delivered using a string of modules. M2 means module 2.
Detailed Structure
Introductory Video/Document: << Introducing the faculty, overview of the course,
structure and organization of topics, guidance for navigating the content, and expectations
from students>>
Contact Hour 1
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security and
OSI Security
Architecture
• Review of
During CH CH-1 Attacks,
Mechanisms
and Services,
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security and
OSI Security
Architecture
• Review of
During CH CH-1 Attacks,
Mechanisms
and Services,
Network
Security
Model
Post-CH Uses of Wireshark
Lab Reference
Contact Hour 2
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security
Model
During CH CH-2 • Techniques
to Implement
Network
Security
Post-CH Uses of Wireshark
Lab Reference
Contact Hour 3
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-5
•
Cryptograph
y, Classical
During CH CH-3 Encryption
• Breaking the
Cryptosyste
m
Review the Simple
Post-CH attack to break the
cryptosystem
Lab Reference
Contact Hour 4
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Modular
Arithmetic,
Groups and
Rings
• One example
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Modular
Arithmetic,
Groups and
Rings
• One example
During CH CH-4 each in
classical
substitutive
and
transposition
ciphering.
Caesar/Affine
Post-CH Cipher –Worksheet
and Lab Program
Lab Reference
Contact Hour 5
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-8
• Random
numbers, its
types and
usage.
During CH CH-5 • TRNG,
PRNG,
CSPRNG
• Review of
BBS
Find out more on
Post-CH Intel processors that
include True RNG
Lab Reference
Contact Hour 6
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-8
• Stream
Ciphering
• RC4
During CH CH-6 algorithm
• Basic
Number
Theory
Stream Cipher -
Post-CH RC4 Lab Program –
Worksheet.
Lab Reference
• RC4
During CH CH-6 algorithm
• Basic
Number
Theory
Stream Cipher -
Post-CH RC4 Lab Program –
Worksheet.
Lab Reference
Contact Hour 7
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Extended
Euclidean
During CH CH-7
Algorithm
• Galois Field
Relevance of
Post-CH Extended Euclidean
Algorithm
Lab Reference
Contact Hour 8
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Polynomial
Arithmetic
During CH CH-8
• Block
Ciphers
Example of
Post-CH Polynomial
Arithmetic
Lab Reference
Contact Hour 9
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-7
• Confusion
and
Diffusion
During CH CH-9 Theory
• AES and its
importance
in security
Understand the
Post-CH algebra of AES e.g.
finding inverse etc.
Lab Reference
Contact Hour 10
Time Type Description Content Reference
Pre-CH
• Efficient
implementati
on of AES.
During CH CH-10 • Modes of
Operation
and its
applications
Implementation of
Post-CH
AES
Lab Reference
Contact Hour 12
Time Type Description Content Reference
Pre-CH
• SHA-1 and
SHA-3
• HMAC and
During CH CH-12
CBC-MAC
and its
Security
Modes of
Post-CH Operations
Implementation
Lab Reference
Contact Hour 13
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-11
• Model of
Asymmetric
Key
Cryptograph
y
During CH CH-13 • Factorization
and other
methods for
Public Key
Cryptograph
y
CBC-MAC
Post-CH
implementation
Lab Reference
and other
methods for
Public Key
Cryptograph
y
CBC-MAC
Post-CH
implementation
Lab Reference
Contact Hour 14
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-9, 10
• RSA and
OAEP
• Diffe-
Hellman Key
During CH CH-14
Exchange
and its
Security
Aspects
Generation of Large
Post-CH
Prime Numbers
Lab Reference
Contact Hour 15
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-9, 10
• Distribution
of
Symmetric
and
During CH CH-15 Asymmetric
Key
• Digital
Signature:
DSA
Post-CH RSA Lab Programs
Lab Reference
Contact Hour 16
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-12, 13
• X.509
Certificate
During CH CH-16 • Man-in-the
Middle
Attack
Check a digital
certificate while
accessing a secure
Post-CH
website and
compare its structure
with X.509 standard
• X.509
Certificate
During CH CH-16 • Man-in-the
Middle
Attack
Check a digital
certificate while
accessing a secure
Post-CH
website and
compare its structure
with X.509 standard
Lab Reference
Contact Hour 17
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-12, 13
• User/Entity
Authenticati
During CH CH-17
on
• Kerberos
Authentication with
Post-CH
Digital Certificate
Lab Reference
Contact Hour 18
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-2
• Review of
PGP -
Authenticati
on and
Confidentiali
ty.
During CH CH-18
• Review of
MIME and
S/MIME
with a short
review of
SMTP.
S/MIME in MS-
Post-CH
Outlook - worksheet
Lab Reference
Contact Hour 19
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• Review of
Web
Security.
During CH CH-19
• Review of
SSL and
TLS.
SSL Protocol
Analysis using
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• Review of
Web
Security.
During CH CH-19
• Review of
SSL and
TLS.
SSL Protocol
Analysis using
Post-CH
Wireshark -
worksheet.
Lab Reference
Contact Hour 20
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• IPSec:
Authenticati
on Header
and
Encapsulated
Security
During CH CH-20 Payload.
• SAD and
SPD with
inbound/
outbound
packet
processing.
SSH Channel Types
- Experimentation
Post-CH
using PuTTY and
XMing - worksheet
Lab Reference
Contact Hour 21
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-4
• Malicious
Software and
its Detection
Techniques.
During CH CH-21
• Review of
Intrusion and
Intrusion
Detection.
IPSec with
Post-CH Wireshark -
Worksheet.
Lab Reference
Techniques.
During CH CH-21
• Review of
Intrusion and
Intrusion
Detection.
IPSec with
Post-CH Wireshark -
Worksheet.
Lab Reference
Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
Day, Date,
No Name Type Duration Weight Session,
Time
Quiz-I/ February
EC-1 Online - 5% 14-24, 2022
Assignment-I
March 14-24,
Quiz-II Online - 5% 2022
April 14-24,
Quiz-III Online - 5%
2022
Friday,
Mid- 11/03/2022
EC-2 Semester Open Book 2 hours 35% (FN)
Test 10 AM - 12
Noon
Friday,
20/05/2022
Comprehensi
EC-3 Open Book 2 hours 50% (FN)
ve Exam
10 AM - 12
Noon
Note - Evaluation components can be tailored depending on the proposed model.
Important Information:
Syllabus for Mid-Semester Test (Open Book): Topics in CS 1-11.
Syllabus for Comprehensive Exam (Open Book): All topics given in plan of study
Evaluation Guidelines:
• For Closed Book tests: No books or reference material of any kind will be permitted. Laptops/
Mobiles of any kind are not allowed. Exchange of any material is not allowed.
• For Open Book exams: Use of prescribed and reference text books, in original (not
photocopies) is permitted. Class notes/slides as reference material in filed or bound form is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted
in all exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not
allowed.
• If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the
student should follow the procedure to apply for the Make-Up Test/Exam. The genuineness of
the reason for absence in the Regular Exam shall be assessed prior to giving permission to
appear for the Make-up Exam. Make-Up Test/Exam will be conducted only at selected exam
centres on the dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self-study
schedule as given in the course handout, attend the lectures, and take all the prescribed evaluation
components such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the
evaluation scheme provided in the handout.
Appendix
Course Plan