Lesson Plan Unit I Introduction & Number Theory 10 Hours

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Lesson Plan

UNIT I
INTRODUCTION & NUMBER THEORY
10 hours
1. Services, Mechanisms and attacks, OSI security architecture
2. Network security model and Classical Encryption techniques, Symmetric cipher model
3. Substitution techniques
4. Substitution techniques
5. Transposition techniques and Steganography
6. FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic
7. Euclid’s algorithm
8. Finite fields, Polynomial Arithmetic,
9. Prime numbers , Fermat’s and Euler’s theorem, Testing for primality
10. The Chinese remainder theorem, Discrete logarithms.
UNIT II
BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY
10 hours
1. Block cipher principles and block cipher modes of operation
2. Data Encryption Standard
3. Advanced Encryption Standard (AES)- Structure, Transformation Function
4. Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation
5. Triple DES and Blowfish
6. RC5 algorithm.
7. Principles of public key cryptosystems
8. The RSA algorithm and Key management
9. Diffie Hellman Key exchange
10. Elliptic curve arithmetic and Elliptic curve cryptography
UNIT III
HASH FUNCTIONS AND DIGITAL SIGNATURES
8 hours
1. Authentication requirement and Authentication function
2. MAC and Hash function
3. Security of hash function and MAC
4. MD5 and SHA
5. HMAC and CMAC
6. Digital signature and authentication protocols
7. DSS
8. EIgamal and Schnorr
UNIT IV
SECURITY PRACTICE & SYSTEM SECURITY
8 hours
1. Authentication applications and Kerberos
2. X.509 Authentication services
3. Roles of Firewalls, Firewall related terminology and Types of Firewalls
4. Firewall designs and SET for E-Commerce Transactions.
5. Intruder and Intrusion detection system
6. Virus and related threats, Countermeasures
7. Firewalls design principles, Trusted systems
8. Practical implementation of cryptography and security.
UNIT V
E-MAIL, IP & WEB SECURITY
9 hours
1. E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys,
privacy
2. Authentication of the source, Message Integrity and Non-repudiation
3. Pretty Good Privacy and S/MIME.
4. IPSecurity: Overview of IPSec, IP and IPv6
5. Authentication Header and Encapsulation Security Payload(ESP)
6. Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
7. Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication
8. PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding
9. Secure Electronic Transaction (SET).

You might also like