Welcome to My Personal Website!!
Subject Code: IT/T/424
Credit Hours/Class:
2 Periods/Lecture & 2 Lectures/Week
- Theory Class
Marks Distribution: Two Class Test of 30 marks each of one hour duration.
Final exam of 100 marks for 3 hours of written exam
Course Objectives:
To provide solid foundation of the principal of Cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithm.
To provide an awareness of network security issues involving stand alone computers, locally networked computers and remotely networked computers.
To encourage investigation into what factors are likely to result in successful network security.
To provide foundations of the basic system security testing for vulnerabilities and procedures of backup and recovery.
Course Outcomes:
Provide students with a high‐level understanding of how information security functions in an organization.
Topics will be covered on knowledge, professional skill, and attitude‐centric:
Knowledge:
Explain the foundations of Cryptography and network security
Identify common network security vulnerabilities/attacks
To master understanding external and internal threats to an organization
Explain the basic concepts of symmetric & asymmetric cryptography
To master fundamentals of secret and public cryptography
Demonstrate detailed knowledge of the role of encryption to protect data.
Explain the fundamental concepts of different digital signature schemes
Identity security weaknesses in different networking environment
To master protocols for security services
To be exposed to original research in network security
Professional Skill
Identify the appropriate cryptography scheme & security mechanism for different computing environment and information systems
Analyze the security of different computer systems & networks
To be familiar with network security designs using available secure solutions (such as PGP, SSL, IPSec, etc)
Attitude
Develop a critical mind for evaluating the security of computer systems
Syllabus Outline:
Part I:
Overview (01), Symmetric Ciphers (03), Classical Encryption Techniques (02), Block Ciphers,
Data Encryption Standard (04)
Part II:
Introduction to Finite Fields (04), Advanced Encryption Standard (04), Contemporary Symmetric
Ciphers (03), Confidentiality Using Symmetric Encryption (4.5), Public-Key Encryption and Hash
Functions, Introduction to Number Theory, Public-Key Cryptography and RSA (09), Key Management
(07); Other Public-Key Cryptosystems (07), Message Authentication and Hash Functions, Hash
Algorithms
Part III:
Digital Signatures and Authentication Protocols (12,13), Network Security Practice
(12), Authentication Applications (13), Electronic Mail Security, IP Security, Web Security, System
Security, Intruders, Malicious Software, Firewalls, Standards and Standards-Setting Organizations.
Part IV:
Packet Filters, Enterprise Network Security, Anatomy of a Hack
Reference Books:
Stallings, William, Cryptography and Network Security Principles and Practices, 4th Edition, Pearson Edu., 2006.
Forouzan, Behrouz A., Cryptography and Network Security, 1st Special Indian Edition, TMH, 2007.
Kahate, Atul, Cryptography and Network Security, 2nd Ed., TMH, 2003.