0% found this document useful (0 votes)
62 views

Csi ZG513 Course Handout

This document provides a course handout for the Network Security course. It includes: - The course title, number, credit units, and author. - 4 course objectives focusing on network security goals, security implementations in different network layers, cryptography techniques, and case studies. - A list of the primary textbook and 4 reference books/resources. - An outline of the course content structure organized into 8 modules covering topics like classical encryption techniques, symmetric/asymmetric key cryptography, block/stream ciphers, data integrity, and more. Each module lists the relevant reading lists and descriptions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Csi ZG513 Course Handout

This document provides a course handout for the Network Security course. It includes: - The course title, number, credit units, and author. - 4 course objectives focusing on network security goals, security implementations in different network layers, cryptography techniques, and case studies. - A list of the primary textbook and 4 reference books/resources. - An outline of the course content structure organized into 8 modules covering topics like classical encryption techniques, symmetric/asymmetric key cryptography, block/stream ciphers, data integrity, and more. Each module lists the relevant reading lists and descriptions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI

WORK INTEGRATED LEARNING PROGRAMMES


COURSE HANDOUT

Part A: Content Design

Course Title Network Security


Course No(s) CSI ZG513 / ES ZG513 / SS ZG513
4 (1: Class Room Hours; 2: Students
Preparation; 1: Lab Work/Case Studies)
Credit Units
(1 credit unit translates to approximately
32 hours)
Course Author SANJAY K. SAHAY

Course Objectives:
No Course Objective
Information security is an important area of
information technology and this course on
Network Security help audience to
understand the three important security
CO1
goals in the networks - Confidentiality,
Integrity and Availability and cryptographic
techniques to implement these security
goals.
The course provides a top down approach to
explore the security implementations in
CO2
different network layers - application,
transport and network.
The course provides a necessary review of
mathematical concepts to implement
different cryptographic techniques to
achieve the network security goals and then
CO3
provides a deeper dive to the field of
cryptography - symmetric and asymmetric
key cryptography and methods to
implement them.
The course consolidates and sums up the
learning taking few case studies and
CO4
examples from latest trends and industry
deployments.

Text Book(s):
Stallings William: Cryptography and
T1 Network Security - Principles and Practice,
Pearson India, 6th Edition, 2014.

Reference Books & other resources:


Christof Paar and Jaan Pelzl,
Understanding Cryptography: A
R1 Textbook for Student and
Practitioner Springer, 1st Edition,
2010
Forouzan B. A, Mukhopadhyay
Debdeep: Cryptography and
R2 Network Security, McGraw Hill,
nd
2 Edition, 2010
Schneier Bruce, Applied
Cryptography: Protocols,
R3 Algorithms and Source Code in C,
Wiley India, 2nd Edition, Reprint,
2013
Kurose James F and Keith W. Ross:
Computer Networking – A Top-
R4
Down Approach, Pearson India, 5th
Edition, 2012

Content Structure

M1: Introduction
Type Description
RL1.1.1 = Introduction - Information Security
Objectives
RL1.1
RL1.1.2 = Standardization in Information
Security & OSI Security Architecture
RL1.2.1 = Security Attacks
RL1.2 RL1.2.2 = Security Mechanisms
RL1.2.3 = Security Services
RL1.3.1 = Reference Model for Network
Security
RL1.3
RL1.3.2 = Techniques to Implement Network
Security - An Introduction

M2: Classical Encryption Techniques


Type Description/Plan/Reference
RL5.1.1 = Classical Encryption Techniques -
Introduction
RL5.1
RL5.1.2 = Cryptanalytic Attacks and Security
Criteria
RL5.2.1 = Caesar Cipher - A classical
substitution encryption technique
RL5.2.4 = Playfair Cipher
RL5.2.5 = Polyalphabetic Ciphers - Vigenère
RL5.2
Cipher
RL5.2.6 = Vernam and One Time Pad Ciphers
RL5.2.7 = Comparison of Classical Substitution
Encryption Techniques
RL5.3 RL5.3.1 = Transposition Encryption Technique
Type Description/Plan/Reference
RL5.1.1 = Classical Encryption Techniques -
Introduction
RL5.1
RL5.1.2 = Cryptanalytic Attacks and Security
Criteria
RL5.2.1 = Caesar Cipher - A classical
substitution encryption technique
RL5.2.4 = Playfair Cipher
RL5.2.5 = Polyalphabetic Ciphers - Vigenère
RL5.2
Cipher
RL5.2.6 = Vernam and One Time Pad Ciphers
RL5.2.7 = Comparison of Classical Substitution
Encryption Techniques
RL5.3 RL5.3.1 = Transposition Encryption Technique

