You are on page 1of 6

# DOC/LP/01/28.02.

02

LESSON PLAN
Sub Code & Name : CU9257 /COMMUNICATIOIN NETWORK SECURITY Unit: I Branch: ME(CC) Semester: II

## Unit syllabus: INTRODUCTION ON SECURITY 9

Security Goals, Types of Attacks: Passive attack, active attack, attacks on confidentiality, attacks on Integrity and availability. Security services and mechanisms, Techniques : Cryptography, Steganography, Revision on Mathematics for Cryptography. Objective: In this Unit Students will acquire basic knowledge about security, different types of attacks and various techniques used for security.
Session No Teaching Method

Topics to be covered

Time

Ref

1. 2. 3. 4. 5. 6. 7. 8. 9.

Security goals Types of attacks Attacks on confidentiality Attacks on integrity, availability Security services and mechanisms Techniques Mathematics for cryptography-Integer and modular arithmetic Mathematics for cryptography-Matrices Mathematics for cryptography- Linear congruence

## 50m 50m 50m 50m 50m 50m 50m 50m 50m

(Page No.) 1(2-3) 1((3-6) 1((3-6) 1((3-6) 1(6-9) 1(9-10) 1(20-40) 1(40-45) 1(45-47)

BB BB BB BB BB BB BB BB BB

DOC/LP/01/28.02.02

LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: II Branch: ME(CC) Semester: II

## Unit syllabus: SYMMETRIC & ASYMMETRIC KEY ALGORITHMS 9

Substitution Ciphers, Transposition Ciphers, Stream and Block Ciphers, Data Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, Principle of asymmetric key algorithms, RSA Cryptosystem. Objective: In this Unit students will acquire knowledge about the concepts of symmetric and asymmetric key algorithms.

Session No

Topics to be covered

Time

Ref

Teaching Method

## 10. 11. 12. 13. 14. 15. 16. 17. 18.

Substitutional Ciphers Transposition Ciphers, Stream and Block Ciphers Data encryption standard Encryption, Key generation, Decryption Data Encryption Standard-Modes of Operation AES-Evaluation criteria, The Origin of AES, AES Evaluation,AES Cipher-Substitute Bytes Transformation, Shift Row Transformation AES Cipher-Mix Column Transformation, Add Round Key Transformation,AES Key Expansion, Equivalent Inverse Cipher RC4 Principle of Asymmetric key algorithms RSA Cryptosystem

## 50m 50m 50m 50m 50m 50m 50m 50m 50m

(Page No.) 1(61-80) 1(80-87), 1(87-90) 1(159-181) 1(181-186) 1(191-212) 1(213-220) 1(238-242) 1(293-296) 1(301-314)

BB BB BB BB BB BB BB BB BB

DOC/LP/01/28.02.02

LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: III Branch: ME(CC) Semester: II

## LP- CU9257 Rev. No: 00 Date: 09.01.2013 Page 03 of 06

Unit syllabus:

INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT Message Integrity, Hash functions: SHA, Digital signatures : Digital signature standards. Authentication Entity Authentication: Biometrics, Key management Techniques. Objective: In this Unit students will acquire knowledge about authentication functions, integrity and key management techniques.
Session No Ref Topics to be covered Time Teaching Method

## 19. 20. 21. 22. 23. 24. 25. 26. 27.

Message integrity Message integrity Hash functions Secured Hash Algorithm Digital signatures: Requirements, direct DS, Arbitrated DS. Digital signature standards: DSS approach, DS Algorithm Entity Authentication: Biometrics Key management techniques Key management techniques

## 50m 50m 50m 50m 50m 50m 50m 50m 50m

(Page No.) 1(339-343) 1(339-343) 1(367-372) 1(367-372) 2(311-314) 2(311-314) 1(430-434) 1(437-453) 1(453-458)

BB BB BB BB BB BB BB BB BB

DOC/LP/01/28.02.02

LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: IV Branch: ME(CC) Semester: II

## LP- CU9257 Rev. No: 00 Date: 09.01.2013 Page 04 of 06

Unit syllabus: NETWORK SECURITY, FIREWALLS AND WEB SECURITY Introduction on Firewalls, Types of Firewalls, Firewall Configuration and Limitation of Firewall. IP Security Overview, IP security Architecture, authentication Header, Security payload, security associations, Key Management. Web security requirement, secure sockets layer, transport layer security, secure electronic transaction, dual signature Objective: In this Unit students will gain knowledge about network security, web security and firewalls.
Session No Ref Topics to be covered Time Teaching Method

## 28. 29. 30. 31. 32. 33. 34. 35. 36.

Introduction on Firewalls and Types Introduction on Firewalls and Types Firewall configuration and limitations IP security overview, Architecture, Authentication header Encapsulating security payload, Combining Security Associations, Key management Web security requirement Secure socket layer Transport layer security-TLS, SET. Dual Signature Continuous Assessment Test - II

## 50 m 50m 50m 50m 50m 50m 50m 50m 50m 180m

(Page No.) 2(517-525) 2(517-525) 2(525-531) 2(400-413) 2(413-432) 2(441-444) 2(444-457) 2(457-465) 2(465-472)

BB BB BB BB BB BB BB BB BB

DOC/LP/01/28.02.02

LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: V Branch: ME(CC) Semester: II

## LP- CU9257 Rev. No: 00 Date: 09.01.2013 Page 05 of 06

Unit syllabus: WIRELESS NETWORK SECURITY Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS.WEP for Wi-Fi network, Security for 4G networks: Secure A d hoc Network, secure Sensor Network Objective: In this Unit students will acquire knowledge about wireless network security.

Session No

## 37. 38. 39. 40. 41. 42. 43. 44. 45.

Worm hole Attack Tunneling Denial of Service Attack Wired Equivalent Privacy for Wi-Fi networks Security for 4G networks Secure Adhoc network Secure Adhoc network Secure sensor network Summary and tutorial Continuous Assessment Test - III

50m 50m 50m 50m 50m 50m 50m 50m 50m 75m

(Page No.) Resources from web Resources from web Resources from web Resources from web Resources from web 6,7 6,7 8,9

Teaching Method

BB BB BB BB BB BB BB BB BB

DOC/LP/01/28.02.02

LESSON PLAN
Sub Code & Name : CU9257/ COMMUNICATIOIN NETWORK SECURI TY Branch: ME(CC) Semester: II

## LP- CU9257 Rev. No: 00 Date: 09.01.2013 Page 06 of 06

Course Delivery Plan: Week Units REFERENCES: 1. Behrouz A. Fourouzan , Cryptography and Network security Tata McGraw- Hill, 2008 2. William Stallings,"Cryptography and Network security: principles and practice",2nd Edition,Prentice Hall of India,New Delhi,2002 3. Atul Kahate , Cryptography and Network security, 2nd Edition, Tata McGrawHill, 2008 4. R.K.Nichols and P.C. Lekkas , Wireless Security 5. H. Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solution, IEEE Wireless Communications, Feb. 2004. 6. Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999. 7. "Security of Wireless Ad Hoc Networks," http://www.cs.umd.edu/~aram/wireless/survey.pdf. 8. David Boel et.al (Jan 2008 ) Securing Wireless Sensor Networks Security Architecture Journal of networks , Vol.3. No. 1. pp. 65 -76. 9. Perrig, A., Stankovic, J., Wagner, D. (2004), Security in Wireless Sensor Networks, Communications of the ACM, 47(6), 53-57. Prepared by Approved by Signature 1 2 3 4 5 6 7 8 9 10 11 12 13

I II I II I II I II I II I II I II I II I II I II I II I II I II