0% found this document useful (0 votes)
4 views

INS Syllabus

Uploaded by

bodanaji5
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

INS Syllabus

Uploaded by

bodanaji5
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PARUL UNIVERSITY - Faculty of Engineering and Technology

Department of Computer Science & Engineering


SYLLABUS FOR 5th Sem BTech Programme
Information and Network Security

Prerequisite: Students should be familiar with basic concepts of Software Flaws, Data Structures,
andMathematics including Random numbers, Number theory, and finite fields.

Rationale: This course provides an introduction to the fundamental principles of cryptography and its
applications on the network security domain as well as software development domain. This subject
covers various important topics concern to information security like symmetric and asymmetric
cryptography, hashing, message and user authentication, digital signatures, key distribution and
overview of the malware technologies. The subject also covers the applications of all of these in real life
situations.

Teaching and Examination Scheme:

Teaching Scheme Examination Scheme


Credit External Internal Total
Lect Hrs/ Tut Hrs/ Lab Hrs/
Week Week Week
T P T CE P
3 0 0 3 60 - 20 20 - 100
Lect - Lecture, Tut - Tutorial, Lab - Lab, T - Theory, P - Practical, CE - CE, T - Theory, P - Practical

Contents:

Teaching
Sr. Topic Weightage
Hrs.
Introduction:

Computer Security Concept, The OSI Security Architecture, Security


1 Attacks, Security Services, Security Mechanism, A Model for Network 5% 2
Security,
Classical Encryption Techniques:

Symmetric Cipher Model, Cryptanalysis, Cryptanalysis Attacks,


2 Substitution Techniques: Caesar Cipher, Monoalphabetic Cipher, Hill 10% 6
Cipher, Playfair Cipher, Polyalphabetic Cipher, OTP, Transposition
Techniques, Steganography
Block Ciphers and the Data Encryption Standard:

Stream ciphers and block ciphers, Block Cipher Principles, Data


3 Stream ciphers and block ciphers, Confusion & Diffusion, Block Cipher 15% 8
Principles, Data Encryption Standard (DES), Deferential and Linear
Cryptanalysis, Avalanche Effect, strength of DES, Design principles of
block cipher.
Multiple Encryption and Triple DES

Multiple encryption and triple DES, Electronic Code Book, Cipher Block
4 Chaining Mode, Cipher Feedback mode, Output Feedback mode, 10% 4
Counter mode
Number theory and Advance Encryption Standard:

The Euclidean Algorithm, Modular Arithmetic, Finite Fields of the Form


5 GF(p), Polynomial Arithmetic, Advance Encryption Standard(AES): 15% 6
structure, key expansion
Asymmetric Ciphers:

Prime Numbers, Principles of Public-Key Cryptosystems, The RSA


6 Algorithm, Diffie Hellman Key Exchange, Man in the Middle attack 15% 4

Cryptographic Data Integrity Algorithms:

Hash Function: Hash Function and its Application, Security


Requirements for Cryptographic Hash Functions, Hash Functions
7 Based on Cipher BlockChaining, Secure Hash Algorithm (SHA). 20% 8
MAC: Message Authentication Requirements, Message Authentication
Functions, Requirements for Message Authentication Codes, Security
of MACs, HMAC
Digital Signature: Introduction to Digital Signatures, Digital Signature
Standard.
Key Management and Distribution:

Symmetric Key Distribution: Symmetric Key Distribution Using


Symmetric Encryption, Symmetric Key Distribution Using Asymmetric
8 Encryption, Asymmetric Key Distribution: Distribution of Public Keys, 10% 4
X.509 certificates

Advanced Topics: Firewall, Intruders, Virus, Trojans, Malware,


Ransomware.

*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.

Reference Books:
1. Cryptography and Network Security (Textbook) William Stallings; Pearson Education
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and Practice Deven Shah, Wiley-India
4. Information Security Principles and Practice Mark Stamp; Wiley India edition
5. Information systems security Nina Godbole; Wiley Publications,2008

Course Outcome:
After Learning the course, the students shall be able to:
1. Define the concepts of Information security and their use.
2. Describe the principles of symmetric and asymmetric cryptography.
3. Understand the concepts of hashing with algorithms and apply them.
4. Understand and use message authentication and its requirement.
5. Understand the concepts of digital signature and digital certificates.
6. Understand and use the various key management and remote authentication mechanisms.
7. Understand the concept of system and software security.
8. Understand vulnerabilities in software flaws and concept of malware.

You might also like