M3: Mathematics for Symmetric Key Cryptography


Type Description/Plan/Reference
RL6.1.1 = Basic Number Theory
RL6.1 RL6.1.2 = GCD and Euclidean's Theorem
RL6.1.3 = Matrix Mathematics

M4: Block Ciphering Techniques


Type Description/Plan/Reference
RL7.1.1 = Block Ciphering
RL7.1.2 = Shannon's Confusion and Diffusion
RL7.1
Theory
RL7.1.3 = Feistel Cipher Structure
RL7.2 RL7.2.1 = Data Encryption Standard (DES)

M5: Pseudo Random Number (PRN) Generation and Stream Ciphering


Type Description/Plan/Reference
RL8.1.1 = Pseudo Random Number Generation
RL8.1
(PRN)
RL8.2.1 = Introduction to Stream Ciphering
RL8.2
RL8.2.2 = Example of Stream Ciphering - RC4
RL8.3 RL8.3.1 = True Random Number Generation

M6: Mathematics for Asymmetric Key Cryptography


Type Description/Plan/Reference
RL9.1.1 = Fermat's Theorem
RL9.1 RL9.1.2 = Euler's Theorem
RL9.1.3 = Primitive Roots

M7: Asymmetric (Public) Key Cryptography


Type Description/Plan/Reference
RL10.1.1 = Reference Model for
RL10.1
Asymmetric (Public) Key Cryptography
RL10.2.1 = Public Key Cryptosystems - RSA
RL10.2.2 = Public Key Cryptosystems -
RL10.2 ElGamal and
RL10.2.3 = Diffie-Hellman Key Exchange
Algorithm

M8: Data Integrity


Type Description/Plan/Reference
RL11.1 RL11.1.1 = Hash Functions and Properties
RL11.2.1 = Secure Hash Algorithms (SHA)
RL11.2 RL11.2.3 = Message Authentication Codes
(MAC)
Type Description/Plan/Reference
RL11.1 RL11.1.1 = Hash Functions and Properties
RL11.2.1 = Secure Hash Algorithms (SHA)
RL11.2 RL11.2.3 = Message Authentication Codes
(MAC)

M9: Mutual Trust - Key Management


Type Description/Plan/Reference
RL12.1 RL12.1.1 = Distribution of Symmetric Key
RL12.2.1 = Distribution of Asymmetric (Public)
Keys
RL12.2 RL12.2.2 = Basic Concept of Public Key
Certificates
RL12.2.3 = X.509 Certificate Structure

M10: User Authentication and Digital Signatures


Type Description/Plan/Reference
RL13.1.1 = Problem Statement of User
RL13.1 Authentication
RL13.1.2 = Kerberos-4.0 with details
RL13.2.1 = Basic Concept of Digital
RL13.2
Signatures with one algorithm example

M11: Security at the Application Layer


Type Description/Plan/Reference
RL2.1.1 = Overview - Layered Architecture in
the service model and Networking Layers
RL2.1
RL2.1.2 = Security at the application layers -
objectives, issues and need.
RL2.2 RL2.2.1 = E-Mail System Architecture
RL2.3.1 = Introduction to PGP
RL2.3.2 = Integrity services through PGP
RL2.3 RL2.3.3 = Confidentiality services through PGP
RL2.3.4 = Brief discussion on the
Cryptographic Algorithms used in PGP
RL2.4.1 = Introduction to MIME and MIME
RL2.4
Headers
RL2.5.1 = Introduction to S/MIME
RL2.5.2 = Security Services through S/MIME
RL2.5
RL2.5.3 = Brief discussion on the Certificates
and Cryptographic Algorithms in S/MIME

M12: Security at the Transport Layer


Type Description/Plan/Reference
RL3.1.1 = Web Security - threats, challenges
RL3.1
and solutions.
RL3.2.1 = Secure Socket Layer (SSL):
Introduction
RL3.2.2 = Secure Socket Layer (SSL):
Handshake Protocol
RL3.2.3 = Secure Socket Layer (SSL): Change
RL3.2
Cipher Spec Protocol
RL3.2.4 = Secure Socket Layer (SSL): Alert
Protocol
RL3.2.5 = Secure Socket Layer (SSL): Record
Protocol
RL3.3.1 = Secure Shell (SSH) Protocol for
RL3.3
Secure Remote Login
RL3.2.3 = Secure Socket Layer (SSL): Change
RL3.2
Cipher Spec Protocol
RL3.2.4 = Secure Socket Layer (SSL): Alert
Protocol
RL3.2.5 = Secure Socket Layer (SSL): Record
Protocol
RL3.3.1 = Secure Shell (SSH) Protocol for
RL3.3
Secure Remote Login

M13: Security at the Network Layer


Type Description/Plan/Reference
RL4.1.1 = Security Challenges at the Network
RL4.1 Layer
RL4.1.2 = IP Security (IPSec) Overview
RL4.2.1 = IP Security - Different Variations
RL4.2.2 = IP Security Architecture
RL4.2
RL4.2.3 = Security Policy - IP Security Packer
Processing

Learning Outcomes:
No Learning Outcomes
Knowledge to visualize the security goals
LO1
clearly in the networks.
Knowledge of mathematical background
LO2 and different cryptographic techniques to
provides security in the networks.
Ability to compare merits and demerits of
LO3 different Cryptographic techniques and take
decisions while securing a network.
Ability to analyze a network for security
LO4
flaws and fool proofing.

Part B: Contact Session Plan

Academic Term Second Semester 2021-2022


Course Title Network Security
Course No CSI ZG513 / ES ZG513 / SS ZG513
Lead Instructor Hemant

Glossary of Terms
• Contact Hour (CH) stands for a hour long live session with students conducted either
in a physical classroom or enabled through technology. In this model of instruction,
instructor led sessions will be for 22 CH.
• Pre CH = Self Learning done prior to a given contact hour
• During CH = Content to be discussed during the contact hour by the course
instructor
• Post CH = Self Learning done post the contact hour
• Contact Hour (CS) stands for a two-hour long live session with students conducted
either in a physical classroom or enabled through technology. In this model of
instruction, instructor led sessions will be for 11 CS.
• Pre CS = Self Learning done prior to a given contact session
• During CS = Content to be discussed during the contact session by the course
instructor
• Post CS = Self Learning done post the contact session
• RL stands for Recorded Lecture or Recorded Lesson. It is presented to the student
through an online portal. A given RL unfolds as a sequences of video segments
interleaved with exercises
• SS stands for Self-Study to be done as a study of relevant sections from textbooks and
reference books. It could also include study of external resources.
• LE stands for Lab Exercises
• HW stands for Home Work.
• M stands for module. Module is a standalone quantum of designed content. A typical
course is delivered using a string of modules. M2 means module 2.

Teaching Methodology (Flipped Learning Model)


The pedagogy for this course is centered around flipped learning model in which the
traditional class-room instruction is replaced with recorded lectures to be watched at home as
per the student’s convenience and the erstwhile home-working or tutorials become the focus
of classroom contact sessions. Students are expected to finish the home works on time.
Contact Session Plan
• Each Module (M#) covers an independent topic and module may encompass more
than one Recorded Lecture (RL).
• Contact Sessions (2hrs each week) are scheduled alternate weeks after the student
watches all Recorded Lectures (RLs) of the specified Modules (listed below) during
the previous week
• In the flipped learning model, Contact Sessions are meant for in-classroom
discussions on cases, tutorials/exercises or responding to student’s questions/
clarification--- may encompass more than one Module/RLs/CS topic.
• Contact Session topics listed in course structure (numbered CSx.y) may cover several
RLs; and as per the pace of instructor/students’ learning, the instructor may take up
more than one CS topic during each of the below sessions.

