Professional Documents
Culture Documents
A. Introduction: This course is offered by the Department of Computer Science & Engineering; the course aims to provide the students basic background on information systems.
This is targeting students who wish to pursue a career in the field of information security. The course includes understanding the principles for multi-layer security and
management systems for the network. The focus is on techniques and protocols used for different types of security policies.
[3202.1] Describe the concept of information systems and classical cryptography. [L2]
[3202.2] Apply the concepts of cipher algorithms with mathematical standards. [L3]
[3202.3] Examine public key encryption with key exchange fundamentals. [L3]
[3202.4] Implement authentication management and its relevant issues. [L4]
[3202.5] Infer Transport Layer Security and IP Security and its relevant issues. [L2]
[PO.2] Problem analysis: Identify, formulate, research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences
School of Computer Science and Engineering
Department of Computer Science and Engineering
[PO.3] Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs
with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations
[PO.4] Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of
data, and synthesis of the information to provide valid conclusions
[PO.5] Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modelling to complex
engineering activities with an understanding of the limitations
[PO.6] The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal, and cultural issues and the consequent
responsibilities relevant to the professional engineering practice
[PO.7] Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the
knowledge of, and need for sustainable development
[PO.8] Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practices
[PO.9] Individual and teamwork: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings
[PO.10] Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to
comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions
[PO.11] Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work,
as a member and leader in a team, to manage projects and in multidisciplinary environments
[PO.12] Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of
technological change
[PSO.1] Will be able to design, develop and implement efficient software for a given real life problem.
[PSO.2] Will be able to apply knowledge of AI, Machine Learning and Data Mining in analysing big data for extracting useful information from it and for performing
predictive analysis.
[PSO.3] Will be able to design, manage and secure wired/ wireless computer networks for transfer and sharing of information.
School of Computer Science and Engineering
Department of Computer Science and Engineering
Assessment Plan:
Case Study 15
F. Text Books
1. B. A. Forouzan, D. Mukhopadhyay, “Cryptography and Network Security”, McGraw Hill, 3rd Edition, 2015.
2. W. Stallings, “Cryptography and Network Security: Principles and Practice”, Prentice Hall, 5th edition, 2010.
G. References:
1. J. Pieprzyk, T. Hardjono, J. Seberry, Fundamentals of Computer Security, Springer International Edition, 2003.
Sr. No. Topics to be covered Session Outcome Mode of Delivery Corresponding CO Mode of Assessing
the Outcome
1 To acquaint and clear Lecture NA NA
Basic objectives of cryptography teachers' expectations and
understand student
expectations
2 Understanding of Lecture 3202.1 Class Quiz
Secret-key and public-key cryptography different key concepts Sessional 1
End Term
School of Computer Science and Engineering
Department of Computer Science and Engineering
3 Knowledge about different Lecture and Flipped 3202.1 Class Quiz
Cryptanalysis: Attack models- Passive &
attack models Class Sessional 1
active attacks
End Term
5-6 Cipher techniques- Ceaser Cipher, Understanding the working Lecture 3202.1 Class Quiz
of substitution techniques of Sessional 1
Affine Cipher cipher End Term
7-8 Understanding the working Lecture 3202.1 Class Quiz
Cipher techniques- Vigenere Cipher, Sessional 1
of
substitution techniques of End Term
Playfair Cipher
cipher
9-10 Understanding the working Lecture 3202.1 Class Quiz
Hill cipher, Sessional 1
of
transposition techniques of End Term
Transposition Technique
cipher
11-12 Understanding of Lecture 3202.2 Class Quiz
Modular arithmetic modular functions Sessional 1
End Term
13-14 Know about GCD & Lecture 3202.2 Class Quiz
GCD, Primality Testing primality testing Sessional 1
End Term
15-16 Understanding of Chinese Lecture 3202.2 Class Quiz
Chinese Remainder Theorem remainder theorem Sessional 1
End Term
17-18 Understanding the Lecture 3202.2 Class Quiz
Modular square roots, finite fields square roots concept Sessional 1
End Term
School of Computer Science and Engineering
Department of Computer Science and Engineering
19-20 Modes of operation Knowledge of DES Lecture 3202.2 Class Quiz
DES and its variants Sessional 1
End Term
21 Knowledge of DES & its Lecture 3202.2 Class Quiz
DES and its variants variant Sessional 1
End Term
22 AES Structure, AES Round Functions Knowledge of AES 3202.2 Class Quiz
Sessional 1
End Term
23 Knowledge of AES & its Lecture 3202.2 Class Quiz
AES Key Expansion functions Sessional 1
End Term
24-25 Recall different hash Flipped Class 3202.3 Class Quiz
MD5 algorithms Sessional 1
End Term
26 Identify SHA-1 & Hash Lecture 3202.3 Class Quiz
SHA-1 Algorithms Sessional 1
End Term
27 Explain keyed Hash Lecture 3202.3 Class Quiz
Keyed hash functions algorithms Sessional 1
End Term
28 Recall attacks on Hash Lecture 3202.3 Class Quiz
Attacks on Hash functions functions Sessional 1
End Term
School of Computer Science and Engineering
Department of Computer Science and Engineering
29-30 Understanding concept Lecture 3202.3 Class Quiz
RSA algorithm Sessional 1
RSA Algorithm
End Term
31 Diffie-Hellman problem, known algorithms Understanding concept of Lecture 3202.3 Class Quiz
for solving intractable problems. DH problem End Term
41 Zero-knowledge protocols Know the concept of zero- Lecture 3202.4 Class Quiz
knowledge protocols End Term
42 Web Security Issues Know the concept of ISO Lecture 3202.5 Class Quiz
standards End Term
43 Secure Socket Layer (SSL) Understanding the Lecture 3202.5 Class Quiz
concept of SSL End Term
44 Transport Layer Security (TLS) Understanding the Lecture 3202.5 Class Quiz
concept of TLS End Term