0% found this document useful (0 votes)
57 views4 pages

network_security_syllabus

Uploaded by

Santhosh Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

network_security_syllabus

Uploaded by

Santhosh Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Department of Computer Science & Engineering

National Institute of Technology Srinagar

Course Title Network Security Semester 7th

Department Computer Science & Course Code CST417


Engineering

Credits 04 L T P

Course Type Theory 3 1 0

Course Objectives

• To help the students to understand important security goals in the networks-


Confidentiality, Integrity, Authenticity, Non-repudiation and Availability and
cryptographic techniques to implement these security goals.
• To provide a necessary review of mathematical concepts to implement different
cryptographic techniques to achieve the network security goals and then provides a
deeper dive to the field of cryptography- symmetric and asymmetric key cryptography
and methods to implement them.
• The course provides a top down approach to explore the security implementations in
different network layers-application, transport and network.

Learning Outcomes

After completion of this course the students should be able to:

• Visualize the security goals clearly in the networks.


• Analyse the basic concepts of network security to predict and classify attacks on a
system/network.
• Understand and apply authentication techniques to provide secure communication.
• Assess the security threats to ICT infrastructure using modern tools such as firewalls,
UTMs, etc.
Course Synopsis

Cryptography, classical encryption, Divisibility, Modular Arithmetic,Random Numbers.

Course Outline / Content

Unit Topics Week

1. Introduction 1

Review of Layered Architecture of the Network - the OSI


Reference Model, Computer Security Concepts, The OSI

58
Security Architecture, Security - Attacks, Services and
Mechanisms.

2. Cryptography Introduction: Classical Encryption 1


Techniques

Techniques for Implementing Security Goals: An Overview of


Cryptography and Steganography, A brief recap of cryptographic
principles and motivations for secure network, General thoughts
on breaking the cryptosystems.

3. Review & Self Study - Mathematics for Symmetric Key 2


Cryptography

Review of important mathematical concepts: Divisibility,


Modular Arithmetic, Groups and Rings. Classical Encryption
Techniques - Substitution and Transposition

4. Random Number (PRN) Generation and Stream Cipher 2

Random Numbers, True Random Number Generators, Pseudo


Random Numbers - principles and generators, Cryptographically
Secure Random Number Generators, One Time Pad, Stream
Cipher- RC4

5. Block Ciphers - Data Encryption Standard (DES) and 2


Advanced Encryption Standard (AES)

Block Cipher Structure, Introduction to Data Encryption


Standard, Triple DES - introduction, structure & implementation,

Fields, Finite Fields - GF(p), GF(2n) and polynomial arithmetic.

Advanced Encryption Standard (AES) - Introduction, structure &

implementation.

6. Block Cipher Operations 2

Modes of Operations, Electronic Code Book Mode, Cipher


Block Chaining Mode, Output Feedback Mode, Cipher Feedback
Mode, Counter Mode, Enhancing the Security of Block Ciphers:
Multiple Encryption, 3DES and DESX, Meet-in-the Middle
Attack.

7. Data Integrity 2

Introduction & Motivation, Hash Functions from Block Cipher,


Message Digest (MD) Hash Family, Secure Hash Algorithm

59
(SHA-1 and SHA-3), Message Authentication Codes (MAC).

8. Review & Self Study - Mathematics for Asymmetric Key 2


Cryptography

Review of important mathematical concepts used in asymmetric


key cryptography – Euclidean and Extended Euclidean
Algorithm, Euler’s Phi Function, Prime Numbers and Primality
Testing, Euler's and Fermat's Theorem.

9. Asymmetric Key Cryptography 1

Introduction & Principles of Asymmetric Key Cryptography,


Different Public Key Algorithms, Introduction to RSA, RSA in
Practice and Attacks, Diffe-Hellman Key Exchange.

10. Digital Signatures 1

Introduction & Motivation, Principles and Applications, RSA


based Digital Signature, RSA Probilistic Signature Scheme.

11. Mutual Trust - Key Management and User Authentication 1

Introduction and challenges in key distribution, Symmetric Key


Distribution and Agreement, Public Key Distribution, Principles
of user authentication, User Authentication Protocol – Kerberos,
Public-Key Infrastructure.

12. Security at the Application Layer 1

Application Layer Security - Objectives, Issues and Need, Email


Security, Pretty Good Privacy, Secure/Mulitpurpose Internet
Mail Extension, Domain Keys Identfied Mail.

13. Security at the Transport Layer 1

Web Security: Threats and Challenges, Securing Web-based


transactions at the transport layer, Secure Socket Layer,
Transport Layer Security, HTTPS, Combining HTTP and
SSL/TLS - the secure HTTPS, Remote login, Challenges, One
Possible Solution Approach – SSH, Wireless Security – TLS and
WAP End-to-End Security.

14. Security at the Network Layer 1

IP Security: Overview and Policy, Encapsulating Security


Payload, Combining Security Associations, Internet Key
Exchange, Cryptogaphic Suites.

60
15. System Security 2

Malwares – Virus, Worms, etc, Malicious Software and Anti-


malwares, Distributed Denial of Service Attacks, Intruders and
Intrusion Detection, Firewall Need and Characteristics, Types of
Firewalls and Biasing, Firewall Location and Confgurations.

Text Books

1. Stallings William: Cryptography and Network Security - Principles and Practice,

Pearson India, 6th Edition, 2014.

References

1. ChristofPaar and Jan Pelzl: Understanding Cryptography - A Textbook for

Students and Practitioners, Springer, 1st Edition, 2010.

2. SchneierBruice: Applied Cryptography : Protocols, Algorithms And Source Code

In C, Wiley India, 2nd Edition, Reprint - 2013.

3. Kurose James F and Keith W. Ross: Computer Networking: A Top-Down

Approach, Pearson India, 5th Edition, 2012.

61

You might also like