LESSON
PLAN
| 
   Subject
  : CRYPTOGRAPHY AND NETWORK SECURITY   | 
 ||
| 
   Year :
  IV B-Tech  | 
  
   Semester
  : I  | 
  
   Branch : IT  | 
 
| 
   Faculty
  : G. Durvasi  | 
  
   Reg :
  R16  | 
  
   Academic Year : 2020-21  | 
 
 COURSE OBJECTIVES: 
·        
Understand security concepts, Ethics in Network
Security. 
·        
Understand security threats, and the security
services and mechanisms to counter them
·        
Comprehend and apply relevant cryptographic
techniques 
·        
Comprehend security services and mechanisms in
the network protocol stack
·        
Comprehend and apply authentication services and
mechanisms
·        
Comprehend and apply relevant protocol like SSL,
SSH etc. 
·        
Comprehend and apply email security services and
mechanisms
·        
Comprehend and apply web security services and
mechanisms
·        
Comprehend computer and network access control
| 
   1.  | 
  
   Factual
    | 
  
   CO1: Able to familiar with
  information security awareness and a clear understanding of Its importance.  | 
 
| 
   2.  | 
  
   Conceptual  | 
  
   CO2: Able to familiar with network security threats and
  countermeasures  | 
 
| 
   3.  | 
  
   Procedural
    | 
  
   CO3:
  Able to Compare different encryption and decryption techniques to solve
  problems related to confidentiality and authentication  | 
 
| 
   4.  | 
  
   Applied  | 
  
   CO4: Able to Apply
  Secure hash functions for attaining data integrity CO5 : Able to Analyze the protocols for achieving
  availability, access control to resources and protocols for non-repudiation CO6:
   Able to apply different encryption and
  decryption techniques to solve problems related to confidentiality and
  authentication   | 
 
TEXT
BOOKS: 
1.     
Cryptography and
Network Security, Behrouz A Forouzan, Debdeep Mukhopadhyay, (3e) Mc Graw Hill.
2.     
Cryptography and
Network Security, William Stallings, (6e) Pearson. 
3.     
Everyday
Cryptography, Keith M.Martin, Oxford.. 
REFERENCE
BOOKS: 
1. Network Security and
Cryptography, Bernard Meneges, Cengage Learning
SOFTWARE
LINKS: 
1.     
Java: https://java.com/en/download/
2.     
Atom: https://atom.io/
UNIT –
1  : 
Basic
Principles                                                                        [Total
Classes : 10]
Activity:
Activity
/ Schedule of UNIT-1 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   Security Goals  | 
  
   To understand various security
  goals to achieve  | 
  
   Video Link :  Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Discussion on pre-requisites (5 min)  PPT 
  presentation          (35 min) Discussion or Poll activity          (5 min) Summery (5min) Doubts clari-fication (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   Cryptographic Attacks  | 
  
   To understand cryptographic
  attacks   | 
  
   Video Link :  Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ https://nptel.ac.in/courses/106/106/106106129/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (5
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic  | 
 
| 
   3  | 
  
   Security Services   | 
  
   To understand various security
  services provided  | 
  
   Video Link :  Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic  | 
 
| 
   4.  | 
  
   Security  Mechanisms  | 
  
   To understand various security
  mechanisms    | 
  
   Video Link :  Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic  | 
 
| 
   5.  | 
  
   Mathematics of Cryptography (integer arthimatic, Euclidean algorithm)  | 
  
   To
  review integer arithmetic, concentrating on divisibility  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic  | 
 
| 
   6.  | 
  
   Mathematics of Cryptography (Extended Euclidean algorithm)   | 
  
   To
  understand how the extended Euclidean algorithm can be    used to solve linear Diophantine equations,
  to solve linear congruent equations, and to find the multiplicative inverses  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic Exercises to solve  | 
 
| 
   7.  | 
  
   Mathematics of Cryptography (modular arithmetic)  | 
  
   To
  emphasize the importance of modular arithmetic and  the modulo operator  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic Exercises to solve  | 
 
| 
   8.
    | 
  
   Mathematics of Cryptography (matrices)  | 
  
   To
  emphasize and review matrices and operations on residue  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic Exercises to solve  | 
 
| 
   9  | 
  
   Mathematics of Cryptography (matrices)  | 
  
   To
  emphasize and review matrices and operations on residue  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic Exercises to solve  | 
 
| 
   10  | 
  
   Mathematics of Cryptography (Linear congruence)  | 
  
   To solve
  a set of congruent equations using residue matrices  | 
  
   Video Link :  https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link :  https://www.basic-mathematics.com/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (20 min) Example (15
  min) Doubts clarification          (5 min)  | 
  
   . Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic Exercises to solve  | 
 
UNIT –
2  : 
   Symmetric Encryption          [Total Classes : 14]
Activity:
Activity
/ Schedule of UNIT-2 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   Mathematics of symmetric key
  cryptography (Algebric Structures )  | 
  
   To
  review the concept of algebraic structures.  | 
  
   Video Link :  C basics: https://www.youtube.com/watch?v=zmRxC7gYw-g&list=PLBlnK6fEyqRggZZgYpPMUxdY1CYkZtARR&index=149 Text Book : Pdf (e-book) Upload Web Link :  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) Practicing
  Some Problems (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   Mathematics of symmetric key
  cryptography (Groups )  | 
  
   To define and give some examples
  of groups  | 
  
   Video Link :  Basics of cryptography: https://www.youtube.com/watch?v=sjje0UOLckg Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Discussion on pre-requisites (5 min)  PPT 
  presentation          (35 min) Discussion or Poll activity          (5 min) Summery (5min) Doubts clari-fication (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   3.  | 
  
   Mathematics of symmetric key
  cryptography (rings, fields)  | 
  
   To define and give some examples
  of rings To define and give some examples
  of fields  | 
  
   Video Link :  Basics of cryptography: https://www.youtube.com/watch?v=sjje0UOLckg Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   4.  | 
  
   Introduction to Modern Symmetric Key
  Ciphers (modern block ciphers)  | 
  
   To
  introduce components of block ciphers such as P-boxes and S-boxes.  | 
  
   Video Link :  Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://notes.shichao.io/cnspp/ch2/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   5.  | 
  
   Introduction to Modern Symmetric Key
  Ciphers (product ciphers)  | 
  
   To
  discuss product ciphers   | 
  
   Video Link :  Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) Upload Web Link :  https://notes.shichao.io/cnspp/ch2/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) Practicing
  Some Problems (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   6.  | 
  
   Introduction to Modern
  Symmetric Key Ciphers (modern stream ciphers)  | 
  
   | 
  
   Video Link :  Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://notes.shichao.io/cnspp/ch2/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) Practicing
  Some Problems (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   7.  | 
  
   Data Encryption Standard (history, general structure)  | 
  
   To
  review a short history of DES To
  define the basic structure of DES  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   8.  | 
  
   Data Encryption Standard (Encryption, decryption)  | 
  
   To
  describe the details of building elements of DES  | 
  
   Video Link :  Block ciphers: Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   9.  | 
  
   Data Encryption Standard (key generation)  | 
  
   To
  describe the round keys generation process  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   10.  | 
  
   Data Encryption Standard (Analysis)  | 
  
   To
  analyze DES  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   11.  | 
  
   Advanced Encryption Standard (history, basic structure)  | 
  
   To
  review a short history of AES    To
  define the basic structure of AES  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   12.  | 
  
   Advanced Encryption Standard (encryption, decryption)  | 
  
   To
  define the transformations used by AES  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   13.  | 
  
   Advanced Encryption Standard ( key generation)  | 
  
   To
  define the key expansion process  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) Practicing
  Some Problems (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   14.  | 
  
   Advanced Encryption Standard (Analysis)  | 
  
   To analyze
   AES  | 
  
   Video Link :  Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
  cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
UNIT – 3  :  Asymmetric Encryption                                                           [Total
Classes : 12]
Activity:
| 
   1  | 
  
   Factual  | 
  
   Reading Prerequisite  concepts- numbers Videos related to asymmetric
  cryptography Referring the content on the
  Internet  | 
 
| 
   2  | 
  
   Conceptual  | 
  
   Video Lectures related to number
  theory Links from the Internet Explained Examples from Internet  | 
 
| 
   3  | 
  
   Procedural  | 
  
   Refer to text book content  Understanding the concept by
  implementation  | 
 
| 
   4  | 
  
   Applied  | 
  
               Implementing Programs,  Assignments Quiz
  etc…  | 
 
Activity
/ Schedule of UNIT-3 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   Mathematics of Asymmetric Key
  Cryptography (primes, fermat’s theorem)  | 
  
