CSE403 Network Security and Cryptography 12376::chetna Kwatra 3.0 0.0 0.0 3.0 Courses With Research Focus
CSE403 Network Security and Cryptography 12376::chetna Kwatra 3.0 0.0 0.0 3.0 Courses With Research Focus
CSE403 Network Security and Cryptography 12376::chetna Kwatra 3.0 0.0 0.0 3.0 Courses With Research Focus
Course Code CSE403 Course Category Course Title NETWORK SECURITY AND CRYPTOGRAPHY Courses with Research focus Course Planner 12376::Chetna Kwatra Lectures 3.0 Tutorials Practicals Credits 0.0 0.0 3.0
TextBooks Sr No T-1 Title Cryptography and Network Security Reference Books Sr No R-1 R-2 R-3 R-4 Other Reading Sr No OR-1 OR-2 OR-3 OR-4 Journals articles as Compulsary reading (specific articles, complete reference) International Journal of Applied Cryptography, http://www.inderscience.com/index.php , "Journal of Cryptographic Engineering" , http://www.springerlink.com/ , Shu-Quan Li, Yue Wu, Survey on Key Management for Multicast, Second International Conference on Information Technology and Computer Science , International Journal of Network Security, http://ijns.femto.com.tw/ , Title Cryptography and Network Security Principles and Practices Cryptography & Security Applied Cryptography Protocols, Algorithm and Source code in C Cryptography and Network Security Author William Stallings C K Shyamala, N Harini and Dr T R Padmanabhan Bruce Schneier Atul Kahate Edition 5th 1st 2nd 3rd Year 2011 2011 2007 2013 Publisher Name Pearson Wiley John Wiley & Sons McGraw-Hill Author Behrouz A. Forouzan, Debdeep Mukhopadhya y Edition 2nd Year 2010 Publisher Name M. G.Hills
Relevant Websites Sr No RW-1 RW-2 RW-3 RW-4 (Web address) (only if relevant to the course) www.stanford.edu/class/cs193i/slidesSum2004/Security.ppt theory.stanford.edu/~trevisan/books/crypto.pdf http://www.rsa.com/rsalabs/node.asp?id=2262 http://people.csail.mit.edu/rivest/Rsapaper.pdf Salient Features Stanford University Lecture Notes on Different Attacks and Security Features Stanford Lecture Notes Key Management, Application and other Terms of Cryptography Digital signature and its purpose to use
Audio Visual Aids Sr No AV-1 Virtual Labs Sr No VL-1 (VL) (only if relevant to the course) http://deploy.virtual-labs.ac.in/labs/cse29/index.php?section=List%20of %20experiments Salient Features This Page Describes Various Cryptography Algorithms (AV aids) (only if relevant to the course) http://nptel.iitm.ac.in/courses/106105031/3 Salient Features Online Vedio Lecture of IIT Madras
LTP week distribution: (LTP Weeks) Weeks before MTE Weeks After MTE Spill Over 7 7 3
Week 1
Lecture 1
T-1:Chapter 1 T-1:Chapter 1
Student Learn about the Faculty will use the security Features images Student Learn about the Faculty will use the security Features images of attack or how the attacker will attack Student Learn about the Faculty will use the security Features images of security services Student will Understand the use of Multiplicative inverse in Cryptography Student will Understand the use of Multiplicative inverse in Cryptography Faculty will prepare the PPT and images as well as use the white board to explain the concept Faculty will prepare the PPT and images as well as use the white board to explain the concept
Introduction to Cryptography (Security Goals) Lecture 2 Introduction to Cryptography (Mathematics of CryptographyInteger Arithmetic)
T-1:Chapter 1
RW-1
Talk about the different kind of attacks Talk about the mathematical concept used in cryptography
T-1:Chapter - 2
RW-2
T-1:Chapter - 2
RW-2
Lecture 3
T-1:Chapter-2
RW-2
Discuss about the use of Understand how Mod Faculty will prepare Mod operation in operation can be useful the Video as well as Cryptography in Cryptography use the white board to explain the concept
Week 2
Lecture 4
T-1:Chapter-3
RW-2
Discussion about the shared Keys and Encryption using keys and different kind of attack Discussion about the substition of letters in message
Lecture 5
T-1:Chapter-3
OR-2 RW-2
Learn the simple Faculty will prepare Encryption Techniques the video as well as explain the example on white board
Lecture 6
T-1:Chapter-3
OR-2 RW-2
Learn the simple Faculty will prepare Encryption Techniques the video as well as explain the example on white board
Week 3
Lecture 7
T-1:Chapter -3
RW-2
Discussion about the Student will learn Use of white board to Permutation of letters in Permutation of letters in explain the examples a message Message and form the Cipher Discussion about the Mathematical Concept used in Symmetric Key Cryptography Discussion about the Mathematical Concept used in Symmetric Key Cryptography Explanation on the details behind DES Algorithm Explanation of the rounds in DES Algorithm The Strength of DES Algorithm Student will learn Faculty will use the about the Group Theory video as well as and fields images Student will learn the use of Galois Field Use of white board to explain the examples
Lecture 8
Traditional Symmetric Key Ciphers(Mathematics of Symmetric Key Cryptography Algebraic structures) Traditional Symmetric Key Ciphers(GF(2n) field)
T-1:Chapter-4
OR-2 RW-2
Lecture 9
T-1:Chapter-4
OR-1 RW-2
Week 4
Lecture 10
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Introduction to DES) Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Structure of DES) Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Security of DES)
R-1:Chapter-3
RW-2
R-1:Chapter-3
RW-2
Students will Faculty will use the understand the detailed images and animation design of DES algorithm Students will Faculty will use the understand the strength images of DES algorithm against attacks Students will Faculty will use the understand the strength images of DES algorithm against attacks Students will Faculty will use the understand the detailed images and animation design of DES algorithm
R-1:Chapter-3
RW-2
Lecture 11
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Security of DES) Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Structure of DES)
R-1:Chapter-3
RW-2
R-1:Chapter-3
RW-2
Week 4
Lecture 11
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Introduction to DES)
R-1:Chapter-3
RW-2
Lecture 12
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Introduction to AES)
T-1:Chapter-7
RW-2
Basics of AES algorithm Understanding of the and the advancements need of AES
Week 5
Lecture 13
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Transformation in AES)
T-1:Chapter-7
RW-2
Lecture 14
Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(Key expansion in AES) Data Encryption Standard (DES) and Advanced Encryption Standard (AES)(AES Cipher)
T-1:Chapter-7
RW-2
Student will understand Faculty can use the key generation phases animation in AES Student will understand Faculty can use the encryption of message animation through AES Faculty will use the video as well as solve the example in white board
T-1:Chapter-7
RW-2
Lecture 15
T-1:Chapter-9
OR-2 RW-2
Discuss the use of prime Understand the numbers in the field of Application of Prime cryptography numbers in Cryptography The use of Chinese Remainder Theorem in Cryptography Explain how the security strength of a cryptographic algorithm is measured Term Paper,Test1
Week 6
Lecture 16
T-1:Chapter-9
RW-2
Student will understand Faculty will use the white board as well as the Application of video Chinese theorem Student will Understand Faculty will use the how the security image strength of a cryptographic algorithm is measured Student will Understand Faculty will use the the need of keys and images their significance in cryptosystems Faculty will use the video as well as solve the example in white board
T-1:Chapter-9
RW-2
Lecture 17 Lecture 18 Asymmetric Key Cryptography (Introduction to Asymmetric Key Cryptography) Asymmetric Key Cryptography (RSA cryptosystems) T-1:Chapter - 10 OR-1 RW-2
Week 7
Lecture 19
T-1:Chapter - 10
OR-1 RW-2
Explanation of the basic Student will Understand public how the Message can Key Algorithm RSA be encrypted through RSA Explanation of key distribution techniques
Lecture 20
T-1:Chapter-15
Understand how the Faculty will use video keys will be distributed and images to the users
T-1:Chapter-15
Explanation of common Student will understand Faculty will use video key sharing between the the method to generate and images users the common key
Week 7
Lecture 21
T-1:Chapter-15
OR-3 RW-3
How the Secret Key will Method to distribute the Faculty will use the be distributed through key video,images Public Key
MID-TERM
Week 8 Lecture 22 Message Integrity and Authentication(Message integrity) Message Integrity and Authentication(Message Authentication) Message Integrity and Authentication(Introduction to Cryptographic Hash Functions) T-1:Chapter-11 OR-4 RW-3 OR-2 Importance of Integrity in Message Discussion on different scenarios for message authentication Explanation of the basic Hash functions used to maintain the Integrity of Message Student will understand Faculty will use importance of message images integrity Student will learn the Faculty will use importance of message images authentication Student will learn how Faculty can use different hash functions video/images maintain the Integrity of message
Lecture 23
T-1:Chapter-11
Lecture 24
R-1:Chapter-11
RW-2 RW-3
Week 9
Lecture 25
Message Integrity and Authentication(SHA 512) Message Integrity and Authentication(SHA 512) Message Integrity and Authentication(SHA 512) Digital Signature(Comparison with Conventional Signature)
R-1:Chapter-11
RW-2
Talk about structure and Student will understand Faculty will use the design detail of SHA the structure and images working of SHA Talk about structure and Student will understand Faculty will use the design detail of SHA the structure and images working of SHA Talk about structure and Student will understand Faculty will use the design detail of SHA the structure and images working of SHA Comparison of digital and conventional signature Student will understand Faculty will use the difference between images digital signature and conventional signature and the reason for using DS
