Cryptography and Network Security

 

LESSON PLAN

Subject : CRYPTOGRAPHY AND NETWORK SECURITY

Year : IV B-Tech

Semester : I

Branch : IT

Faculty : G. Durvasi

Reg : R16

Academic Year : 2020-21

 

 COURSE OBJECTIVES:

·         Understand security concepts, Ethics in Network Security.

·         Understand security threats, and the security services and mechanisms to counter them

·         Comprehend and apply relevant cryptographic techniques

·         Comprehend security services and mechanisms in the network protocol stack

·         Comprehend and apply authentication services and mechanisms

·         Comprehend and apply relevant protocol like SSL, SSH etc.

·         Comprehend and apply email security services and mechanisms

·         Comprehend and apply web security services and mechanisms

·         Comprehend computer and network access control

 COURSE OUTCOMES :

  

1.

Factual

CO1: Able to familiar with information security awareness and a clear understanding of Its importance.

2.

Conceptual

CO2: Able to familiar with network security threats and countermeasures

3.

Procedural

CO3: Able to Compare different encryption and decryption techniques to solve problems related to confidentiality and authentication

4.

Applied

CO4: Able to Apply Secure hash functions for attaining data integrity

CO5 : Able to Analyze the protocols for achieving availability, access control to resources and protocols for non-repudiation

CO6:  Able to apply different encryption and decryption techniques to solve problems related to confidentiality and authentication

 

 

TEXT BOOKS:

1.      Cryptography and Network Security, Behrouz A Forouzan, Debdeep Mukhopadhyay, (3e) Mc Graw Hill.

2.      Cryptography and Network Security, William Stallings, (6e) Pearson.

3.      Everyday Cryptography, Keith M.Martin, Oxford..

  

REFERENCE BOOKS:

1. Network Security and Cryptography, Bernard Meneges, Cengage Learning

 

SOFTWARE LINKS:

 

1.      Java: https://java.com/en/download/

2.      Atom: https://atom.io/

 

 

UNIT – 1  :  Basic Principles                                                                        [Total Classes : 10]

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite concepts- networking concepts, basics of mathematics

Basics of Computer networks

Videos of Computer networks

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to networking

NPTEL Videos

Links from the Internet

Examples

 

3

 

Procedural

Refer to text book content

 

 

4

 

 

Applied

 

             Solving Exercises

Assignments

Quiz etc…

 

 

 

Activity / Schedule of UNIT-1 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Security Goals

To understand various security goals to achieve

Video Link :

Networking basics:

https://www.youtube.com/watch?v=0j6-QFnnwQk

 

https://nptel.ac.in/courses/106/105/106105183/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.geeksforgeeks.org/basics-computer-networking/

Discussion on pre-requisites (5 min)

 PPT  presentation

         (35 min)

Discussion or

Poll activity

         (5 min)

Summery (5min)

Doubts clari-fication (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

2.

Cryptographic Attacks

To understand cryptographic attacks

Video Link :

Networking basics:

https://www.youtube.com/watch?v=0j6-QFnnwQk

 

https://nptel.ac.in/courses/106/105/106105183/

 

https://nptel.ac.in/courses/106/106/106106129/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.geeksforgeeks.org/basics-computer-networking/

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (5 min)

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3

Security Services

To understand various security services provided

Video Link :

Networking basics:

https://www.youtube.com/watch?v=0j6-QFnnwQk

 

https://nptel.ac.in/courses/106/105/106105183/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.geeksforgeeks.org/basics-computer-networking/

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Security

Mechanisms

 

To understand various security mechanisms 

Video Link :

Networking basics:

https://www.youtube.com/watch?v=0j6-QFnnwQk

 

https://nptel.ac.in/courses/106/105/106105183/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.geeksforgeeks.org/basics-computer-networking/

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Mathematics of Cryptography

(integer arthimatic, Euclidean algorithm)

To review integer arithmetic, concentrating on divisibility
     and finding the greatest common divisor using the Euclidean
     algorithm

Video Link :

https://www.youtube.com/watch?v=yT3jh2aZN68

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6.

Mathematics of Cryptography

(Extended Euclidean algorithm)

To understand how the extended Euclidean algorithm can be    used to solve linear Diophantine equations, to solve linear congruent equations, and to find the multiplicative inverses

Video Link :

 

https://www.youtube.com/watch?v=yT3jh2aZN68

 

https://www.khanacademy.org/computing/computer-science/cryptography/modarithmetic/a/the-euclidean-algorithm

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

Exercises to solve

 

 

7.

