LESSON
PLAN
Subject
: CRYPTOGRAPHY AND NETWORK SECURITY |
||
Year :
IV B-Tech |
Semester
: I |
Branch : IT |
Faculty
: G. Durvasi |
Reg :
R16 |
Academic Year : 2020-21 |
COURSE OBJECTIVES:
·
Understand security concepts, Ethics in Network
Security.
·
Understand security threats, and the security
services and mechanisms to counter them
·
Comprehend and apply relevant cryptographic
techniques
·
Comprehend security services and mechanisms in
the network protocol stack
·
Comprehend and apply authentication services and
mechanisms
·
Comprehend and apply relevant protocol like SSL,
SSH etc.
·
Comprehend and apply email security services and
mechanisms
·
Comprehend and apply web security services and
mechanisms
·
Comprehend computer and network access control
1. |
Factual
|
CO1: Able to familiar with
information security awareness and a clear understanding of Its importance. |
2. |
Conceptual |
CO2: Able to familiar with network security threats and
countermeasures |
3. |
Procedural
|
CO3:
Able to Compare different encryption and decryption techniques to solve
problems related to confidentiality and authentication |
4. |
Applied |
CO4: Able to Apply
Secure hash functions for attaining data integrity CO5 : Able to Analyze the protocols for achieving
availability, access control to resources and protocols for non-repudiation CO6:
Able to apply different encryption and
decryption techniques to solve problems related to confidentiality and
authentication |
TEXT
BOOKS:
1.
Cryptography and
Network Security, Behrouz A Forouzan, Debdeep Mukhopadhyay, (3e) Mc Graw Hill.
2.
Cryptography and
Network Security, William Stallings, (6e) Pearson.
3.
Everyday
Cryptography, Keith M.Martin, Oxford..
REFERENCE
BOOKS:
1. Network Security and
Cryptography, Bernard Meneges, Cengage Learning
SOFTWARE
LINKS:
1.
Java: https://java.com/en/download/
2.
Atom: https://atom.io/
UNIT –
1 :
Basic
Principles [Total
Classes : 10]
Activity:
Activity
/ Schedule of UNIT-1 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Security Goals |
To understand various security
goals to achieve |
Video Link : Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Discussion on pre-requisites (5 min) PPT
presentation (35 min) Discussion or Poll activity (5 min) Summery (5min) Doubts clari-fication (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Cryptographic Attacks |
To understand cryptographic
attacks |
Video Link : Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ https://nptel.ac.in/courses/106/106/106106129/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (5
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3 |
Security Services |
To understand various security
services provided |
Video Link : Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Security Mechanisms |
To understand various security
mechanisms |
Video Link : Networking basics: https://www.youtube.com/watch?v=0j6-QFnnwQk https://nptel.ac.in/courses/106/105/106105183/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Mathematics of Cryptography (integer arthimatic, Euclidean algorithm) |
To
review integer arithmetic, concentrating on divisibility |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Mathematics of Cryptography (Extended Euclidean algorithm) |
To
understand how the extended Euclidean algorithm can be used to solve linear Diophantine equations,
to solve linear congruent equations, and to find the multiplicative inverses |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic Exercises to solve |
7. |
Mathematics of Cryptography (modular arithmetic) |
To
emphasize the importance of modular arithmetic and the modulo operator |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic Exercises to solve |
8.
