You are on page 1of 4

Name of Department:- Department of Computer Science and Engineering 1. 2. 3. 4. 5. 6. 7. 8. 9.

Subject Code: Contact Hours:


MCN-203

Course Title: 3 T: 1 3 MTE 30 P: -

Cyber and Information Security

L:

Examination Duration (Hrs): Relative Weight: Credits: Semester: Subject Area: CWS 20 4

Theory PRS NIL

Practical ETE 100

PRE NIL

2nd Semester Core course

Pre-requisite: Computer Networks and Data communication Objective: To provide a comprehensive understanding of Issues of symmetric and asymmetric cryptographic Schemes and key management issues. Applications of algorithms for secured transmission. Network security principles and measures to prevent vulnerabilities and security attacks in the networks. Details of the Course:Contents Overview: Services, Mechanisms and attacks, OSI security architecture, Model for network security. Classical Encryption Techniques: Symmetric cipher model, Substitution techniques, Transposition techniques, Steganography, Cyber Security. Block Ciphers and Data Encryption Standards: Simplified DES, Block cipher principles, DES, Strength of DES. Block cipher design principles, Block cipher modes of operation. Double and triple DES, symmetric key distribution, Cyber threats. Public Key Cryptography and RSA: Principles of public key cryptosystems, RSA algorithm, Problems. Other Public Key Crypto Systems and Key management, approaches for distribution of public keys, Diffie-Hellman key exchange. Message Authentication and Hash Functions: Authentication requirements, Authentication functions, Message authentication codes, Hash functions, Security of hash functions and MACs. Digital Signature: Concept of Digital signature, Approaches to digital signature, Digital signature standard. Authentication Applications: Kerberos, X.509 authentication service, Kerberos encryption technique Data and Network Security: E-Mail security: Threats to E-mail, achieving authentication, confidentiality, compression, e-mail compatibility, using Pretty Good Privacy, Concept of Key-ring Virtual Private Networks: VPN and its types Tunneling Protocols Contact Hours 9

10. Sl. No. Unit I

Unit II

Unit III

Unit IV

Unit V

Tunnel and Transport Mode Authentication Header-Encapsulation Security Payload (ESP)- IPSec Protocol Suite Firewalls: Firewall design principles; Trusted systems, Problems Intrusion detection Techniques, Honey Pots and Honey Nets Total

42

Text Books: 1. William Stallings, Cryptography and Network Security, 3rd edition, Pearson Education (Asia) Pvt. Ltd./ Prentice Hall of India, 2003. 2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, 2nd edition, Pearson Education (Asia) Pvt. Ltd., 2002. 3. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003. 4. Eric Maiwald, Fundamentals of Network Security, McGraw-Hill, 2003.

Name of Department:- Department of Computer Science and Engineering 1. 2. 3. 4. 5. 6. 7. 8. 9. Subject Code: Contact Hours:
MCS-203

Course Title: 3 T: 1 3 MTE 30 P: -

Information Security

L:

Examination Duration (Hrs): Relative Weight: Credits: Semester: Subject Area: CWS 20 4

Theory PRS NIL

Practical ETE 100

PRE NIL

2nd Semester Core course

Pre-requisite: Computer Networks and Data communication Objective: To provide a comprehensive understanding of Issues of symmetric and asymmetric cryptographic Schemes and key management issues. Applications of algorithms for secured transmission. Network security principles and measures to prevent vulnerabilities and security attacks in the networks. Details of the Course:Contents Overview: Services, Mechanisms and attacks, OSI security architecture, Model for network security. Classical Encryption Techniques: Symmetric cipher model, Substitution techniques, Transposition techniques, Steganography, Problems Block Ciphers and Data Encryption Standards: Simplified DES, Block cipher principles, DES, Strength of DES. Block cipher design principles, Block cipher modes of operation, Problems. Double and triple DES, symmetric key distribution Public Key Cryptography and RSA: Principles of public key cryptosystems, RSA algorithm, Problems. Other Public Key Crypto Systems and Key management, approaches for distribution of public keys, Diffie-Hellman key exchange, Problems Message Authentication and Hash Functions: Authentication requirements, Authentication functions, Message authentication codes, Hash functions, Security of hash functions and MACs. Digital Signature: Concept of Digital signature, Approaches to digital signature, Digital signature standard. Authentication Applications: Kerberos, X.509 authentication service, Kerberos encryption technique Data and Network Security: E-Mail security: Threats to E-mail, achieving authentication, confidentiality, compression, e-mail compatibility, using Pretty Good Privacy, Concept of Key-ring Contact Hours 9

10. Sl. No. Unit I

Unit II

Unit III

Unit IV

Unit V

Virtual Private Networks: VPN and its types Tunneling Protocols Tunnel and Transport Mode Authentication Header-Encapsulation Security Payload (ESP)- IPSec Protocol Suite Firewalls: Firewall design principles; Trusted systems, Problems Intrusion detection Techniques, Honey Pots and Honey Nets Total

42

Text Books: 1. William Stallings, Cryptography and Network Security, 3rd edition, Pearson Education (Asia) Pvt. Ltd./ Prentice Hall of India, 2003. 2. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, 2nd edition, Pearson Education (Asia) Pvt. Ltd., 2002. 3. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003. 4. Eric Maiwald, Fundamentals of Network Security, McGraw-Hill, 2003.

You might also like