Mathematics of Cryptography

(modular arithmetic)

To emphasize the importance of modular arithmetic and  the modulo operator

Video Link :

https://www.youtube.com/watch?v=yT3jh2aZN68

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

Exercises to solve

 

 

8.

Mathematics of Cryptography

(matrices)

To emphasize and review matrices and operations on residue
     matrices that are extensively used in cryptography

Video Link :

https://www.youtube.com/watch?v=yT3jh2aZN68

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

Exercises to solve

 

9

Mathematics of Cryptography

(matrices)

To emphasize and review matrices and operations on residue
     matrices that are extensively used in cryptography

Video Link :

https://www.youtube.com/watch?v=yT3jh2aZN68

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

Exercises to solve

 

10

Mathematics of Cryptography

(Linear congruence)

To solve a set of congruent equations using residue matrices

Video Link :

https://www.youtube.com/watch?v=yT3jh2aZN68

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.basic-mathematics.com/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (20 min)

Example (15 min)

 

Doubts clarification

        (5 min)

.

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

Exercises to solve

 

 

 

 

UNIT – 2  :     Symmetric Encryption          [Total Classes : 14]

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- cryptography basics, basics of mathematics

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to basics of cryptography

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

Examples(simple to complex)

 

 

4

 

 

Applied

 

              Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-2 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

1.

Mathematics of symmetric key cryptography

(Algebric Structures )

To review the concept of algebraic structures.

Video Link :

C basics:

https://www.youtube.com/watch?v=zmRxC7gYw-g&list=PLBlnK6fEyqRggZZgYpPMUxdY1CYkZtARR&index=149

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.programiz.com/c-programming

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

Practicing Some Problems (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

2.

Mathematics of symmetric key cryptography

(Groups )

To define and give some examples of groups

Video Link :

Basics of cryptography:

https://www.youtube.com/watch?v=sjje0UOLckg

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.thegeekstuff.com/2012/07/cryptography-basics/

Discussion on pre-requisites (5 min)

 PPT  presentation

         (35 min)

Discussion or

Poll activity

         (5 min)

Summery (5min)

Doubts clari-fication (5 min)

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

3.

Mathematics of symmetric key cryptography

(rings, fields)

To define and give some examples of rings

 

To define and give some examples of fields

 

Video Link :

Basics of cryptography:

https://www.youtube.com/watch?v=sjje0UOLckg

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://www.thegeekstuff.com/2012/07/cryptography-basics/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

4.

Introduction to Modern Symmetric Key Ciphers (modern block ciphers)

To introduce components of block ciphers such as P-boxes and S-boxes.

 

Video Link :

Classical encryption techniques:

https://slideplayer.com/slide/5921943/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://notes.shichao.io/cnspp/ch2/

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Introduction to Modern Symmetric Key Ciphers (product ciphers)

To discuss product ciphers

Video Link :

Classical encryption techniques:

https://slideplayer.com/slide/5921943/

Text Book : Pdf (e-book) Upload

 

Web Link :

https://notes.shichao.io/cnspp/ch2/

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

Practicing Some Problems (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

6.

Introduction to Modern Symmetric Key Ciphers (modern stream ciphers)

 

Video Link :

Classical encryption techniques:

https://slideplayer.com/slide/5921943/

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://notes.shichao.io/cnspp/ch2/

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

Practicing Some Problems (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

7.

Data Encryption Standard

 

(history, general structure)

To review a short history of DES

 

 

To define the basic structure of DES

 

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

fiestel structure:

https://www.youtube.com/watch?v=8I0LKQc-IBU

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

8.

Data Encryption Standard

 

(Encryption, decryption)

To describe the details of building elements of DES

Video Link :

Block ciphers:

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.w3schools.com/cpp/cpp_classes.asp

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

9.

Data Encryption Standard

 

(key generation)

To describe the round keys generation process

 

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

fiestel structure:

https://www.youtube.com/watch?v=8I0LKQc-IBU

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

10.

Data Encryption Standard

 

(Analysis)

 

To analyze DES

 

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

fiestel structure:

https://www.youtube.com/watch?v=8I0LKQc-IBU

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

11.

Advanced Encryption Standard

(history, basic structure)

To review a short history of AES

 

 

To define the basic structure of AES

 

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

12.

Advanced Encryption Standard

(encryption, decryption)

To define the transformations used by AES

 

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

13.

Advanced Encryption Standard

( key generation)

 

To define the key expansion process

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

Practicing Some Problems (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

14.

