The course will enable the students to
Course Outcomes (COs):
Course Outcome (at course level) | Learning and teaching strategies | Assessment Strategies |
The students will: CO193. Describe network security services and mechanisms CO194. Compare various cryptographic algorithms CO195. Interpret message authentication and hash functions CO196. Assess security at various layers. CO197. Analyze intrusion detection problem. | Interactive Lectures, Discussion, Tutorials, reading assignments, Demonstrations, G-suite. Self- learning assignments, Effective questions, Simulation, Seminar presentation | Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects |
Information Security: Introduction, History of Information security, what is Security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography: Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange
Message Authentication and Hash Functions: Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos.
Security at layers (Network, Transport, Application):IPSec, Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.
Intruders, Virus and Firewalls: Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls.
1. C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 1st Edition.
2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning
3. Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 2nd Edition
4. WM. Arthur Conklin, “Principles of Computer Security”, Greg White, TMH
5. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning
6. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.
JOURNALS:
1.Journal of Network Security,Springer<
E-RESOURCES: