Professional Documents
Culture Documents
: : 14.12.12 : 1 0f 5
UNIT TITLE : UNIT I OBJECTIVE : To understand the principles of encryption algorithms; conventional and public key cryptography S.No. 1 2 3 4 5 6 7 8 9. 10. 11. SUBJECT TOPIC Security Trends Attack and Services Classical Crypto Systems Different types of Ciphers LFSR Sequence Basic Number Theory Congruences CRT Modular Exponentiation Fermat and Eulers Theorem Jacobi Symbols,Finite fields PERIODS 1 1 1 1 2 1 1 2 1 1 1 REFERENCE MATERIAL T2 T2 T2 T2 T2 T1 T2 T1 T1 T1 T1
Serial Numbers 18
Suggested References (Name of the Book, Authors, Publisher and year of Publication) T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006
Teaching Aids
OHP Models Simulation by Computer
Serial Numbers
L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page
: : 14.12.12 : 2 0f 5
UNIT TITLE : UNIT II. OBJECTIVE : To understand the concepts of public key encryption and number theory S.No. 1 2 3 4 5 6 7 8. 9. SUBJECT TOPIC Simple DES Differential Cryptoanalysis DES Modes of Operation Triple DES AES RC4 and RSA Primality Test Factoring PERIODS 2 2 1 1 1 2 2 1 1 REFERENCE MATERIAL T2 T2 T2 T2 T2 T2 T2 T2 T2 Serial Numbers 17
Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006
Serial Numbers
: 14.12.12 : 3 0f 5
UNIT TITLE : UNIT III OBJECTIVE : To understand authentication and Hash functions. S.No. SUBJECT TOPIC PERIODS 1 2 3 4 5 6 7 8 9 10 Discrete Logarthims Computing discrete logs Diffie-Hellman Key Exchange Elgamal public Key Exchange Hash Function Secure Hash Birthday Attacks MD5 Digital Signatures RSA,DSA 1 2 2 1 1 2 1 2 2 1
Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006
Serial Numbers
L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page
: : 14.12.12 : 4 0f 5
UNIT TITLE : UNIT IV OBJECTIVE : To know the network security tools and applications S.No. SUBJECT TOPIC PERIODS 1 Authentication Application 1
REFERENCE MATERIAL T2
2 3 4 5 6 7 8 9 10
Kerberos X.509 Electronics Mail Security S/MIME IP Security Web Security SSL TLS SET
2 1 1 1 2 2 1 1 1
T2 T2 T2 T2 T2 T2 T2 T2 T2 Serial Numbers 1 10
Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006
Serial Numbers
L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page
: : 14.12.12 : 5 0f 5
UNIT TITLE :UNIT V OBJECTIVE : To understand the system level security used. S.No. SUBJECT TOPIC PERIODS 1 2 3 4 5 6 7 System Security Intruders Malicious Software Viruses Firewall Firewall Architecture Security Standards 1 1 1 2 2 1 1
REFERENCE MATERIAL
T2 T2 T2 T2 T2 T2 T2 Serial Numbers
Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006
17
Teaching Aids OHP Models Simulation by Computer Prepared By M.JothishKumar AP/IT Verified By S.RajKamal AP/IT
Serial Numbers