Detailed Structure
Introductory Video/Document: << Introducing the faculty, overview of the course,
structure and organization of topics, guidance for navigating the content, and expectations
from students>>

• Each of the sub-modules of Recorded Lectures (RLx.y ) shall delivered via 30 –


60mins videos followed by:
• Contact session (CSx.y) of 2Hr each for illustrating the concepts discussed in the
videos with exercises, tutorials and discussion on case-problems (wherever
appropriate); contact sessions (CS) may cover more than one recorded-lecture (RL)
videos.
Course Contents

Contact Hour 1
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security and
OSI Security
Architecture
• Review of
During CH CH-1 Attacks,
Mechanisms
and Services,
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security and
OSI Security
Architecture
• Review of
During CH CH-1 Attacks,
Mechanisms
and Services,
Network
Security
Model
Post-CH Uses of Wireshark
Lab Reference

Contact Hour 2
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-1
• Network
Security
Model
During CH CH-2 • Techniques
to Implement
Network
Security
Post-CH Uses of Wireshark
Lab Reference

Contact Hour 3
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-5

Cryptograph
y, Classical
During CH CH-3 Encryption
• Breaking the
Cryptosyste
m
Review the Simple
Post-CH attack to break the
cryptosystem
Lab Reference

Contact Hour 4
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Modular
Arithmetic,
Groups and
Rings
• One example
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Modular
Arithmetic,
Groups and
Rings
• One example
During CH CH-4 each in
classical
substitutive
and
transposition
ciphering.
Caesar/Affine
Post-CH Cipher –Worksheet
and Lab Program
Lab Reference

Contact Hour 5
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-8
• Random
numbers, its
types and
usage.
During CH CH-5 • TRNG,
PRNG,
CSPRNG
• Review of
BBS
Find out more on
Post-CH Intel processors that
include True RNG
Lab Reference

Contact Hour 6
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-8
• Stream
Ciphering
• RC4
During CH CH-6 algorithm
• Basic
Number
Theory
Stream Cipher -
Post-CH RC4 Lab Program –
Worksheet.
Lab Reference
• RC4
During CH CH-6 algorithm
• Basic
Number
Theory
Stream Cipher -
Post-CH RC4 Lab Program –
Worksheet.
Lab Reference

Contact Hour 7
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Extended
Euclidean
During CH CH-7
Algorithm
• Galois Field
Relevance of
Post-CH Extended Euclidean
Algorithm
Lab Reference

Contact Hour 8
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-6
• Polynomial
Arithmetic
During CH CH-8
• Block
Ciphers
Example of
Post-CH Polynomial
Arithmetic
Lab Reference

Contact Hour 9
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-7
• Confusion
and
Diffusion
During CH CH-9 Theory
• AES and its
importance
in security
Understand the
Post-CH algebra of AES e.g.
finding inverse etc.
Lab Reference
Contact Hour 10
Time Type Description Content Reference
Pre-CH
• Efficient
implementati
on of AES.
During CH CH-10 • Modes of
Operation
and its
applications
Implementation of
Post-CH
AES
Lab Reference

Contact Hour 11: Review

Contact Hour 12
Time Type Description Content Reference
Pre-CH
• SHA-1 and
SHA-3
• HMAC and
During CH CH-12
CBC-MAC
and its
Security
Modes of
Post-CH Operations
Implementation
Lab Reference

Contact Hour 13
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-11
• Model of
Asymmetric
Key
Cryptograph
y
During CH CH-13 • Factorization
and other
methods for
Public Key
Cryptograph
y
CBC-MAC
Post-CH
implementation
Lab Reference
and other
methods for
Public Key
Cryptograph
y
CBC-MAC
Post-CH
implementation
Lab Reference

Contact Hour 14
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-9, 10
• RSA and
OAEP
• Diffe-
Hellman Key
During CH CH-14
Exchange
and its
Security
Aspects
Generation of Large
Post-CH
Prime Numbers
Lab Reference

Contact Hour 15
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-9, 10
• Distribution
of
Symmetric
and
During CH CH-15 Asymmetric
Key
• Digital
Signature:
DSA
Post-CH RSA Lab Programs
Lab Reference

Contact Hour 16
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-12, 13
• X.509
Certificate
During CH CH-16 • Man-in-the
Middle
Attack
Check a digital
certificate while
accessing a secure
Post-CH
website and
compare its structure
with X.509 standard
• X.509
Certificate
During CH CH-16 • Man-in-the
Middle
Attack
Check a digital
certificate while
accessing a secure
Post-CH
website and
compare its structure
with X.509 standard
Lab Reference

Contact Hour 17
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-12, 13
• User/Entity
Authenticati
During CH CH-17
on
• Kerberos
Authentication with
Post-CH
Digital Certificate
Lab Reference

