Professional Documents
Culture Documents
CS6701 CNS-Lesson Plan-Regulation - 2013
CS6701 CNS-Lesson Plan-Regulation - 2013
LECTURE PLAN
Course Code & Title: CS6701 & CRYPTOGRAPHY AND NETWORK SECURITY
Course Objectives:
Acquire fundamental knowledge on the concepts of finite fields and number theory.
Describe the principles of public key cryptosystems, hash functions and digital signature.
Course Outcomes:
After completion of the course, it is expected that:
Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
Apply the different cryptographic operations of symmetric cryptographic algorithms
Apply the different cryptographic operations of public key cryptography
Apply the various Authentication schemes to simulate different applications.
Understand various Security practices and System security standards
Assessment Methods followed:
Page 1 of 3
Teaching
Methodology
(Lecture
Lectu Role play
Date Topic(s) to be taught Teaching aids
re No. Group Discussion
Quiz
Debates
Gamefication)
UNIT I- INTRODUCTION & NUMBER THEORY
Page 3 of 3
Exportability-Encoding-Secure Electronic LCD Role Play
52.
Transaction (SET)
Content Beyond the Syllabus
LCD Lecturer
53.
Combining Security Associations
Mini Projects
Pure Transposition Cipher LCD Experiential
54.
Learning
TEXT BOOKS:
REFERENCES:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”,
Wiley Publications, 2003.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia, 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition,
Private Communication in Public World”, PHI 2002.
6. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley Dreamtech
India Pvt Ltd, 2003.
7. Douglas R Simson “Cryptography – Theory and practice”, First Edition, CRC Press, 1995.
8. http://nptel.ac.in/.
ASSIGNMENTS
Assignment -I
1. Discuss any four Substitution Technique and list their merits and demerits.
2. Draw the general structure of DES and explain the encryption decryption process. Mention the
strengths and weakness of DES algorithm.
Page 4 of 3
Assignment-II
Page 5 of 3