|
Mathematics of Cryptography (matrices) |
To
emphasize and review matrices and operations on residue |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic Exercises to solve |
9 |
Mathematics of Cryptography (matrices) |
To
emphasize and review matrices and operations on residue |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic Exercises to solve |
10 |
Mathematics of Cryptography (Linear congruence) |
To solve
a set of congruent equations using residue matrices |
Video Link : https://www.youtube.com/watch?v=yT3jh2aZN68 Text Book : Pdf (e-book) Upload Web Link : https://www.basic-mathematics.com/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (20 min) Example (15
min) Doubts clarification (5 min) |
. Discussion Forum on the topic in
the group Review on the topic Share material on the topic Exercises to solve |
UNIT –
2 :
Symmetric Encryption [Total Classes : 14]
Activity:
Activity
/ Schedule of UNIT-2 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Mathematics of symmetric key
cryptography (Algebric Structures ) |
To
review the concept of algebraic structures. |
Video Link : C basics: https://www.youtube.com/watch?v=zmRxC7gYw-g&list=PLBlnK6fEyqRggZZgYpPMUxdY1CYkZtARR&index=149 Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Mathematics of symmetric key
cryptography (Groups ) |
To define and give some examples
of groups |
Video Link : Basics of cryptography: https://www.youtube.com/watch?v=sjje0UOLckg Text Book : Pdf (e-book) Upload Web Link : |
Discussion on pre-requisites (5 min) PPT
presentation (35 min) Discussion or Poll activity (5 min) Summery (5min) Doubts clari-fication (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Mathematics of symmetric key
cryptography (rings, fields) |
To define and give some examples
of rings To define and give some examples
of fields |
Video Link : Basics of cryptography: https://www.youtube.com/watch?v=sjje0UOLckg Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Introduction to Modern Symmetric Key
Ciphers (modern block ciphers) |
To
introduce components of block ciphers such as P-boxes and S-boxes. |
Video Link : Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://notes.shichao.io/cnspp/ch2/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Introduction to Modern Symmetric Key
Ciphers (product ciphers) |
To
discuss product ciphers |
Video Link : Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) Upload Web Link : https://notes.shichao.io/cnspp/ch2/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Introduction to Modern
Symmetric Key Ciphers (modern stream ciphers) |
|
Video Link : Classical encryption techniques: https://slideplayer.com/slide/5921943/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://notes.shichao.io/cnspp/ch2/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Data Encryption Standard (history, general structure) |
To
review a short history of DES To
define the basic structure of DES |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Data Encryption Standard (Encryption, decryption) |
To
describe the details of building elements of DES |
Video Link : Block ciphers: Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9. |
Data Encryption Standard (key generation) |
To
describe the round keys generation process |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10. |
Data Encryption Standard (Analysis) |
To
analyze DES |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ fiestel structure: https://www.youtube.com/watch?v=8I0LKQc-IBU Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
11. |
Advanced Encryption Standard (history, basic structure) |
To
review a short history of AES To
define the basic structure of AES |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
12. |
Advanced Encryption Standard (encryption, decryption) |
To
define the transformations used by AES |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
13. |
Advanced Encryption Standard ( key generation) |
To
define the key expansion process |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) Practicing
Some Problems (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
14. |
Advanced Encryption Standard (Analysis) |
To analyze
AES |
Video Link : Block ciphers: https://www.youtube.com/watch?v=-Gk9kaFoBxU components of symmetric
cryptography: https://www.hypr.com/symmetric-key-cryptography/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.tutorialspoint.com/cryptography/block_cipher.htm https://www.tutorialspoint.com/cryptography/cryptosystems.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT – 3 : Asymmetric Encryption [Total
Classes : 12]
Activity:
1 |
Factual |
Reading Prerequisite concepts- numbers Videos related to asymmetric
cryptography Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related to number
theory Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book content Understanding the concept by
implementation |
4 |
Applied |
Implementing Programs, Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-3 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Mathematics of Asymmetric Key
Cryptography (primes, fermat’s theorem) |
To
introduce prime numbers and their applications |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Mathematics of Asymmetric Key
Cryptography (primality
testing) |
To
discuss some primality test algorithms and their efficiencies
|
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3 |
Mathematics of Asymmetric Key
Cryptography (factorization) |
To
discuss factorization algorithms and their applications in cryptography |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in the group Review on the topic Share material on the topic |
4 |
Mathematics of Asymmetric Key
Cryptography (Chinese
remainder theorem) |
To
describe the Chinese remainder theorem and its |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5 |
Mathematics of Asymmetric Key
Cryptography (exponentiation
and logarithm) |
To
introduce modular exponentiation and logarithm. |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6 |
Asymmetric Key Cryptography (RSA algorithm) |
To discuss the RSA cryptosystem |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7 |
Asymmetric Key Cryptography (Optimal asymmetric
encryption padding) |
To discuss use of OAEP algorithm |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8 |
Asymmetric Key Cryptography (Elgamal
cryptographic system) |
To discuss the Elgamal cryptographic system |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9 |
Asymmetric Key Cryptography (knapsack algorithm) |
To understand knapsack algorithm |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10 |
Asymmetric Key Cryptography ( elliptic curve cryptosystem) |
To discuss the elliptic curve
cryptosystem |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
11 |
Asymmetric Key Cryptography ( introduction to elliptic curve) |
To discuss the elliptic curves |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
12 |
Asymmetric Key Cryptography ( elliptic curve cryptosystem) |
To discuss the elliptic curve
cryptosystem |
Video Link : Basics of asymmetric cryptographic
system: https://www.youtube.com/watch?v=AQDCe585Lnc&vl=en mathematics of asymmetric
cryptography: https://www.youtube.com/watch?v=kM_y15bYB8s Text Book : Pdf (e-book) Upload Web Link : https://searchsecurity.techtarget.com/definition/asymmetric-cryptography |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT –
4 :
Data Integrity, Digital Signature Schemes & Key Management [Total Classes :17]
Activity:
1 |
Factual |
Reading Prerequisite concepts- security services, symmetric keys Videos related to security
services Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related Security
services and mechanisms NPTEL Videos Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book content |
4 |
Applied |
Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-4 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Message Integrity and Message Authentication (Message Integrity) |
To
define message integrity To
define message authentication To
define criteria for a cryptographic hash function |
Video Link : Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Message Integrity and Message Authentication (Random
Oracle Model) |
To define the Random Oracle Model and its
role in evaluating the security of
cryptographic hash |
Video Link : Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Message Integrity and Message Authentication (message
authentication) |
To
distinguish between an MDC and a MAC To
discuss some common MACs |
Video Link : Security services: https://www.youtube.com/watch?v=oUUmAQLea-A Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Cryptographic Hash Functions (Introduction to hash function) |
To
introduce general ideas behind cryptographic hash functions |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Cryptographic Hash Functions (Merkle-Damgard
scheme, other functions ) |
To
discuss the Merkle-Damgard scheme as the basis To
distinguish between two categories of hash |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Cryptographic Hash Functions (SHA-512 basics) |
To
discuss the basics of SHA-512 |
Video Link : Message integrity and authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Cryptographic Hash Functions (SHA-512 structure) |
To
discuss the structure of SHA-512 |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Cryptographic Hash Functions (SHA-512 analysis) |
To
discuss the analysis of SHA-512 |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9. |
Cryptographic Hash Functions (Whirlpool) |
To
discuss the structure of Whirlpool |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10. |
Cryptographic Hash Functions (Whirlpool key expansion) |
To
discuss the key expansion of Whirlpool |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf hash function: https://www.youtube.com/watch?v=jNoUtbK8hv4 Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
11. |
Digital Signature (Basics of digital signature
– definition, services, attacks) |
To define a digital signature To define security services provided by a digital signature To define attacks on digital signatures |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
12. |
Digital Signature Schemes |
To discuss some digital signature schemes, including RSA,
ElGamal,Schnorr, DSS, and elliptic curve |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
13 |
Digital Signature
applications |
To describe some applications of digital signatures |
Video Link : Message integrity and
authentication: https://people.utm.my/marinama/files/2016/11/Ch-11-Message-Integrity-and-Authentication-student.pdf Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://www.youtube.com/watch?v=Rn7Y8kS7O7c |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
14 |
Key Management (KDC, session Keys, protocol) |
To explain the
need for a key-distribution center To show how a KDC
can create a session key To show how two
parties can use a symmetric-key agreement protocol to create a session key |
Video Link : Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://simplicable.com/new/cryptographic-keys |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
15 |
Key Management |
To describe Kerberos
as a KDC and an authentication protocol |
Video Link : Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://simplicable.com/new/cryptographic-keys |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
16 |
Key Management (symmetric key agreement) |
To explain the
need for certification authorities for public keys |
Video Link : Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://simplicable.com/new/cryptographic-keys |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
17 |
Key Management (Public key distribution) |
To introduce the
idea of a Public-Key Infrastructure (PKI) and explain some of its duties |
Video Link : Keys used in cryptography: https://www.preveil.com/blog/public-and-private-key/ Text Book : Pdf (e-book) https://uomustansiriyah.edu.iq/media/lectures/6/6_2017_03_17!10_56_57_PM.pdf Web Link : https://simplicable.com/new/cryptographic-keys |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT –
5 :
Network Security-I
[Total Classes : 08]
Activity:
1 |
Factual |
Reading Prerequisite concepts- Network layers, email
architecture Videos related to network layer,
email service Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related to OSI model NPTEL Videos Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book concepts Understanding the architectures |
4 |
Applied |
Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-5 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
Security at application layer: PGP -general structure of email |
To explain the
general structure of an application program To discuss how
PGP can provide security services for To define trust
mechanism in PGP |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY Text Book : Pdf (e-book) Upload Web Link : https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
Security at application layer: PGP –
message |
To show the
structure of messages exchanged in PGP and S/MIME |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY Text Book : Pdf (e-book) Upload Web Link : https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
Security at application layer: S/MIME |
To discuss how
S/MIME can provide security services for To define trust
mechanism in S/MIME |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link : https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
Security at application layer: S/MIME -messages |
To show the
structure of messages exchanged in S/MIME |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link : https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
Security at the Transport Layer: introduction |
To discuss
the need for security services at the transport layer of the Internet model |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Application layer: https://www.youtube.com/watch?v=3s4yWb8izVs Email: https://www.youtube.com/watch?v=6jKGSthvIjY MIME protocol: https://www.youtube.com/watch?v=nvxT2_3fD_k Text Book : Pdf (e-book) Upload Web Link : https://www.javatpoint.com/computer-network-application-layer https://www.tutorialspoint.com/internet_technologies/e_mail_protocols.htm https://www.geeksforgeeks.org/multipurpose-internet-mail-extension-mime-protocol/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6. |
Security at the Transport Layer: SSL |
To discuss the
general architecture of SSL |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7. |
Security at the Transport Layer: TLS |
To discuss the
general architecture of TLS |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8. |
Security at the Transport Layer: SSL and TLS |
To compare and
contrast SSL and TLS |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Transport layer: https://www.youtube.com/watch?v=wZLMLX_hWk0&list=PL-bZp8Qhr-SZG08n3IeXT8R5hafSg_jIv Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
UNIT –
6 :
Network Security-II [Total
Classes : 10]
Activity:
1 |
Factual |
Reading Prerequisite concepts- IP layer functions, security
goals, attacks Videos related to ip layer Referring the content on the
Internet |
2 |
Conceptual |
Video Lectures related OSI model NPTEL Videos Links from the Internet Explained Examples from Internet |
3 |
Procedural |
Refer to text book concepts Understanding the architectures |
4 |
Applied |
Assignments Quiz
etc… |
Activity
/ Schedule of UNIT-6 :
Pre-Class : Videos, E-books, Web links, Case
Studies etc…
In-Class : Explanation on concept, discussion,
Poll, doubts clarification, PPT, Demo etc..