Contact Hour 18
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-2
• Review of
PGP -
Authenticati
on and
Confidentiali
ty.
During CH CH-18
• Review of
MIME and
S/MIME
with a short
review of
SMTP.
S/MIME in MS-
Post-CH
Outlook - worksheet
Lab Reference

Contact Hour 19
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• Review of
Web
Security.
During CH CH-19
• Review of
SSL and
TLS.
SSL Protocol
Analysis using
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• Review of
Web
Security.
During CH CH-19
• Review of
SSL and
TLS.
SSL Protocol
Analysis using
Post-CH
Wireshark -
worksheet.
Lab Reference

Contact Hour 20
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-3
• IPSec:
Authenticati
on Header
and
Encapsulated
Security
During CH CH-20 Payload.
• SAD and
SPD with
inbound/
outbound
packet
processing.
SSH Channel Types
- Experimentation
Post-CH
using PuTTY and
XMing - worksheet
Lab Reference

Contact Hour 21
Time Type Description Content Reference
Recorded Lectures
Pre-CH
for Module-4
• Malicious
Software and
its Detection
Techniques.
During CH CH-21
• Review of
Intrusion and
Intrusion
Detection.
IPSec with
Post-CH Wireshark -
Worksheet.
Lab Reference
Techniques.
During CH CH-21
• Review of
Intrusion and
Intrusion
Detection.
IPSec with
Post-CH Wireshark -
Worksheet.
Lab Reference

Contact Hour 22: Review

Refer Appendix for detailed Course Plan

Evaluation Scheme:
Legend: EC = Evaluation Component; AN = After Noon Session; FN = Fore Noon Session
Day, Date,
No Name Type Duration Weight Session,
Time
Quiz-I/ February
EC-1 Online - 5% 14-24, 2022
Assignment-I
March 14-24,
Quiz-II Online - 5% 2022
April 14-24,
Quiz-III Online - 5%
2022
Friday,
Mid- 11/03/2022
EC-2 Semester Open Book 2 hours 35% (FN)
Test 10 AM - 12
Noon
Friday,
20/05/2022
Comprehensi
EC-3 Open Book 2 hours 50% (FN)
ve Exam
10 AM - 12
Noon
Note - Evaluation components can be tailored depending on the proposed model.
Important Information:
Syllabus for Mid-Semester Test (Open Book): Topics in CS 1-11.
Syllabus for Comprehensive Exam (Open Book): All topics given in plan of study

Evaluation Guidelines:
• For Closed Book tests: No books or reference material of any kind will be permitted. Laptops/
Mobiles of any kind are not allowed. Exchange of any material is not allowed.
• For Open Book exams: Use of prescribed and reference text books, in original (not
photocopies) is permitted. Class notes/slides as reference material in filed or bound form is
permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted
in all exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not
allowed.
• If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the
student should follow the procedure to apply for the Make-Up Test/Exam. The genuineness of
the reason for absence in the Regular Exam shall be assessed prior to giving permission to
appear for the Make-up Exam. Make-Up Test/Exam will be conducted only at selected exam
centres on the dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self-study
schedule as given in the course handout, attend the lectures, and take all the prescribed evaluation
components such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the
evaluation scheme provided in the handout.

