Syllabus
Course Code: MS-20-43 Course Name: Elective-III (i) - Cryptography and Network Security |
||
MODULE NO / UNIT | COURSE SYLLABUS CONTENTS OF MODULE | NOTES |
---|---|---|
1 | Computer & Network Security Concepts: Overview; Security Goals; Threats, Attacks, & Assets; Vulnerabilities; Security Functional Requirements; Security Services; Security Mechanism; Secure Communications; Model for Network Security; The OSI Security Architecture. Cryptographic Tools: Symmetric and Asymmetric Key Ciphers; Classical Encryption Techniques; Symmetric Ciphers: Confidentiality with Symmetric Encryption; One-Time Pads; User Authentication Methods; Block Cipher and Data Encryption Standard; Advanced Encryption Standard; RC2, RC4, RC5 & RC6; Block Cipher Operation; Random and Pseudo Random Numbers. |
|
2 | Asymmetric Ciphers: Public Key Cryptography and RSA; Diffie-Hellman Key Exchange; Elliptic Curve Cryptography. Cryptographic Data integrity: Cryptographic Hash Functions and Applications; Message Authentication Codes; Digital signatures & Schemes; Hashing & Signing; Message Digests; Digital Signature Standard; Birthday attacks on Signatures. Key Management and Distribution: Symmetric Key Distribution using Symmetric Encryption & Asymmetric Encryption; Distribution of Public Keys; X.509 Certificates; Public Key Infrastructure. User Authentication Protocols:Remote User Authentication Principles; Remote User Authentication using Symmetric & Asymmetric Encryption; Kerberos. |
|
3 | Network Security: Threats & Attacks; Denial-of Service; Distributed Denial-of-Service; Cryptography in Network Security: Network & Browser Encryption, Onion Routing, IP Security protocol Suite (IPSec), Virtual Private Networks; Firewalls: Design & Types, Personal Firewalls, Network Address Translation (NAT); Intrusion Detection and Prevention Systems. IP Security: Overview; IP Security Policy; Encapsulating Security Payload; Combining Security Associations; Internet Key Exchange. |
|
4 | Transport-Level Security: Web Security: Issues & Threats; Secure Naming; Secure Socket layer (SSL); Transport Layer Security (TLS); HTTPS; Secure Shell(SSH). Wireless Network Security: Vulnerabilities in Wireless Networks; IEEE 802.11 Wireless LAN Securities; Wireless Application Protocol Overview; Wireless Transport Layer Security; WEP & WPA. Electronic-mail Security: E-Mail Attacks; Pretty Good Privacy (PGP); Privacy Enhanced Mail (PEM); S/MIME; DomainKeys Identified Mail (DKIM). |