Lecture 26
R-1:Chapter-11
RW-2
Lecture 27
R-1:Chapter-11
RW-2
Week 10
Lecture 28
T-1:Chapter-13
RW-4
T-1:Chapter-13
RW-4
How the digital signature Student will understand Faculty will use the will be formed for a the generation of digital images and can take message signature for a message the help from nptel website vedio also How the digital signature Student will understand Faculty will use the will be formed for a the generation of digital images and can take message signature for a message the help from nptel website vedio also Talk about the security features achieved by digital signature Term Paper,Test2 Student will understand Faculty will use the the significance of images and can take digital signature the help from nptel website vedio also Student will understand Faculty will use the the various algorithm of images and can take digital signature the help from nptel website for video
Lecture 29
T-1:Chapter-13
RW-4
Lecture 30
T-1:Chapter-13
RW-4
Week 11
Week 11
Lecture 33
T-1:Chapter-13
RW-4
Explain various algorithms to generate the digital signature Explanation of different modes of IP security Dicussion on authentication header and ESP Protocol Dicussion on authentication header and ESP Protocol Discuss about the security association formed between applications Discuss about security policy formed between applications Discussion on Email architecture
Student will understand Faculty will use the the various algorithm of images and can take digital signature the help from nptel website for video Student will understand Faculty will use the tunnel mode and images transport mode of IPSec Student will learn the security protocols of IPsec Student will learn the security protocols of IPsec Faculty will use the images Faculty will use the images
Week 12
Lecture 34
Security at Network Layer: IPsec (Modes of IPSec) Security at Network Layer: IPsec (Two Security Protocols of IPSec) Security at Network Layer: IPsec (Two Security Protocols of IPSec) Security at Network Layer: IPsec (Security Association)
T-1:Chapter-18
RW-2
Lecture 35
T-1:Chapter-18
RW-2
Lecture 36
T-1:Chapter-18
RW-2
Week 13
Lecture 37
T-1:Chater-18
RW-2
Student will understand Faculty will use the importance of security images association Student will understand Faculty will use the details of security images Policy Students will understand the structure of an email application and security applied on it. Students will understand the structure of an email application and security applied on it. Students will learn the architecture of PGP Students will learn the architecture of PGP Faculty will use the images and can take the help from nptel website vedio Faculty will use the images and can take the help from nptel website vedio Faculty will use the images Faculty will use the images
Lecture 38
Security at Network Layer: IPsec (Security Policy) Security at Application Layer (Email)
RW-2
Lecture 39
RW-2
Week 14
Lecture 40
T-1:Chapter-16
RW-2
Lecture 41 Lecture 42
T-1:Chapter-16 T-1:Chapter-16
RW-2 RW-2
SPILL OVER
Week 15 Lecture 43 Lecture 44 Lecture 45 Spill Over Spill Over Spill Over
Test1
To evaluate the Syllabus covered till week 5 knowledge of students based on the syllabus covered
The answers of the students will be evaluated on the basis of correctness, precision and relevance. The answers of the students will be evaluated on the basis of correctness, precision and relevance. The term paper will be evaluated on the basis of content and viva/presentation
Test2
To evaluate the Syllabus Covered till week 10 knowledge of students on the basis of the syllabus taught Students will apply their skills in reference to their learning of course and write a review paper. Students will learn to write the technical paper on the basis of cryptographic algorithms taught so far. Students may also be expected to implement the topics as per faculty's suggestions.
Individual
10 / 11
Term Paper1
Individual
3 / 12
List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 Security services X.800 2 Basic substitution Encryption techniques (Ceaser, Playfair, Mono/Poly-Alphabetic) 3 Transposition Encryption techniques 4 Playfair cipher with GUI support 5 Hill cipher 6 Vigenere cipher 7 One time pad 8 Fiestal cipher 9 Stream generation process in RC4 10 RSA algorithm 11 Man in the middle attack in Diffie Hellman key exchange 12 Implementation of Digital signature 13 Euler's Function
14 Eucludian Algorithm 15 Fermat's Theorem 16 RSA Digital Signature 17 Schnorr Digital Signature 18 Digital Signature Standard 19 Modulus calculation 20 Pseudo Ramdom Number Generator 21 Majority function in SHA-512 22 Conditional Function in SHA-512 23 Computation of Primitive root in group 24 Key Stream generation using RC4 25 Chinese Remainder Theorem 26 Meet In Middle Attack in 3DES 27 Blow fish algorithm 28 Implementation of Brute Force Attack