   To
  introduce prime numbers and their applications  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   Mathematics of Asymmetric Key
  Cryptography (primality
  testing)  | 
  
   To
  discuss some primality test algorithms and their   efficiencies
    | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   3  | 
  
   Mathematics of Asymmetric Key
  Cryptography (factorization)  | 
  
   To
  discuss factorization algorithms and their applications in cryptography  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in the  group Review on the topic Share material on the topic    | 
 
| 
   4  | 
  
   Mathematics of Asymmetric Key
  Cryptography (Chinese
  remainder theorem)  | 
  
   To
  describe the Chinese remainder theorem and its  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book)  Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   5  | 
  
   Mathematics of Asymmetric Key
  Cryptography (exponentiation
  and logarithm)  | 
  
   To
  introduce modular exponentiation and logarithm.  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   6  | 
  
   Asymmetric Key Cryptography (RSA algorithm)  | 
  
   To discuss the RSA cryptosystem  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   7  | 
  
   Asymmetric Key Cryptography (Optimal asymmetric
  encryption padding)  | 
  
   To discuss use of OAEP algorithm  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book)  Upload  Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   8  | 
  
   Asymmetric Key Cryptography (Elgamal
  cryptographic system)  | 
  
   To discuss the Elgamal cryptographic system  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   9  | 
  
   Asymmetric Key Cryptography (knapsack algorithm)  | 
  
   To understand knapsack algorithm  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book)  Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   10  | 
  
   Asymmetric Key Cryptography ( elliptic curve cryptosystem)  | 
  
   To discuss the elliptic curve
  cryptosystem  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   11  | 
  
   Asymmetric Key Cryptography ( introduction to elliptic curve)  | 
  
   To discuss the elliptic curves  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   12  | 
  
   Asymmetric Key Cryptography ( elliptic curve cryptosystem)  | 
  
   To discuss the elliptic curve
  cryptosystem  | 
  
   Video Link :  Basics of asymmetric cryptographic
  system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
  cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link :  https://searchsecurity.techtarget.com/definition/asymmetric-cryptography  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
UNIT –
4  : 
Data Integrity, Digital Signature Schemes & Key Management    [Total Classes :17]
Activity:
| 
   1  | 
  
   Factual  | 
  
   Reading Prerequisite  concepts- security services, symmetric keys Videos related to security
  services Referring the content on the
  Internet  | 
 
| 
   2  | 
  
   Conceptual  | 
  
   Video Lectures related Security
  services and mechanisms   NPTEL Videos Links from the Internet Explained Examples from Internet  | 
 
| 
   3  | 
  
   Procedural  | 
  
   Refer to text book content  | 
 
| 
   4  | 
  
   Applied  | 
  
               Assignments Quiz
  etc…  | 
 
Activity
/ Schedule of UNIT-4 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   Message Integrity and Message Authentication (Message Integrity)  | 
  
   To
  define message integrity To
  define message authentication To
  define criteria for a cryptographic hash function  | 
  
   Video Link :  Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   Message Integrity and Message Authentication (Random
  Oracle Model)  | 
  
    To define the Random Oracle Model and its
  role in   evaluating the security of
  cryptographic hash  | 
  
   Video Link :  Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   3.  | 
  
   Message Integrity and Message Authentication (message
  authentication)  | 
  
   To
  distinguish between an MDC and a MAC   To
  discuss some common MACs  | 
  
   Video Link :  Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   4.  | 
  
   Cryptographic Hash Functions (Introduction to hash function)  | 
  
   To
  introduce general ideas behind cryptographic  hash functions    | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   5.  | 
  
   Cryptographic Hash Functions (Merkle-Damgard
  scheme, other functions )  | 
  
   To
  discuss the Merkle-Damgard scheme as the basis To
  distinguish between two categories of hash  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   6.  | 
  
   Cryptographic Hash Functions (SHA-512 basics)  | 
  
   To
  discuss the basics of SHA-512  | 
  
   Video Link :  Message integrity and authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   7.  | 
  
   Cryptographic Hash Functions (SHA-512 structure)  | 
  
   To
  discuss the structure of SHA-512  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   8.  | 
  
   Cryptographic Hash Functions (SHA-512 analysis)  | 
  
   To
  discuss the analysis of SHA-512  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   9.  | 
  
