You are on page 1of 11

K J Somaiya Institute of Engineering and Information Technology Use dept

An Autonomous Institute Affiliated to University of Mumbai short form

Subject: Cryptography and System Security (2021) - Faculty –Shyamal Virnodkar


Course Outcomes, Mapping of COs with POs, Course Assessment and Lesson Plan
Semester-V
Course Description:
Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message
to view its contents. When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and
other plain-text messages. System security encompasses all facets of accessing information assets. From authentication, to
software updates, anti-virus protection, and modifications - security is a key component to a device operating at its optimum. This
course starts with the introduction of number theory and cryptography fundamentals. Then, It explains the symmetric and asymmetric
key cryptography and key management techniques. It explains different hash functions. It also give the authentication protocols and
digital signature schemes.

Unit wise Outcomes:

Un Unit Outcomes Teaching Evaluation BT level


it Methodologies: Methods
No Formative Summative

1 Introduction - At the end of this unit a student will be able to: White board QA in ISE Remember
Number PPT classroom ESE ing,
Theory and 1. Describe the basic concepts cryptography Flipped Classrooms Quiz Assignment Understan
Basic ding
2.Describe the concepts of modular arithmetic and
Cryptography
number theory.
3. Explain and apply different classical encryption
techniques.
2 Symmetric At the end of this unit a student will be able to : White board QA in ISE Remember
and 1 Illustration block cipher and stream ciphers PPT classroom ESE ing,
Asymmetric 2. Explain symmetric key distribution and symmetric Quiz Assignment Understan
IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Un Unit Outcomes Teaching Evaluation BT level


it Methodologies: Methods
No Formative Summative

key key agreement. ding


Cryptograph 3.Apply different encryption and decryption techniques
y and key to solve problems related to confidentiality and
Management authentication
3 Cryptograph At the end of this unit a student will be able to: White board QA in ISE Remember
ic Hash PPT classroom ESE ing,
Functions 1 Describe different cryptographic hash functions like Quiz Assignment Understan
MD5 SHA1 ding,
2. Apply different message digest and digital signature Apply
algorithms to verify integrity and achieve authentication
and design secure applications

4 Authenticati At the end of this unit a student will be able to: White board QA in ISE Remember
on Protocols 1. Understand and analyse different authentication methods PPT classroom ESE ing,
& Digital 2. Explain attacks on digital certificate Quiz Assignment Understan
Signature ding
Schemes

5 Network At the end of this unit a student will be able to : White board QA in ISE Remember
Security and 1. Interpret network security basics PPT classroom ESE ing,
Applications 2. Analyse different attacks on networks and Flipped Classrooms Quiz Assignment Understan
evaluate the performance of firewalls and security ding
protocols.

IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.


K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Un Unit Outcomes Teaching Evaluation BT level


it Methodologies: Methods
No Formative Summative

6 System At the end of this unit a student will be able to : White board QA in ISE Apply
Security 1. Analyse system security concept to recognize PPT classroom, ESE
malicious code. Group Presentations
2. Develop system security aspects. Discussion

7 Course Recap of the contents White board QA in ISE


Conclusion PPT classroom ESE
Quiz, Viva
Group
Discussion

Teaching Methodologies: You may mention the short forms in lesson plan

 Direct Instruction (PPT/Black  Cooperative method (please  Problem based


board based) DI specify technique used)  Brain storming
 Flipped Classrooms FC  Game-based Learning  any other
 Role Play

Course Outcomes:
After taking this Course a student will be able to:
1. Describe the concepts of modular arithmetic and number theory.
IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

2. Apply different encryption and decryption techniques to solve problems related


to confidentiality and authentication
3. Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications
4. Interpret network security basics, analyse different attacks on networks and
evaluate the performance of firewalls and security protocols.
5. Analyse system security concept to recognize malicious code.
6. Develop system security aspects.

CO Course outcomes PO
No: Mapped
Course Describe the concepts of modular arithmetic and number theory.
id.1
Course Apply different encryption and decryption techniques to solve problems related
id.2 to confidentiality and authentication

Course Apply different message digest and digital signature algorithms to verify
id.3 integrity and achieve authentication and design secure applications

Course Interpret network security basics, analyse different attacks on networks and
id.4 evaluate the performance of firewalls and security protocols.

Course Analyse system security concept to recognize malicious code.


id.5
Course Develop system security aspects.
id.6

Course Assessment Planning (tick applicable method. You may replace given methods with your desired ones)

IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.


K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Assessment Method
(all methods mentioned are suggestive and is to be modified as per individual faculty convenience and syllabus
requirements. Please delete what you don’t use and add any method not mentioned below)
Summative
Formative
(anything for which you give marks. Term test and end semester
(How you test learning. Not
Course exams may be deleted or kept blank for SAT courses)
counted towards marks)
outcomes
Quiz QA Discussion Continuous assessment of 10 marks

Presentation Case Assignment Term End


Study Tests semester
exam
CO1 Y Y Y Test 1 Y
CO2 Y Y Y Test 1 Y
CO3 Y Y Y Test 1 Y
CO4 Y Y Y Test 2 Y
CO5 Y Y Y Y Test 2 Y
CO6 Y Y Y Test 2 Y
Formative: different methods may be quiz, Q and A in class, cooperative learning or TPS for groups involving assessment ie, after discussion they have to
speak out what they have learnt as in Jigsaw method, or a post session quiz. Keyword here is assessment. So some form of testing should be there. But it is only
to test knowledge and not to assign marks. You may add your own method as long as you are able to explain what you have done and how you are testing them
etc.

Continuous assessment of 10 marks: here add methods you use to give 10 marks to students. Varies from teacher to teacher. Eg-
presentation, case study, assignment, design problem , quizzes, peer review, reflective journal, log book

### add any new column as per your subject and delete what you don’t use
IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Text Books:

[1] William Stallings, “Cryptography and Network Security, Principles and


Practice”, 6th Edition, Pearson Education, March 2013
[2]. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw
Hill
[3]. Behrouz A. Forouzan&DebdeepMukhopadhyay,“Cryptography and Network
Security” 3rd Edition, McGraw Hill Lecture number format=chapterno.lectureno.

Reference Books:
[1] Bruce Schneier,“Applied Cryptography, Protocols Algorithms and Source
Code in C”, Second Edition, Wiley.
[2]. Atul Kahate, “Cryptography and Network Security”,Tata McGraw-Hill
Education, 2003
[3]. Eric Cole, “Network Security Bible”,Second Edition, Wiley, 2011

Day Wise Plan

Sr.No Topic Lecture Books Proposed Actual Date Teaching BT


No referred Date method
1. Prerequisites and Course Outline 0.1 T1, T2 10/01/2022 DI 1,2
2. Security Goals, Attacks, Services 1.1 T1, T2 11/01/2022 DI 1,2
and Mechanisms, Techniques.

IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.


K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Sr.No Topic Lecture Books Proposed Actual Date Teaching BT


No referred Date method
3. Modular Arithmetic: Euclidean 1.2 T1, T2 12/01/2022 DI 1,2
Algorithm, Fermat ‘s and Euler ‘s
theorem
4. Sums on Euclidean Algorithm, 1.3 T1, T2 17/01/2022 DI 1,2
Fermat ‘s and Euler ‘s theorem
5. Classical Encryption techniques, 1.4 T1, T2 18/01/2022 DI 1,2
Symmetric cipher
model
6. Mono-alphabetic and polyalphabetic 1.5 T1, T2 19/01/2022 DI 1,2
substitution techniques:
Vigenère cipher,
Playfair cipher
7. Hill cipher SUM 1.6 T1, T2 24/01/2022 DI 1,2
8. Transposition techniques: keyed and 1.7 T1, T2 25/01/2022 DI 1,2
keyless
transposition ciphers
9. Block cipher principles, block 2.1 T1, T2 31/01/2022
cipher modes of operation,

10. DES, Double DES, Triple DES, 2.2 T1, T2 01/02/2022 DI 1,2

11. DES, Double DES, Triple DES, 2.3 T1, T2 02/02/2022 DI 1,2

12. Advanced Encryption 2.4 T1, T2 07/02/2022


IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Sr.No Topic Lecture Books Proposed Actual Date Teaching BT


