You are on page 1of 2

DEPARTMENT OF CSE

NRI INSTITUTE OF TECHNOLOGY POTHAVARAPPADU


POTHAVARAPPADU (V), (Via) NUNNA, AGIRIPALLI (M), KRISHNA (DT), A.P. PIN: 521 212
Lecture Plan for the Academic Year 2015 - 2016

IV B.Tech (CSE ) A & B Name: Dr.K.V.Sambasivarao


Ist Semester Subject: CRYPTOGRAPHY AND NETWORK SECURITY

SNO TOPIC NO.OF NO. OF CUMULATIVE


CLASSES CLASSES

UNIT 1:

1.1 Introduction: Security Attacks. 1 1


1.2 Security Services, Security Mechanisms, and a Model for 1
2
Network Security
1.3 Non-Cryptographic Protocol Vulnerabilities - DoS, DDoS, 1
3
Session Hijacking and Spoofing
1.4 Software Vulnerabilities – Phishing 1 4
1.5 Buffer Overflow, Format String Attacks, SQL Injection, 1
5
Basics of Cryptography - Symmetric Cipher Model
1.6 Substitution Techniques, Transportation Techniques 2 7
1.7 Other Cipher Properties – Confusion 2 9
1.8 Diffusion, Block and Stream Ciphers 1 10
UNIT 2:
2.1 Secret Key Cryptography: Data Encryption Standard(DES). 1 11
2.2 Strength of DES. 1 12
2.3 Block Cipher Design Principles and Modes of Operations 1 13
2.4 Triple DES 1 14
2.5 International Data Encryption algorithm 1 15
2.6 Blowfish, CAST-128, AES 2 17
UNIT 3:
3.1 Number Theory 1 18
3.2 Prime and Relatively Prime Numbers 1 19
3.3 Modular Arithmetic 1 20
3.4 Fermat’s and Euler’s Theorems 1 21
3.5 The Chinese Remainder Theorem 1 22
3.6 Discrete Logarithms. 2 24
UNIT 4:
4.1 Public Key Cryptography 2 26
4.2 Principles of Public Key Cryptosystems 1 27
4.3 RSA Algorithm 2 29
4.4 Diffie-Hellman Key Exchange, Introduction to Elliptic
2 31
Curve Cryptography.
UNIT 5:
5.1 Cryptographic Hash Functions: Applications of
1 32
Cryptographic Hash Functions
5.2 Secure Hash Algorithm. 1 33
5.3 Message Authentication Codes - Message Authentication
2 35
Requirements and Functions
5.4 HMAC 2 37
5.5 Digital signatures, Digital Signature Schemes 2 39
5.6 Authentication Protocols, Digital Signature Standards. 1 40
UNIT 6:
6.1 Authentication Applications: Kerberos Introduction 1 41
6.2 Kerberos 2 43
6.3 Key Management and Distribution 2 45
6.4 X.509 Directory Authentication service 1 46

6.5 Public Key Infrastructure 1 47


6.6 Electronic Mail Security: Pretty Good Privacy 2 49
6.7 S/MIME 1 50
UNIT 7 :
7.1 IP Security: Overview 1 51
7.2 Architecture, Authentication Header, Encapsulating 2
53
Security Payload
7.3 Combining security Associations, Internet Key Exchange, 1 54
7.4 Web Security: Web Security Considerations 1 55
7.5 Secure Sockets Layer and Transport Layer Security, 1
56
Electronic Payment. w.e.f.2010-2011 academic year
UNIT 8:
8.1 System Security: Intruders 1 57
8.2 Intrusion Detection, Password Management 2 59
8.3 Malicious Software - Types, Viruses 2 61
8.4 Virus Countermeasures, Worms, Firewalls - Characteristics 1 62
8.5 Types of Firewalls, Placement of Firewalls 1 63
8.6 Firewall Configuration, Trusted systems. 1 64
Total no of classes: 64

Signature: Dr.K.V.Sambasivarao HOD


Signature

You might also like