Advanced Encryption Standard

(Analysis)

To analyze

AES

Video Link :

Block ciphers:

https://www.youtube.com/watch?v=-Gk9kaFoBxU

components of symmetric cryptography:

https://www.hypr.com/symmetric-key-cryptography/

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.tutorialspoint.com/cryptography/block_cipher.htm

 

https://www.tutorialspoint.com/cryptography/cryptosystems.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

 


 

UNIT – 3  :  Asymmetric Encryption                                                           [Total Classes : 12]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- numbers

Videos related to asymmetric cryptography

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to number theory

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

Understanding the concept by implementation

 

 

4

 

 

Applied

 

            Implementing Programs,

Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-3 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Mathematics of Asymmetric Key Cryptography

(primes, fermat’s theorem)

To introduce prime numbers and their applications
 in cryptography.

 

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Mathematics of Asymmetric Key Cryptography

(primality testing)

To discuss some primality test algorithms and their   efficiencies

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

 

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3

Mathematics of Asymmetric Key Cryptography

(factorization)

To discuss factorization algorithms and their applications in cryptography

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

 

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4

Mathematics of Asymmetric Key Cryptography

 

(Chinese remainder theorem)

To describe the Chinese remainder theorem and its
 application.

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

 

 

Text Book : Pdf (e-book)  Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5

Mathematics of Asymmetric Key Cryptography

 

(exponentiation and logarithm)

To introduce modular exponentiation and logarithm.

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6

Asymmetric Key Cryptography

(RSA algorithm)

To discuss the RSA cryptosystem

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7

Asymmetric Key Cryptography

(Optimal asymmetric encryption padding)

To discuss use of OAEP algorithm

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book)  Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8

Asymmetric Key Cryptography

(Elgamal cryptographic system)

 

To discuss the Elgamal cryptographic system

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9

Asymmetric Key Cryptography

(knapsack algorithm)

To understand knapsack algorithm

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book)  Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10

Asymmetric Key Cryptography

 

( elliptic curve cryptosystem)

To discuss the elliptic curve cryptosystem

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

11

Asymmetric Key Cryptography

 

( introduction to elliptic curve)

To discuss the elliptic curves

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

12

Asymmetric Key Cryptography

 

( elliptic curve cryptosystem)

To discuss the elliptic curve cryptosystem

Video Link :

Basics of asymmetric cryptographic system:

https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en

mathematics of asymmetric cryptography:

https://www.youtube.com/watch?v=kM_y15bYB8s

 

 

Text Book : Pdf (e-book) Upload

 

Web Link :

https://searchsecurity.techtarget.com/definition/asymmetric-cryptography

 

https://slideplayer.com/slide/6261374/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 


 

 

UNIT – 4  :  Data Integrity, Digital Signature Schemes & Key Management    [Total Classes :17]

 

 

Activity:

 

 

 

1

 

 

Factual

Reading Prerequisite  concepts- security services, symmetric keys

Videos related to security services

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related Security services and mechanisms  

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book content

 

 

4

 

 

Applied

 

            Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-4 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Message Integrity and Message Authentication

(Message Integrity)

To define message integrity

 

To define message authentication

 

To define criteria for a cryptographic hash function

Video Link :

Security services:

https://www.youtube.com/watch?v=oUUmAQLea-A

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://eezytutorials.com/Cryptography-And-Network-Security/Security-services-and-mechanisms.php#.XzMO4tIzbIU

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Message Integrity and Message Authentication

(Random Oracle Model)

 

 To define the Random Oracle Model and its role in   evaluating the security of cryptographic hash
functions

 

Video Link :

Security services:

https://www.youtube.com/watch?v=oUUmAQLea-A

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://eezytutorials.com/Cryptography-And-Network-Security/Security-services-and-mechanisms.php#.XzMO4tIzbIU

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

Message Integrity and Message Authentication

(message authentication)

To distinguish between an MDC and a MAC

 

 

To discuss some common MACs

 

Video Link :

Security services:

https://www.youtube.com/watch?v=oUUmAQLea-A

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://eezytutorials.com/Cryptography-And-Network-Security/Security-services-and-mechanisms.php#.XzMO4tIzbIU

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Cryptographic Hash Functions

(Introduction to hash function)

To introduce general ideas behind cryptographic  hash functions

 

 

 

 

 

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Cryptographic Hash Functions

(Merkle-Damgard scheme, other functions )

To discuss the Merkle-Damgard scheme as the basis
for iterated hash functions

 

To distinguish between two categories of hash
functions

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6.

Cryptographic Hash Functions

(SHA-512 basics)

To discuss the basics of SHA-512

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7.

Cryptographic Hash Functions

(SHA-512 structure)

To discuss the structure of SHA-512

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8.

Cryptographic Hash Functions

(SHA-512 analysis)

To discuss the analysis of SHA-512

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9.