Appendix
Course Plan

Pre-contact Session Post Contact


Sl. No. Contact Session
Preparation Session Homework
Recorded Lectures
1 CH-1 Uses of Wireshark
for Module-1
Recorded Lectures
2 CH-2 Uses of Wireshark
for Module-1
Review the Simple
Recorded Lectures
3 CH-3 attack to break the
for Module-5
cryptosystem
Caesar/Affine
Recorded Lectures
4 CH-4 Cipher –Worksheet
for Module-6
and Lab Program
Find out more on
Recorded Lectures
5 CH-5 Intel processors that
for Module-8
include True RNG
Stream Cipher -
Recorded Lectures
6 CH-6 RC4 Lab Program –
for Module-8
Worksheet.
Relevance of
Recorded Lectures
7 CH-7 Extended Euclidean
for Module-6
Algorithm
Example of
Recorded Lectures
8 CH-8 Polynomial
for Module-6
Arithmetic
Understand the
Recorded Lectures
9 CH-9 algebra of AES e.g.
for Module-7
finding inverse etc.
Implementation of
10 CH-10 NA
AES
Review Session
11 CH-11 before Mid-
Semester Exams
Modes of
12 CH-12 NA O p e r a t i o n s
Implementation
Recorded Lectures C B C - M A C
13 CH-13
for Module-11 implementation
Recorded Lectures Generation of Large
14 CH-14
for Module-9, 10 Prime Numbers
Recorded Lectures
15 CH-15 RSA Lab Programs
for Module-9, 10
Check a digital
certificate while
Recorded Lectures accessing a secure
16 CH-16
for Module-12, 13 website and
compare its structure
with X.509 standard
13 CH-13
for Module-11 implementation
Recorded Lectures Generation of Large
14 CH-14
for Module-9, 10 Prime Numbers
Recorded Lectures
15 CH-15 RSA Lab Programs
for Module-9, 10
Check a digital
certificate while
Recorded Lectures accessing a secure
16 CH-16
for Module-12, 13 website and
compare its structure
with X.509 standard
Recorded Lectures Authentication with
17 CH-17
for Module-12, 13 Digital Certificate
S/MIME in MS-
Recorded Lectures
18 CH-18 Outlook -
for Module-2
worksheet.
SSL Protocol
Analysis using
Recorded Lectures
19 CH-19 Wireshark -
for Module-3
worksheet.

SSH Channel Types


Recorded Lectures - Experimentation
20 CH-20
for Module-3 using PuTTY and
XMing - worksheet.
IPSec with
Recorded Lectures
21 CH-21 Wireshark -
for Module-4
Worksheet.
Review Session
Before
22 CH-22
Comprehensive
Exams

Contact Session Details:


Details need to be covered
Sl. No. Contact Session
in the contact session
• Network Security
and OSI Security
Architecture
1 CH-1 • Review of Attacks,
Mechanisms and
Services, Network
Security Model
• Network Security
Model
2 CH-2 • Techniques to
Implement Network
Security
• Cryptography,
Classical Encryption
3 CH-3
• Breaking the
Cryptosystem
• Modular Arithmetic,
Groups and Rings
• One example each in
4 CH-4
classical substitutive
and transposition
Security
• Cryptography,
Classical Encryption
3 CH-3
• Breaking the
Cryptosystem
• Modular Arithmetic,
Groups and Rings
• One example each in
4 CH-4
classical substitutive
and transposition
cipher.
• Random numbers, its
types and usage.
5 CH-5 • TRNG, PRNG,
CSPRNG
• Review of BBS
• Stream Ciphering
• RC4 algorithm
6 CH-6
• Basic Number
Theory
• Extended Euclidean
7 CH-7 Algorithm
• Galois Field
• Polynomial
8 CH-8 Arithmetic
• Block Ciphers
• Confusion and
Diffusion Theory
9 CH-9 • AES and its
importance in
security
• Efficient
implementation of
10 CH-10 AES
• Modes of Operation
and its applications
Recapitulation of the all the
11 CH-11 sessions / problem solving
before mid-semester exam.
• SHA-1 and SHA-3
• HMAC and CBC-
12 CH-12
MAC and its
Security
• Model of
Asymmetric Key
Cryptography
13 CH-13 • Factorization and
other methods for
Public Key
Cryptography
• RSA and OAEP
• Diffe-Hellman Key
14 CH-14
Exchange and its
Security Aspects
• Distribution of
Symmetric and
15 CH-15 Asymmetric Key
• Digital Signature:
Cryptography
13 CH-13 • Factorization and
other methods for
Public Key
Cryptography
• RSA and OAEP
• Diffe-Hellman Key
14 CH-14
Exchange and its
Security Aspects
• Distribution of
Symmetric and
15 CH-15 Asymmetric Key
• Digital Signature:
DSA
• X.509 Certificate
16 CH-16 • Man-in-the Middle
Attack
• User/Entity
17 CH-17 Authentication
• Kerberos
• Review of PGP -
Authentication and
18 CH-18 Confidentiality.
• Review of MIME
and S/MIME.
• Review of Web
Security.
19 CH-19
• Review of SSL and
TLS.
• IPSec:
Authentication
Header and
Encapsulated
20 CH-20
Security Payload.
• SAD and SPD with
inbound/outbound
packet processing.
• Malicious Software
and its Detection
Techniques.
21 CH-21
• Review of Intrusion
and Intrusion
Detection.
Recapitulation of the all the
22 CH-22 sessions/problem solving
before comprehensive exam.

You might also like