This document contains the lesson plan for a Cryptography and Network Security course taught over 5 units covering various topics in cryptography. The lesson plan lists 50 topics that will be covered across the 5 units, including conventional encryption techniques, public key cryptography, authentication, hash functions, and network and system level security tools and applications. It also lists the textbook and references that will be used for the course.
This document contains the lesson plan for a Cryptography and Network Security course taught over 5 units covering various topics in cryptography. The lesson plan lists 50 topics that will be covered across the 5 units, including conventional encryption techniques, public key cryptography, authentication, hash functions, and network and system level security tools and applications. It also lists the textbook and references that will be used for the course.
This document contains the lesson plan for a Cryptography and Network Security course taught over 5 units covering various topics in cryptography. The lesson plan lists 50 topics that will be covered across the 5 units, including conventional encryption techniques, public key cryptography, authentication, hash functions, and network and system level security tools and applications. It also lists the textbook and references that will be used for the course.
RAJALAKSHMI ENGINEERING COLLEGE 21 Random Number Generation T220-T227
LESSON PLAN 22 Public key cryptography principles of Public T259-T268
Faculty Name J.CHITRA Faculty Code IT37 key cryptosystems Subject Name Cryptography and Network Security Subject code IT1352 23 The RSA Algorithm. T268-T278 Class III Year IT A & B Sec Date of Compilation 16/11/2007 UNIT-III AUTHENTICATION AND HASH FUNCTION Actual 9 hrs. Planned 11 hrs. DEFINITION 24 Authentication Requirements T312- T313 25 Authentication functions T313- T324 To understand the principles of encryption algorithms; conventional and public key cryptography. To 26 Message Authentication codes T324- T328 have a detailed knowledge about authentication, hash functions and application level security 27 Hash functions T328- T334 mechanisms. 28 Security of Hash Functions and MACs T335- T338 29 MD5 Message Digest Algorithm T348- T357 OBJECTIVES To know the methods of conventional encryption. 30 Secure Hash Algorithm. T357- T364 To understand the concepts of public key encryption and number theory 31 RIPEMD T365- T372 To understand authentication and Hash functions. 32 HMAC Digital Signature T372- T376 To know the network security tools and applications. 33 Authentication Protocols T384- T391 To understand the system level security used. 34 Digital Signatures Standard T392- T395 UNIT-IV NETWORK SECURITY Actual 8 hrs. Planned 8 hrs. S.No Date Period Topic Page No 35 Authentication Applications: Kerberos T402- T419 UNIT- I INTRODUCTION Actual 10 hrs. Planned-11hrs. 36 X.509 Authentication Services T419- T428 1 OSI Security Architecture T7- T14 37 Electronic Mail Security-PGP T436- T455 2 Classical Encryption Techniques T23-T30 38 S/MIME T455- T472 Symmetric cipher model 39 IP Security Overview-Architecture T482- T491 Substitution Techniques 40 Authentication Header-ESP T491-T501 3 Transportation Techniques T44- T47 41 Combining Security Payload-Key mgmt. T501-T515 Rotar Machines Steganography 42 Web Security T528- T560 4 Cipher principles T63- T72 UNIT V SYSTEM LEVEL SECURITY Actual 8 hrs. Planned 8 hrs. 5 Data encryption standard T72- T81 43 Intrusion Detection T569- T581 6 Block Cipher Design Principles and T63 44 Intrusion Detection Techniques T569- T581 Modes of operation T91- T98 45 Password Management T581- T591 7 Evaluation criteria for AES T140- T143 46 Viruses and related Threats T598- T609 8 AES cipher T143- T167 47 Virus counter measures T609- T613 48 Firewall Design Principles T616- T628 9 Triple DES T174- T179 49 Firewall Design Principles T616- T628 10 Placement of Encryption Function T202- T210 50 Trusted Systems. T628- T634
11 Traffic confidentiality T210- T211 TEXT BOOK
UNIT-II PUBLIC KEY CRYPTOGRAPHY Actual 10 hrs. Planned 12 hrs. 1. William Stallings, Cryptography And Network Security Principles and 12 Key Management T286- T293 Practices, Prentice Hall of India, Third Edition, 2003.
14 Elliptic Curve Architecture and Cryptography T304- T308
1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003. 15 Introduction to Number theory Prime T236-T239 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2001. numbers 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third 16 Fermats and Eulers Theorems T239- T243 Edition, Pearson Education, 2003. 17 Testing for Primality T243-T245 18 The Chinese Remainder Theorem-Discrete T245-T252 Logarithms 19 Confidentiality using symmetric Encryption T202-T211 20 20 Ke Key distribution T2 T211-T220