Cryptographic Hash Functions

(Whirlpool)

To discuss the structure of Whirlpool

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10.

Cryptographic Hash Functions

(Whirlpool key expansion)

To discuss the key expansion of Whirlpool

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

hash function:

https://www.youtube.com/watch?v=jNoUtbK8hv4

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

11.

Digital Signature

(Basics of digital signature – definition, services, attacks)

To define a digital signature

 

To define security services provided by a digital signature

 

To define attacks on digital signatures

 

 

 

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

12.

Digital Signature Schemes

 

 

To discuss some digital signature schemes, including RSA, ElGamal,Schnorr, DSS, and elliptic curve

 

 

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

13

Digital Signature applications

 

To describe some applications of digital signatures

Video Link :

Message integrity and authentication:

https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://www.youtube.com/watch?v=Rn7Y8kS7O7c

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

14

Key Management

(KDC, session Keys, protocol)

To explain the need for a key-distribution center

 

To show how a KDC can create a session key

 

To show how two parties can use a symmetric-key agreement protocol to create a session key

 

 

Video Link :

Keys used in cryptography:

https://www.preveil.com/blog/public-and-private-key/

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://simplicable.com/new/cryptographic-keys

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

15

Key Management

To describe Kerberos as a KDC and an authentication protocol

 

 

Video Link :

Keys used in cryptography:

https://www.preveil.com/blog/public-and-private-key/

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://simplicable.com/new/cryptographic-keys

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

16

Key Management

(symmetric key agreement)

To explain the need for certification authorities for public keys

 

 

Video Link :

Keys used in cryptography:

https://www.preveil.com/blog/public-and-private-key/

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://simplicable.com/new/cryptographic-keys

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

17

Key Management

 

(Public key distribution)

To introduce the idea of a Public-Key Infrastructure (PKI) and explain some of its duties

Video Link :

Keys used in cryptography:

https://www.preveil.com/blog/public-and-private-key/

 

 

Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf

 

Web Link :

https://simplicable.com/new/cryptographic-keys

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

UNIT – 5  :     Network Security-I                                                               [Total Classes : 08]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- Network layers, email architecture

Videos related to network layer, email service

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related to OSI model

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book concepts

Understanding the architectures

 

 

4

 

Applied

              Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-5 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

Security at application layer: PGP

-general structure of email

To explain the general structure of an application program

 

To discuss how PGP can provide security services for

 

To define trust mechanism in PGP

 

 

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Application layer:

https://www.youtube.com/watch?v=3s4yWb8izVs

 

Email:

https://www.youtube.com/watch?v=6jKGSthvIjY

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-application-layer

 

https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

Security at application layer: PGP – message

To show the structure of messages exchanged in PGP and S/MIME

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Application layer:

https://www.youtube.com/watch?v=3s4yWb8izVs

 

Email:

https://www.youtube.com/watch?v=6jKGSthvIjY

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-application-layer

 

https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

Security at application layer: S/MIME

To discuss how S/MIME can provide security services for

 

To define trust mechanism in S/MIME

 

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Application layer:

https://www.youtube.com/watch?v=3s4yWb8izVs

 

Email:

https://www.youtube.com/watch?v=6jKGSthvIjY

 

MIME protocol:

https://www.youtube.com/watch?v=nvxT2_3fD_k

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-application-layer

 

https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm

https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

Security at application layer: S/MIME -messages

To show the structure of messages exchanged in  S/MIME

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Application layer:

https://www.youtube.com/watch?v=3s4yWb8izVs

 

Email:

https://www.youtube.com/watch?v=6jKGSthvIjY

 

MIME protocol:

https://www.youtube.com/watch?v=nvxT2_3fD_k

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-application-layer

 

https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm

https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

Security at the Transport Layer: introduction

 To discuss the need for security services at the transport layer of the Internet model

 

 

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Application layer:

https://www.youtube.com/watch?v=3s4yWb8izVs

 

Email:

https://www.youtube.com/watch?v=6jKGSthvIjY

 

MIME protocol:

https://www.youtube.com/watch?v=nvxT2_3fD_k

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-application-layer

 

https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm

https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6.

Security at the Transport Layer: SSL

To discuss the general architecture of SSL

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Transport layer:

https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-transport-layer

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7.

Security at the Transport Layer: TLS

To discuss the general architecture of TLS

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Transport layer:

https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-transport-layer

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8.