   Cryptographic Hash Functions (Whirlpool)  | 
  
   To
  discuss the structure of Whirlpool  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   10.  | 
  
   Cryptographic Hash Functions (Whirlpool key expansion)  | 
  
   To
  discuss the key expansion of Whirlpool  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   11.  | 
  
   Digital Signature (Basics of digital signature
  – definition, services, attacks)  | 
  
   To define a digital signature To define security services provided by a digital signature To define attacks on digital signatures  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   12.  | 
  
   Digital Signature Schemes  | 
  
   To discuss some digital signature schemes, including RSA,
  ElGamal,Schnorr, DSS, and elliptic curve  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   13  | 
  
   Digital Signature
  applications  | 
  
   To describe some applications of digital signatures  | 
  
   Video Link :  Message integrity and
  authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://www.youtube.com/watch?v=Rn7Y8kS7O7c  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   14  | 
  
   Key Management (KDC, session Keys, protocol)  | 
  
   To explain the
  need for a key-distribution center To show how a KDC
  can create a session key To show how two
  parties can use a symmetric-key agreement protocol to create a session key  | 
  
   Video Link :  Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://simplicable.com/new/cryptographic-keys  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   15  | 
  
   Key Management  | 
  
   To describe Kerberos
  as a KDC and an authentication protocol  | 
  
   Video Link :  Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://simplicable.com/new/cryptographic-keys  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   16  | 
  
   Key Management (symmetric key agreement)  | 
  
   To explain the
  need for certification authorities for public keys  | 
  
   Video Link :  Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://simplicable.com/new/cryptographic-keys  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   17  | 
  
   Key Management (Public key distribution)  | 
  
   To introduce the
  idea of a Public-Key Infrastructure (PKI) and explain some of its duties  | 
  
   Video Link :  Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link :  https://simplicable.com/new/cryptographic-keys  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
UNIT –
5  : 
   Network Security-I                                                               
[Total Classes : 08]
Activity:
| 
   1  | 
  
   Factual  | 
  
   Reading Prerequisite  concepts- Network layers, email
  architecture Videos related to network layer,
  email service Referring the content on the
  Internet  | 
 
| 
   2  | 
  
   Conceptual  | 
  
   Video Lectures related to OSI model NPTEL Videos Links from the Internet Explained Examples from Internet  | 
 
| 
   3  | 
  
   Procedural  | 
  
   Refer to text book concepts Understanding the architectures  | 
 
| 
   4  | 
  
   Applied  | 
  
                 Assignments Quiz
  etc…  | 
 
Activity
/ Schedule of UNIT-5 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   Security at application layer: PGP  -general structure of email  | 
  
   To explain the
  general structure of an application program To discuss how
  PGP can provide security services for To define trust
  mechanism in PGP  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY Text Book : Pdf (e-book) Upload Web Link :  https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   Security at application layer: PGP –
  message  | 
  
   To show the
  structure of messages exchanged in PGP and S/MIME  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY Text Book : Pdf (e-book) Upload Web Link :  https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   3.  | 
  
   Security at application layer: S/MIME  | 
  
   To discuss how
  S/MIME can provide security services for To define trust
  mechanism in S/MIME  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link :  https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   4.  | 
  
   Security at application layer: S/MIME -messages  | 
  
   To show the
  structure of messages exchanged in  S/MIME  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link :  https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   5.  | 
  
   Security at the Transport Layer: introduction   | 
  
    To discuss
  the need for security services at the transport layer of the Internet model  | 
  
   Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0   Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link :  https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   6.  | 
  
   Security at the Transport Layer: SSL   | 
  
   To discuss the
  general architecture of SSL  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   7.  | 
  
   Security at the Transport Layer: TLS  | 
  
   To discuss the
  general architecture of TLS  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   8.  | 
  
   Security at the Transport Layer: SSL and TLS  | 
  
   To compare and
  contrast SSL and TLS  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
UNIT –
6  : 
    Network Security-II                                                             [Total
Classes : 10]
Activity:
| 
   1  | 
  