Post-Class : Discussion Forum, Review on topic,
Assessment, Quiz, Notes etc….
CLASS SL NO |
CONCEPT |
OBJECTIVES |
PRE-CLASS |
IN-CLASS |
POST-CLASS |
1. |
TCP/IP Protocol Suite Modes of communication |
To define the
architecture of IPSec To discuss the application of IPSec in
transport and tunnel modes |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link : https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
2. |
IPSec protocol : AH protocol |
To discuss how
IPSec can be used to provide only authentication |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link : https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
3. |
IPSec protocol : ESP protocol |
To discuss how
IPSec can be used to provide both confidentiality and authentication |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link : https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
4. |
IPSec protocol : SA-security
associations |
To define
Security Association and explain how it is implemented for IPSec |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link : https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
5. |
IPSec protocol : IKE – key exchange |
To define
Internet Key Exchange and explain how it is used by IPSec. |
Video Link : OSI model: https://www.youtube.com/watch?v=vv4y_uOneC0 Internet layer: https://www.youtube.com/watch?v=peGuEQLHKPg Text Book : Pdf (e-book) Upload Web Link : https://www.tutorialspoint.com/The-Internet-Layer-in-the-TCP-IP-Model |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
6 |
System Security: Intruders and types of intruders |
To understand the
intruder and types of intruders to the system |
Video Link : Security goals: https://www.youtube.com/watch?v=jOaiV-Z1JrQ Security attacks: https://www.youtube.com/watch?v=_o87RYxWWaM Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
7 |
System Security: Virus and its types |
To understand
viruses and types |
Video Link : Security goals: https://www.youtube.com/watch?v=jOaiV-Z1JrQ Security attacks: https://www.youtube.com/watch?v=_o87RYxWWaM Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
8 |
System Security: Intrusion detection systems |
To learn various
intrusion detection systems and their advantages |
Video Link : Intruder: https://www.youtube.com/watch?v=b5u3eG5t_88 Text Book : Pdf (e-book) Upload Web Link : https://flylib.com/books/en/3.190.1.151/1/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
9 |
System Security: Password management in UNIX |
To understand the
concept of password mechanism used in UNIX
OS |
Video Link : Basics of UNIX os: https://www.youtube.com/watch?v=stCeaX7g7FQ&list=PLQnX0XoCS0ILlxWz8oFIq4OQF8hzDfv4S Text Book : Pdf (e-book) Upload Web Link : https://flylib.com/books/en/3.190.1.151/1/ |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
10 |
System Security: Firewall and its types |
To understand
firewall and types of firewalls used |
Video Link : Network devices: https://www.youtube.com/watch?v=0pMm_QxCg3I Text Book : Pdf (e-book) Upload Web Link : |
Revise previous class – (5 mins) Asking Questions on previous class
randomely (5 Mins) PPT
presentation (35 min) Doubts clarification (5 min) |
Discussion Forum on the topic in
the group Review on the topic Share material on the topic |
Total
classes:
Unit.No |
Name
Of The Unit |
Hours Planned |
Unit-1 |
Symmetric Encryption |
10 |
Unit-2 |
Symmetric Encryption |
12 |
Unit-3 |
Asymmetric Encryption |
14 |
Unit-4 |
Data Integrity, Digital Signature Schemes & Key Management |
17 |
Unit-5 |
Network Security-I |
8 |
Unit-6 |
Network Security-II |
10 |
|
Total Hours |
71 |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.