Security at the Transport Layer: SSL and TLS

To compare and contrast SSL and TLS

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Transport layer:

https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.javatpoint.com/computer-network-transport-layer

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

 

UNIT – 6  :      Network Security-II                                                             [Total Classes : 10]

 

 

Activity:

 

 

 

1

 

 

Factual

 

Reading Prerequisite  concepts- IP layer functions, security goals, attacks

Videos related to ip layer

Referring the content on the Internet

 

 

2

 

 

Conceptual

Video Lectures related OSI model

NPTEL Videos

Links from the Internet

Explained Examples from Internet

 

3

 

Procedural

Refer to text book concepts

Understanding the architectures

 

 

 

4

 

 

Applied

 

             

Assignments

Quiz etc…

 

 

Activity / Schedule of UNIT-6 :

 

Pre-Class : Videos, E-books, Web links, Case Studies etc…

In-Class : Explanation on concept, discussion, Poll, doubts clarification, PPT, Demo etc..

Post-Class : Discussion Forum, Review on topic, Assessment, Quiz, Notes etc….

 

 

 

CLASS

SL NO

 

CONCEPT

 

OBJECTIVES

PRE-CLASS

 

IN-CLASS

 

POST-CLASS

 

1.

TCP/IP Protocol Suite

 

Modes of communication

To define the architecture of IPSec

 

 To discuss the application of IPSec in transport and tunnel modes

 

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Internet  layer:

https://www.youtube.com/watch?v=peGuEQLHKPg

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

2.

IPSec protocol : AH protocol

To discuss how IPSec can be used to provide only authentication

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Internet  layer:

https://www.youtube.com/watch?v=peGuEQLHKPg

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

3.

IPSec protocol : ESP protocol

To discuss how IPSec can be used to provide both confidentiality and authentication

 

 

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Internet  layer:

https://www.youtube.com/watch?v=peGuEQLHKPg

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

4.

IPSec protocol : SA-security associations

To define Security Association and explain how it is implemented for IPSec

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Internet  layer:

https://www.youtube.com/watch?v=peGuEQLHKPg

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

5.

IPSec protocol :

IKE – key exchange

To define Internet Key Exchange and explain how it is used by IPSec.

Video Link :

OSI model:

https://www.youtube.com/watch?v=vv4y_uOneC0

 

Internet  layer:

https://www.youtube.com/watch?v=peGuEQLHKPg

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

6

System Security:

Intruders and types of intruders

To understand the intruder and types of intruders to the system

Video Link :

Security goals:

https://www.youtube.com/watch?v=jOaiV-Z1JrQ

Security attacks:

https://www.youtube.com/watch?v=_o87RYxWWaM

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.includehelp.com/cryptography/security-goals-security-attacks-and-principles-of-security.aspx

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

7

System Security:

Virus and its types

To understand viruses and types

Video Link :

Security goals:

https://www.youtube.com/watch?v=jOaiV-Z1JrQ

Security attacks:

https://www.youtube.com/watch?v=_o87RYxWWaM

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.includehelp.com/cryptography/security-goals-security-attacks-and-principles-of-security.aspx

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

8

System Security:

Intrusion detection systems

To learn various intrusion detection systems and their advantages

Video Link :

Intruder:

https://www.youtube.com/watch?v=b5u3eG5t_88

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://flylib.com/books/en/3.190.1.151/1/

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

9

System Security:

Password management in UNIX

To understand the concept of password mechanism used in UNIX  OS

Video Link :

Basics of UNIX os:

https://www.youtube.com/watch?v=stCeaX7g7FQ&list=PLQnX0XoCS0ILlxWz8oFIq4OQF8hzDfv4S

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://flylib.com/books/en/3.190.1.151/1/

 

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

10

System Security:

Firewall and its types

To understand firewall and types of firewalls used

Video Link :

Network devices:

https://www.youtube.com/watch?v=0pMm_QxCg3I

 

Text Book : Pdf (e-book) Upload

 

 

Web Link :

https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-devices-explained-with-function.html

 

Revise previous class – (5 mins)

 

Asking Questions on previous class randomely (5 Mins)

 

PPT presentation (35 min)

 

Doubts clarification

        (5 min)

 

Discussion Forum on the topic in the  group

 

Review on the topic

 

Share material on the topic

 

 

 

Total classes:

Unit.No

Name Of The Unit

Hours Planned

Unit-1

Symmetric Encryption

10

Unit-2

Symmetric Encryption

12

Unit-3

Asymmetric Encryption

14

Unit-4

Data Integrity, Digital Signature Schemes & Key Management   

17

Unit-5

Network Security-I

8

Unit-6

Network Security-II

10

 

Total Hours

71

 

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Full Stack Development

What is Full Stack Development? Full Stack Development refers to the process of designing, creating testing and deploying a complete web app...