You are on page 1of 2

NETWORK SECURITY (4-0-0-4) Subject Code: 08 TE 330 Class # 1-2 (2 Hrs) 3-9 (7 Hrs) Chapter Title/ Reference Literature

UNIT-I Introduction R1:Chapter 1: 1.1-1.4 UNIT-I (contd...) Traditional Symmetric-Key Ciphers R1:Chapter 3: 3.1-3.4 UNIT-II Introduction to Modern SymmetricKey Ciphers R1:Chapter 5: 5.1,5.2 UNIT-II (contd...) Data Encryption Standard(DES) R1:Chapter 6: 6.1-6.5 UNIT- II (contd...) Advanced Encryption Standard (AES) R1:Chapter 7: 7.1-7.4 UNIT- II (contd...) Asymmetric-Key Cryptography R1:Chapter 10: 10.1,10.2,10.5 UNIT-III Message Integrity and Message Authentication R1:Chapter 11: 11.1,11.3 UNIT- III (contd...) Cryptographic Hash Functions R1:Chapter 12: 12.1,12.2 UNIT- III (contd...) Digital Signature R1:Chapter 13: 13.1-13.5 UNIT-IV Web Security R2:Chapter 17: 17.1-17.3 UNIT-IV (contd...) Intruders R2:Chapter 18: 18.1-18.3 UNIT-V Malicious Software R2:Chapter 19: 19.1,19.2 UNIT-V (contd...) Firewalls R2:Chapter 20: 20.1,20.2 Faculty: Mr.MVA Topics to be covered Security Goals, Attacks, Services and Mechanisms Introduction, Substitution Cipher, Transposition Cipher, Stream and Block Ciphers Modern Block Ciphers, Modern Stream Ciphers Introduction, DES Structure, DES Analysis, Multiple DES, Security of DES Introduction, Transformations, Key Expansion, Ciphers Introduction, RSA Cryptosystem, Elliptic Curve Cryptosystems Message Integrity, Message Authentication Total Hours: 52 % of Portion covered Reference Cumulative Chapter 03.85 03.85

13.46

17.31

10-11 (2 Hrs) 12-14 (3 Hrs) 15-17 (3 Hrs) 18-20 (3 Hrs) 21-23 (3 Hrs) 24-26 (3 Hrs) 27-32 (6 Hrs)

03.85

21.15

05.77

26.92

05.77

32.69

05.77

38.46

05.77

44.23

Introduction, SHA-512 Comparison, Process, Services, Attacks on Digital Signature, RSA Digital Signature Scheme, Digital Signature Standard (DSS) Web Security Considerations, Secure Socket Layer (SSL) and Transport Layer Security (TSL), Secure Electronic Transaction (SET) Intruders, Intrusion Detection, Password Management Viruses and Related Threats, Virus Countermeasures Firewall Design Principles, Trusted Systems

05.77

50.00

11.54

61.54

33-39 (7 Hrs) 40-43 (4 Hrs) 44-47 (4 Hrs) 48-52 (5 Hrs)

13.46

75.00

07.69

82.69

07.69

90.38

09.62

100.00

Literature: Book Type Code R1 Reference Book R2 R3 Title & Author Cryptography and Network Security Behrouz A. Forouzan Cryptography and Network Security William Stallings Cryptography and Network Security Atul Kahate Publication Info Publisher TMH Pearson Education TMH

Edition -

Year 2007 2003 2003

Test/Quiz Syllabus: To be announced later.

You might also like