Professional Documents
Culture Documents
Course Manual
Name of Institution: ASET
Programme: B.Tech
Batch 2012-2016
Subject : Cryptography and Network Security
Faculty Name: Vikas Thada
Designation: Asst.Prof
1. Course Overview:
Network Security was always important, but has gained significance with the increase of
application of Internet associated e-commerce. Threat and compromise /Breach potentially
increased with the introduction of the end user involment,communication and networking .Thus
the course is introduced to make the student acquainted with the concepts and practices to make
the network environment secure.
2. Course Coverage:
S. No.
Month
Topics/Module to be
covered
January 2015
Module 1, 2
February 2015
Module 3
March 2015
Module 4,5
3. Learning Outcomes:
At the end of the course students will be able to:
4. Main text
Cryptography
Stallings
Introduction to Cryptography and Network Security by Behrouz A.
Forouzan
5. Additional Texts:
A Course
6. Other readings:
Introduction to Cryptography by Johannes A. Buchmann
7. Web Resources:
http://docs.oracle.com/cd/E19683-01/817-2694/ipsec-ov-1/index.html :
About IP Security
8. Session Plan:
Subject: Cryptography and Network Security
Total No. of Sessions -35
Ses
sio
n
(s)
1-7
Topics and
Issues
Module 1:
Introduction
to
security
attacks,
services
and
mechanism,
Classical
encryption
techniques:
substitution ciphers
and
transposition
ciphers,
cryptanalysis,
steganography,
Stream and block
ciphers.
Modern
Block
Ciphers:
Block
ciphers
principles,
Shannons theory of
confusion
and
diffusion,
fiestal
Readings/ Cases/Assignments
Books:
William Stallings Cryptography and Network Security: Principles and
Practice,(chapter 1,2,3)
Atul Kahate, Cryptography and Network Security, (chapter 1,2,3)
Web Resource:
http://peace.lakeheadu.ca/cs4476/slides/chap3-2.pdf:About
DES modes of use
structure,
Data
encryption standard
(DES), Strength of
DES,
Idea
of
differential
cryptanalysis, block
cipher modes of
operations, Triple
DES
.
813
Module 2:
Introduction
to
group, field, finite
field of the form
GF(p),
modular
arithmetic, prime
and relative prime
numbers, Extended
Euclidean
Algorithm,
Advanced
Encryption
Standard
(AES)
encryption
and
decryption,
Fermats
and
Eulers
theorem,
Primality testing,
Chinese Remainder
theorem, Discrete
Logarithmic
Problem, Principals
of public key crypto
systems,
RSA
algorithm, security
of RSA.
Books:
William Stallings Cryptography and Network Security: Principles and
Practice(chapter 4,5,8,9)
Rivest, Cormen Introduction to Algorithm, (chapter 31)
Web Resources:
1. http://en.wikipedia.org/wiki/Extended_Euclidean_algorithm
2. http://www-math.ucdenver.edu/~wcherowi/courses/m5410/crt.pdf
Chinese Remainder Theorem
3. https://comeoncodeon.wordpress.com/2011/10/09/modularmultiplicative-inverse/
4. https://math.berkeley.edu/~sagrawal/su14_math55/notes_shank.pdf
Discrete Logarithm
1419
2026
2735
Module 3:
Message
Authentication
Codes: Authentication
requirements,
authentication
functions,
message
authentication code,
hash
functions,
birthday
attacks,
security
of
hash
functions,
Secure
hash algorithm (SHA)
Digital
Signatures:
Digital
Signatures,
Elgamal
Digital
Signature Techniques,
Digital
signature
standards (DSS).
Module 4:
Key Management
and distribution:
Symmetric
key
distribution,
Diffie-Hellman
Key
Exchange,
Public
key
distribution,
X.509
Certificates,
Public
key
Infrastructure.
Authentication
Applications:
Kerberos
Module 5:
IP
Security:
Architecture,
Books:
William Stallings Cryptography and Network Security: Principles and
Practice(chapter 11,12,13)
Web Resources:
1.
http://web.cse.ohio-state.edu/~lai/651/6.hash-MAC.pdf
2.
http://triton.towson.edu/~mzimand/cryptostuff/N7-Hash.pdf
3.
http://www.facweb.iitkgp.ernet.in/~sourav/lecture_note9.pdf
Birthday Attack
4.
Book:
William Stallings Cryptography and Network Security: Principles and
Practices(chapter 10,14)
Web Resources:
1. http://www.math.brown.edu/~jhs/MathCrypto/SampleSections.pdf
Diffie Hellman, Elgamal and Birthday Paradox
2. https://software.intel.com/sites/manageability/AMT_Implementatio
n_and_Reference_Guide/default.htm?turl=WordDocuments
%2Fintroductiontokerberosauthentication.htm Kerberos
Book:
William Stallings Cryptography and Network Security: Principles and
Authentication
Practices(chapter 16,17,18)
header,
Encapsulating
security payloads, Web Resources:
combining security
1. https://docs.oracle.com/cd/E19683-01/817-2694/ipsec-ovassociations,
key
1/index.html IPSec Security
management.
Introduction
to
2. https://www.globalsign.eu/ssl-information-center/what-is-ssl.html
Secure
Socket
SSL
Layer,
Secure
electronic
3. http://www.cs.ucsb.edu/~koc/ns/projects/03Reports/li-wang.pdf
transaction (SET).
SET
Viruses and related
threats, Firewalls.
9. Examination Scheme:
Components
CT
HA
S/V/Q
Attendance
EE
Weightage(
%)
10
70
CT: Class Test, HA: Home Assignment, S/V/Q: Seminar/Viva/Quiz, EE: End Semester
Examination
Giving an insight and basic understanding about security attacks, block and stream
ciphers, terminologies related to cryptography and its related algorithms.
Learning Outcome
After studying this module , students will be able to:
Have a understanding about cryptography & security attacks
Knows about block and stream ciphers and ciphering techniques
Have a detailed understanding about DES
Question(s) for discussion in class:
1. What is the importance of fiestal structure
2. What is meant by deciphering?
3. How many bit keys are used in S-DES algorithm.
4. What do you mean by differential cryptanalysis?
5. Define Stream Cipher?
6. How secure is DES?
7. Explain any two types of cipher techniques?
8. Explain triple DES?
9. What is the difference between a mono alphabetic and a poly alphabetic cipher?
10. Define confusion and diffusion.
11. Define (i) cryptography (ii) cryptology (ii)cryptanalysis
Module 2:
Topics : Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and
relative prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard (AES) encryption
and decryption, Fermats and Eulers theorem, Primality testing, Chinese Remainder theorem, Discrete
Logarithmic Problem, Principals of public key crypto systems, RSA algorithm, security of RSA
Module 3:
Topics : Message Authentication Codes: Authentication requirements, authentication functions, message
authentication code, hash functions, birthday attacks, security of hash functions, Secure hash algorithm
(SHA) Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature
standards (DSS).
Giving an introduction and further deep insight into MAC and hash functions, need of
authentication , digital signature and its various methods.
Learning Outcome
After studying this module , students will be able to:
have a understanding about MAC and hash functions
know about what is authentication and digital signature
have a understanding about Elgamal DS and DSS
Question(s) for discussion in class:
1. What is the need for authentication ?
2. How cryptography and authentication can be achieved simultaneously ?
3. Define Hash function and SHA?
4. What is the difference between MAC and Hash functions?
5. What is Digital signature ? How it is different from plain signature?
6. What is the concept of digital certificate?
7. What is Elgamal Signature method ?.
8. What is digital signature standard ?
9. What are main properties of hash functions?
Module 4:
Topics : Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key
Exchange, Public key distribution, X.509 Certificates, Public key Infrastructure. Authentication
Applications: Kerberos
Detail about the objective
Giving insight into management and distribution of keys; Understanding of secure
exchange of keys and authentication certificate
Learning Outcome
After studying this module , students will be able to:
have a understanding about management of keys and its distribution.
know about the basics of symmetric key distribution.
knows about X.509 certificates and PKI
knows about authentication protocol: kerberos
Question(s) for discussion in class:
Module 5:
Topics: IP Security: Architecture, Authentication header, Encapsulating security payloads,
combining security associations, key management. Introduction to Secure Socket Layer, Secure
electronic transaction (SET). Viruses and related threats, Firewalls.
Detail about the objective
Giving an understanding about IP Security, Web Security ,detail understanding of viruses,
Firewall design principle and SET.
Learning Outcome
After studying this module , students will be able to:
have a understanding IP security and SSL.
know about the how secure transaction is achieved
Question(s) for discussion in class:
1. What is the necessity of firewalls?
2. What is meant by SSL?