Professional Documents
Culture Documents
02
LESSON PLAN
Sub Code & Name : CU9257 /COMMUNICATIOIN NETWORK SECURITY Unit: I Branch: ME(CC) Semester: II
Security Goals, Types of Attacks: Passive attack, active attack, attacks on confidentiality, attacks on Integrity and availability. Security services and mechanisms, Techniques : Cryptography, Steganography, Revision on Mathematics for Cryptography. Objective: In this Unit Students will acquire basic knowledge about security, different types of attacks and various techniques used for security.
Session No Teaching Method
Topics to be covered
Time
Ref
1. 2. 3. 4. 5. 6. 7. 8. 9.
Security goals Types of attacks Attacks on confidentiality Attacks on integrity, availability Security services and mechanisms Techniques Mathematics for cryptography-Integer and modular arithmetic Mathematics for cryptography-Matrices Mathematics for cryptography- Linear congruence
(Page No.) 1(2-3) 1((3-6) 1((3-6) 1((3-6) 1(6-9) 1(9-10) 1(20-40) 1(40-45) 1(45-47)
BB BB BB BB BB BB BB BB BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: II Branch: ME(CC) Semester: II
Substitution Ciphers, Transposition Ciphers, Stream and Block Ciphers, Data Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, Principle of asymmetric key algorithms, RSA Cryptosystem. Objective: In this Unit students will acquire knowledge about the concepts of symmetric and asymmetric key algorithms.
Session No
Topics to be covered
Time
Ref
Teaching Method
Substitutional Ciphers Transposition Ciphers, Stream and Block Ciphers Data encryption standard Encryption, Key generation, Decryption Data Encryption Standard-Modes of Operation AES-Evaluation criteria, The Origin of AES, AES Evaluation,AES Cipher-Substitute Bytes Transformation, Shift Row Transformation AES Cipher-Mix Column Transformation, Add Round Key Transformation,AES Key Expansion, Equivalent Inverse Cipher RC4 Principle of Asymmetric key algorithms RSA Cryptosystem
(Page No.) 1(61-80) 1(80-87), 1(87-90) 1(159-181) 1(181-186) 1(191-212) 1(213-220) 1(238-242) 1(293-296) 1(301-314)
BB BB BB BB BB BB BB BB BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: III Branch: ME(CC) Semester: II
Unit syllabus:
INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT Message Integrity, Hash functions: SHA, Digital signatures : Digital signature standards. Authentication Entity Authentication: Biometrics, Key management Techniques. Objective: In this Unit students will acquire knowledge about authentication functions, integrity and key management techniques.
Session No Ref Topics to be covered Time Teaching Method
Message integrity Message integrity Hash functions Secured Hash Algorithm Digital signatures: Requirements, direct DS, Arbitrated DS. Digital signature standards: DSS approach, DS Algorithm Entity Authentication: Biometrics Key management techniques Key management techniques
(Page No.) 1(339-343) 1(339-343) 1(367-372) 1(367-372) 2(311-314) 2(311-314) 1(430-434) 1(437-453) 1(453-458)
BB BB BB BB BB BB BB BB BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: IV Branch: ME(CC) Semester: II
Unit syllabus: NETWORK SECURITY, FIREWALLS AND WEB SECURITY Introduction on Firewalls, Types of Firewalls, Firewall Configuration and Limitation of Firewall. IP Security Overview, IP security Architecture, authentication Header, Security payload, security associations, Key Management. Web security requirement, secure sockets layer, transport layer security, secure electronic transaction, dual signature Objective: In this Unit students will gain knowledge about network security, web security and firewalls.
Session No Ref Topics to be covered Time Teaching Method
Introduction on Firewalls and Types Introduction on Firewalls and Types Firewall configuration and limitations IP security overview, Architecture, Authentication header Encapsulating security payload, Combining Security Associations, Key management Web security requirement Secure socket layer Transport layer security-TLS, SET. Dual Signature Continuous Assessment Test - II
(Page No.) 2(517-525) 2(517-525) 2(525-531) 2(400-413) 2(413-432) 2(441-444) 2(444-457) 2(457-465) 2(465-472)
BB BB BB BB BB BB BB BB BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name : CU9257 / COMMUNICATIOIN NETWORK SECURITY Unit: V Branch: ME(CC) Semester: II
Unit syllabus: WIRELESS NETWORK SECURITY Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS.WEP for Wi-Fi network, Security for 4G networks: Secure A d hoc Network, secure Sensor Network Objective: In this Unit students will acquire knowledge about wireless network security.
Session No
Worm hole Attack Tunneling Denial of Service Attack Wired Equivalent Privacy for Wi-Fi networks Security for 4G networks Secure Adhoc network Secure Adhoc network Secure sensor network Summary and tutorial Continuous Assessment Test - III
50m 50m 50m 50m 50m 50m 50m 50m 50m 75m
(Page No.) Resources from web Resources from web Resources from web Resources from web Resources from web 6,7 6,7 8,9
Teaching Method
BB BB BB BB BB BB BB BB BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name : CU9257/ COMMUNICATIOIN NETWORK SECURI TY Branch: ME(CC) Semester: II
Course Delivery Plan: Week Units REFERENCES: 1. Behrouz A. Fourouzan , Cryptography and Network security Tata McGraw- Hill, 2008 2. William Stallings,"Cryptography and Network security: principles and practice",2nd Edition,Prentice Hall of India,New Delhi,2002 3. Atul Kahate , Cryptography and Network security, 2nd Edition, Tata McGrawHill, 2008 4. R.K.Nichols and P.C. Lekkas , Wireless Security 5. H. Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solution, IEEE Wireless Communications, Feb. 2004. 6. Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999. 7. "Security of Wireless Ad Hoc Networks," http://www.cs.umd.edu/~aram/wireless/survey.pdf. 8. David Boel et.al (Jan 2008 ) Securing Wireless Sensor Networks Security Architecture Journal of networks , Vol.3. No. 1. pp. 65 -76. 9. Perrig, A., Stankovic, J., Wagner, D. (2004), Security in Wireless Sensor Networks, Communications of the ACM, 47(6), 53-57. Prepared by Approved by Signature 1 2 3 4 5 6 7 8 9 10 11 12 13
I II I II I II I II I II I II I II I II I II I II I II I II I II