No referred Date method
Standard (AES). SUM
13. Stream Ciphers: RC4 algorithm, 2.5 T1, T2 08/02/2022 DI 1,2

14. Public key cryptography: Principles 2.6 T1, T2 09/02/2022 DI 1,2


of public key
cryptosystems
15. The RSA Cryptosystem 2.7 T1, T2 21/02/2022 DI 1,2

16. The knapsack cryptosystem, 2.8 T1, T2 22/02/2022 DI 1,2

17. Symmetric Key 2.9 T1, T2 23/02/2022 DI 1,2


Distribution: KDC.
18. Needham-schroeder protocol. 2.10 T1, T2 28/02/2022 DI 1,2

19. Kerberos: Kerberos 2.11 T1, T2 02/03/2022 DI 1,2


Authentication protocol
20. Symmetric key agreement: Diffie 2.12 T1, T2 07/03/2022 DI 1,2
Hellman,

21. Public key 3.1 T1, T2 08/03/2022 DI 1,2


Distribution: Digital Certificate:
X.509, PKI
22. Cryptographic hash functions, 3.2 T1, T2 09/03/2022 DI 1,2
Properties of secure hash
IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Sr.No Topic Lecture Books Proposed Actual Date Teaching BT


No referred Date method
function.
23. MD5, SHA-1 3.3 T1, T2 09/03/2022 DI 1,2

24. MAC, HMAC, CMAC 4.1 T1, T2 14/03/2022 DI 1,2

25. User Authentication, Entity 4.2 T1, T2 15/03/2022 DI 1,2


Authentication: Password
Base.
26. Challenge Response Based, Digital 4.3 T1, T2 16/03/2022 DI 1,2
Signature
27. Attacks on Digital Signature 4.4 T1, T2 16/03/2022 DI 3

28. Digital Signature Scheme: T1, T2 21/03/2022 DI 1,2


RSA
29. Network security basics: TCP/IP 5.1 T1, T2 22/03/2022 DI 1,2
vulnerabilities (Layer
wise).
30. TCP/IP vulnerabilities 5.2 T1, T2 23/03/2022 DI 1,2
(Layer wise).
31. TCP/IP vulnerabilities 5.3 T1, T2 28/03/2022 DI 1,2
(Layer wise).
32. Network Attacks: 5.4 T1, T2 29/03/2022 DI 1,2
Packet Sniffing,
ARP spoofing,
IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Sr.No Topic Lecture Books Proposed Actual Date Teaching BT


No referred Date method
33. port 5.5 T1, T2 30/03/2022 DI 1,2
scanning, IP spoofing.
34. Denial of Service: DOS attacks, 5.6 T1, T2 11/04/2022 DI 1,2
ICMP flood.

35. SYN flood, 5.7 T1, T2 12/04/2022 DI 1,2


UDP flood
36. Distributed Denial of Service, 5.8 T1, T2 13/04/2022 DI 1,2

37. Internet Security 5.9 T1, T2 18/04/2022 DI 1,2


Protocols: PGP, SSL, IPSEC.
38. Network security: IDS, Firewalls. 5.10 T1, T2 19/04/2022 DI 1,2

39. Buffer Overflow. 6.1 T1, T2 20/04/2022 DI 1,2

40. Malicious Programs: Worms and 6.2 T1, T2 25/04/2022 DI 1,2


Viruses.
41. SQL injection. 6.3 T1, T2 26/04/2022 DI 1,2

42. Recap of Modules, Outcomes, - T1, T2 27/04/2022 PB 3,4


Applications, and Summarization

Activities Planned if any (optional)


IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.
K J Somaiya Institute of Engineering and Information Technology Use dept
An Autonomous Institute Affiliated to University of Mumbai short form

Sr. Activity Details


No Name of the Event Date Venue CO.NO
(Expert Talk/Workshop/seminar/Industrial Visit /GD
etc )
1. Expert talk
2.
3

Question Paper and CO analysis

Term Test 1 Term Test 2 End Semester


Q.
BT Level CO BT Level CO BT Level CO
No
1a
1b
2a
2b
3a
3b

IQAC/Lesson -plan/Version No-03_21/08/07/2021 Page|1.

You might also like