Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

RAJALAKSHMI ENGINEERING COLLEGE 21 Random Number Generation T220-T227

LESSON PLAN 22 Public key cryptography principles of Public T259-T268


Faculty Name J.CHITRA Faculty Code IT37 key cryptosystems
Subject Name Cryptography and Network Security Subject code IT1352 23 The RSA Algorithm. T268-T278
Class III Year IT A & B Sec Date of Compilation 16/11/2007 UNIT-III AUTHENTICATION AND HASH FUNCTION Actual 9 hrs. Planned 11 hrs.
DEFINITION 24 Authentication Requirements T312- T313
25 Authentication functions T313- T324
To understand the principles of encryption algorithms; conventional and public key cryptography. To
26 Message Authentication codes T324- T328
have a detailed knowledge about authentication, hash functions and application level security 27 Hash functions T328- T334
mechanisms. 28 Security of Hash Functions and MACs T335- T338
29 MD5 Message Digest Algorithm T348- T357
OBJECTIVES
To know the methods of conventional encryption. 30 Secure Hash Algorithm. T357- T364
To understand the concepts of public key encryption and number theory 31 RIPEMD T365- T372
To understand authentication and Hash functions. 32 HMAC Digital Signature T372- T376
To know the network security tools and applications. 33 Authentication Protocols T384- T391
To understand the system level security used. 34 Digital Signatures Standard T392- T395
UNIT-IV NETWORK SECURITY Actual 8 hrs. Planned 8 hrs.
S.No Date Period Topic Page No 35 Authentication Applications: Kerberos T402- T419
UNIT- I INTRODUCTION Actual 10 hrs. Planned-11hrs. 36 X.509 Authentication Services T419- T428
1 OSI Security Architecture T7- T14 37 Electronic Mail Security-PGP T436- T455
2 Classical Encryption Techniques T23-T30 38 S/MIME T455- T472
Symmetric cipher model 39 IP Security Overview-Architecture T482- T491
Substitution Techniques 40 Authentication Header-ESP T491-T501
3 Transportation Techniques T44- T47 41 Combining Security Payload-Key mgmt. T501-T515
Rotar Machines Steganography
42 Web Security T528- T560
4 Cipher principles T63- T72
UNIT V SYSTEM LEVEL SECURITY Actual 8 hrs. Planned 8 hrs.
5 Data encryption standard T72- T81
43 Intrusion Detection T569- T581
6 Block Cipher Design Principles and T63
44 Intrusion Detection Techniques T569- T581
Modes of operation T91- T98
45 Password Management T581- T591
7 Evaluation criteria for AES T140- T143
46 Viruses and related Threats T598- T609
8 AES cipher T143- T167 47 Virus counter measures T609- T613
48 Firewall Design Principles T616- T628
9 Triple DES T174- T179 49 Firewall Design Principles T616- T628
10 Placement of Encryption Function T202- T210 50 Trusted Systems. T628- T634

11 Traffic confidentiality T210- T211 TEXT BOOK


UNIT-II PUBLIC KEY CRYPTOGRAPHY Actual 10 hrs. Planned 12 hrs. 1. William Stallings, Cryptography And Network Security Principles and
12 Key Management T286- T293 Practices, Prentice Hall of India, Third Edition, 2003.

13 Diffie Hellman key Exchange T293- T296 REFERENCES

14 Elliptic Curve Architecture and Cryptography T304- T308


1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003.
15 Introduction to Number theory Prime T236-T239 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2001.
numbers 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third
16 Fermats and Eulers Theorems T239- T243 Edition, Pearson Education, 2003.
17 Testing for Primality T243-T245
18 The Chinese Remainder Theorem-Discrete T245-T252
Logarithms
19 Confidentiality using symmetric Encryption T202-T211
20 20 Ke Key distribution T2 T211-T220

Signature of Faculty Signature of HOD

You might also like