   Factual  | 
  
   Reading Prerequisite  concepts- IP layer functions, security
  goals, attacks Videos related to ip layer Referring the content on the
  Internet  | 
 
| 
   2  | 
  
   Conceptual  | 
  
   Video Lectures related OSI model NPTEL Videos Links from the Internet Explained Examples from Internet  | 
 
| 
   3  | 
  
   Procedural  | 
  
   Refer to text book concepts Understanding the architectures  | 
 
| 
   4  | 
  
   Applied  | 
  
                  Assignments Quiz
  etc…  | 
 
Activity
/ Schedule of UNIT-6 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
| 
   CLASS  SL NO   | 
  
   CONCEPT  | 
  
   OBJECTIVES  | 
  
   PRE-CLASS  | 
  
   IN-CLASS  | 
  
   POST-CLASS  | 
 
| 
   1.  | 
  
   TCP/IP Protocol Suite  Modes of communication  | 
  
   To define the
  architecture of IPSec  To discuss the application of IPSec in
  transport and tunnel modes  | 
  
   Video Link :  OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet  layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link :  https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   2.  | 
  
   IPSec protocol : AH protocol  | 
  
   To discuss how
  IPSec can be used to provide only authentication  | 
  
   Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0   Internet  layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link :  https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   3.  | 
  
   IPSec protocol : ESP protocol  | 
  
   To discuss how
  IPSec can be used to provide both confidentiality and authentication  | 
  
   Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0   Internet  layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link :  https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   4.  | 
  
   IPSec protocol : SA-security
  associations  | 
  
   To define
  Security Association and explain how it is implemented for IPSec  | 
  
   Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0   Internet  layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link :  https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   5.  | 
  
   IPSec protocol : IKE – key exchange  | 
  
   To define
  Internet Key Exchange and explain how it is used by IPSec.  | 
  
   Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0   Internet  layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link :  https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   6  | 
  
   System Security: Intruders and types of intruders  | 
  
   To understand the
  intruder and types of intruders to the system  | 
  
   Video Link : Security goals: https://www.youtube.com/watch?v=jOaiV-Z1JrQ Security attacks: https://www.youtube.com/watch?v=_o87RYxWWaM Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   7  | 
  
   System Security: Virus and its types  | 
  
   To understand
  viruses and types  | 
  
   Video Link : Security goals: https://www.youtube.com/watch?v=jOaiV-Z1JrQ Security attacks: https://www.youtube.com/watch?v=_o87RYxWWaM Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   8  | 
  
   System Security: Intrusion detection systems  | 
  
   To learn various
  intrusion detection systems and their advantages   | 
  
   Video Link : Intruder: https://www.youtube.com/watch?v=b5u3eG5t_88 Text Book : Pdf (e-book) Upload Web Link :  https://flylib.com/books/en/3.190.1.151/1/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   9  | 
  
   System Security: Password management in UNIX   | 
  
   To understand the
  concept of password mechanism used in UNIX 
  OS  | 
  
   Video Link : Basics of UNIX os: https://www.youtube.com/watch?v=stCeaX7g7FQ&list=PLQnX0XoCS0ILlxWz8oFIq4OQF8hzDfv4S Text Book : Pdf (e-book) Upload Web Link :  https://flylib.com/books/en/3.190.1.151/1/  | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
| 
   10  | 
  
   System Security: Firewall and its types  | 
  
   To understand
  firewall and types of firewalls used  | 
  
   Video Link : Network devices: https://www.youtube.com/watch?v=0pMm_QxCg3I Text Book : Pdf (e-book) Upload Web Link :   | 
  
   Revise previous class – (5 mins)  Asking Questions on previous class
  randomely (5 Mins) PPT
  presentation (35 min) Doubts clarification          (5 min)  | 
  
   Discussion Forum on the topic in
  the  group Review on the topic Share material on the topic    | 
 
Total
classes:
| 
   Unit.No  | 
  
   Name
  Of The Unit  | 
  
   Hours Planned  | 
 
| 
   Unit-1  | 
  
   Symmetric Encryption  | 
  
   10  | 
 
| 
   Unit-2  | 
  
   Symmetric Encryption  | 
  
   12  | 
 
| 
   Unit-3  | 
  
   Asymmetric Encryption  | 
  
   14  | 
 
| 
   Unit-4  | 
  
   Data Integrity, Digital Signature Schemes & Key Management      | 
  
   17  | 
 
| 
   Unit-5  | 
  
   Network Security-I  | 
  
   8  | 
 
| 
   Unit-6  | 
  
   Network Security-II  | 
  
   10  | 
 
| 
   | 
  
   Total Hours   | 
  
   71  | 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.