You are on page 1of 4

CRYPTOGRAPHY, NETWORK SECURITY AND CYBER LAW

[As per Choice Based Credit System (CBCS) scheme]


(Effective from the academic year 2016 -2017)
SEMESTER – VI
Subject Code 15CS61 IA Marks 20
Number of Lecture Hours/Week 04 Exam Marks 80
Total Number of Lecture Hours 50 Exam Hours 03
CREDITS–04
Course objectives: This course will enable students to
 Explain the concepts of Cyber security
Illustrate key management issues and solutions.
Familiarize with Cryptography and very essential algorithms
Introduce cyber Law and ethics to be followed .

Prerequisites:
Different Cryptographic Techniques, Algorithms, Ethics and Laws,Attack complexities,
Ethical hacking and other protocol standards.

Teaching Revised
Hours Bloom’s
Taxonomy
Levels (RBT
Level)
Module -1
Introduction: Introduction - Cyber Attacks, Defence 10 Hours L1,L2,L3
Strategies and Techniques, Guiding Principles(Jithin),
Mathematical Background for Cryptography - Modulo 21.7.21
Arithmetic’s, The Greatest Comma Divisor, Useful
Algebraic Structures, Chinese Remainder Theorem(IAN),
Basics of Cryptography - Preliminaries, Elementary
Substitution Ciphers, Elementary Transport Ciphers, Other
Cipher Properties, Secret Key Cryptography – Product
Ciphers, DES Construction.(poulami)
Text book 1: Chapter 1: 1.1,1.2,1.3, Chapter 3:
3.1,3.2,3.3,3.4 Chapter 4: 4.1,4.2,4.3,4.4 Chapter 5:
5.1,5.2
Recommended Learning: AES Algorithm
Module -2:
Public Key Cryptography and RSA – RSA Operations, Why 10 Hours L1,L2,L5
Does RSA Work?, Performance, Applications, Practical
Issues, Public Key Cryptography Standard (PKCS) (aman), 19.7.21
Cryptographic Hash - Introduction, Properties, Construction
(aditi),
Applications and Performance, The Birthday Attack,
Discrete Logarithm and its Applications - Introduction,
Diffie-Hellman Key Exchange, Other Applications.(Habeeb)
Text book 1: Chapter 6: 6.1,6.2,6.3,6.4,6.5,6.6 Chapter 7:
7.1,7.2,7.3,7.4,7.5, Chapter 8: 8.1,8.2,8.3
Module - 3:
Key Management - Introduction, Digital Certificates, Public 10 Hours L1,L2,L3,L5
Key Infrastructure, Identity–based Encryption(Anudeep)
(Manishankar), Authentication–I - One way Authentication, 23.7.21
Mutual Authentication, Dictionary Attacks(Anusha),
Authentication – II – Centalised Authentication, The
Needham-Schroeder Protocol, Kerberos, Biometrics, IPSec-
Security at the Network Layer – Security at Different layers:
Pros and Cons, IPSec in Action(Priyanka), Internet Key
Exchange (IKE) Protocol, Security Policy and IPSEC,
Virtual Private Networks(, Security at the Transport Layer -
Introduction, SSL Handshake Protocol, SSL Record Layer
Protocol, OpenSSL.(suhashree)
Text book 1: Chapter 10: 10.1,10.2,10.3,10.4, Chapter 11:
11.1,11.2,11.3 Chapter 12:12.1,12.2,12.3,12.4 Chapter 13:
13.1,13.2,13.3,13.4,13.5, Chapter 14: 14.1,14.2,14.3,14.4
Module-4:
IEEE 802.11 Wireless LAN Security - Background, 10 Hours L1,L2,L3
Authentication, Confidentiality and Integrity(Apoorv
Sharma)(MANASWITHA), Viruses, Worms, and Other 24.7.21
Malware(Ajay Karthick)(LATHIKA), Firewalls –Basics,
Practical Issues, Intrusion Prevention and Detection -
Introduction, Prevention Versus Detection, Types of 28.7.21(M
Instruction Detection Systems, DDoS Attacks anaswitha
Prevention/Detection, Web Service Security – Motivation, ,Lathika,
Technologies for Web Services, WS- Security, SAML, Manishan
Other Standards.(Rekha shreedhar) kar)
Text book 1: Chapter 15: 15.1,15.2,15.3 Chapter 19:
19.1,19.2,19.3,19.4,19.5,19.6,19.7 Chapter 21: 21.1,21.2
Chapter 22: 22.1,22.2,22.3,22.4 Chapter 25:
25.1,25.2,25.3,25.4,25.5

