INS Syllabus
INS Syllabus
Prerequisite: Students should be familiar with basic concepts of Software Flaws, Data Structures,
andMathematics including Random numbers, Number theory, and finite fields.
Rationale: This course provides an introduction to the fundamental principles of cryptography and its
applications on the network security domain as well as software development domain. This subject
covers various important topics concern to information security like symmetric and asymmetric
cryptography, hashing, message and user authentication, digital signatures, key distribution and
overview of the malware technologies. The subject also covers the applications of all of these in real life
situations.
Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:
Multiple encryption and triple DES, Electronic Code Book, Cipher Block
4 Chaining Mode, Cipher Feedback mode, Output Feedback mode, 10% 4
Counter mode
Number theory and Advance Encryption Standard:
*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.
Reference Books:
1. Cryptography and Network Security (Textbook) William Stallings; Pearson Education
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and Practice Deven Shah, Wiley-India
4. Information Security Principles and Practice Mark Stamp; Wiley India edition
5. Information systems security Nina Godbole; Wiley Publications,2008
Course Outcome:
After Learning the course, the students shall be able to:
1. Define the concepts of Information security and their use.
2. Describe the principles of symmetric and asymmetric cryptography.
3. Understand the concepts of hashing with algorithms and apply them.
4. Understand and use message authentication and its requirement.
5. Understand the concepts of digital signature and digital certificates.
6. Understand and use the various key management and remote authentication mechanisms.
7. Understand the concept of system and software security.
8. Understand vulnerabilities in software flaws and concept of malware.