Module-5:
IT act aim and objectives, Scope of the act, Major Concepts, 10 Hours L1,L2,L3
Important provisions, Attribution, acknowledgement, and 26.7.21
dispatch of electronic records, Secure electronic records and
secure digital signatures(Arnab), Regulation of certifying
authorities: Appointment of Controller and Other officers,
Digital Signature certificates, Duties of Subscribers,
Penalties and adjudication(Kishore), The cyber regulations
appellate tribunal, Offences, Network service providers not
to be liable in certain cases, Miscellaneous Provisions(Amit)
Text book 1: Chapter 27: 27.1, 27.2, 27.3, 27.4, 27.5, 27.6,
27.7, 27.8, 27.9, 27.10, 27.11, 27.12, 27.13, 27.14.

Text Books:
1. Cryptography, Network Security and Cyber Laws – Bernard Menezes, Cengage
Learning, 2010 edition (Chapters-1,3,4,5,6,7,8,9,10,11,12,13,14,15,19(19.1-
19.5),21(21.1-21.2),22(22.1-22.4),25.

Reference Books:
1.Cryptography and Network Security- Behrouz A Forouzan, Debdeep Mukhopadhyay, Mc-
GrawHill, 3rd Edition, 2015
2. Cryptography and Network Security- William Stallings, Pearson Education, 7th Edition
3. Cyber Law simplified- Vivek Sood, Mc-GrawHill, 11th reprint , 2013
4. Cyber security and Cyber Laws, Alfred Basta, Nadine Basta, Mary brown, ravindra
kumar, Cengage learning.

Web resources/E-links:
1 http://math.tut.fi/~ruohonen/MC.pdf
2 http://delta.cs.cinvestav.mx/~francisco/cripto/PKCS.pdf
3 https://www.cs.utexas.edu/~byoung/cs361/lecture60.pdf
4 https://docs.oracle.com/cd/E15523_01/web.1111/b32511/introsecurity.htm#WSSEC2342
5 https://www.certificate.digital/certificate/

Course Code Course Outcome


C309.1 Discuss cryptography and its need to various applications
C309.2 Design and develop simple cryptography algorithms
C309.3 Understand the usage of different size key length in cryptographic algorithms.
C309.4 Understand cyber security and need cyber Law
C309.5 Know the different types of attacks on peers

Mapping of Course Outcomes to Program Outcomes


PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO PSO
1 2 3 4 5 6 7 8 9 0 1 2 1 2 3
C309.1
3 3 3 3 - 2 - 2 - - - - 3 3 3

C309.2
3 3 3 3 - 3 - 2 - - - - 3 3 -

C309.3
3 2 2 3 - 3 - 2 - - - - 3 3 -

C309.4
3 2 2 3 - 3 - 2 - - - - 3 3 3

C309.5
3 2 2 3 - 3 - 3 - - - - 3 3 -

Average 3 2 2 3 3 2 3 3 1.5

Question paper pattern:

 The question paper will have ten questions.

 Each full Question consisting of 16 marks.

 There will be 2 full questions (with a maximum of four sub questions) from each
module.
 Each full question will have sub questions covering all the topics under a module.
 The students will have to answer 5 full questions, selecting one full question from
each module.

Assessment Method:
1. Direct Assessment
a. Continuous:
1. Internal Assessment Tests [Average of best 2 tests] -- Max. Marks 15
2. Assignments  [3 Assignments] – Max. Marks 5
3. Quiz /Tutorial/Class Test Encouragement& Improvement
b. Semester End Assessment:
1. Semester end examination evaluated for 80 Marks.
Total : a + b =100 Marks
2. Indirect Assessment
Indirect Assessment is through course exit survey

You might also like