0% found this document useful (0 votes)
85 views

Gujarat Technological University: Diploma in Information Technology

This document outlines the course content for an Information Security diploma program. The course covers 8 topics related to information security including introduction to information security, system security, symmetric key cryptography, substitution techniques, block ciphers, confidentiality using symmetric encryption, public key cryptography and RSA, and digital signatures and authentication protocols. It includes 12 hands-on programming labs to provide practical experience encrypting and decrypting data using different cipher techniques. The course aims to teach fundamental security concepts and cryptography methods over 42 total hours through lectures, readings from 4 recommended textbooks, and programming assignments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Gujarat Technological University: Diploma in Information Technology

This document outlines the course content for an Information Security diploma program. The course covers 8 topics related to information security including introduction to information security, system security, symmetric key cryptography, substitution techniques, block ciphers, confidentiality using symmetric encryption, public key cryptography and RSA, and digital signatures and authentication protocols. It includes 12 hands-on programming labs to provide practical experience encrypting and decrypting data using different cipher techniques. The course aims to teach fundamental security concepts and cryptography methods over 42 total hours through lectures, readings from 4 recommended textbooks, and programming assignments.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

GUJARAT TECHNOLOGICAL UNIVERSITY

DIPLOMA IN INFORMATION TECHNOLOGY


SEMESTER- VI

Subject Name: Information Security
Subject Code: 2361602

Sr.
No.
Subject Content
Total
Hrs.
1 INTRODUCTION TO INFORMATION SECURITY
1.1 What Is Information Security?
1.2 Overview of information Security
1.3 Security Services, Mechanisms and Attacks
1.4 The OSI Security Architecture
1.5 A Model for Network Security

4
2 SYSTEM SECURITY
2.1 Intruders
2.1.1 Intruders
2.1.2 Intruders detection
2.1.3 Password management.
2.2 Malicious Software
2.2.1 Viruses and Related Threats
2.2.2 Virus Countermeasures
2.3 Firewalls
2.3.1 Firewalls Design principle
2.3.2 Trusted Systems

8
3 SYMMETRIC KEY CRYPTOGRAPHY
3.1 Symmetric Cipher Model
3.2 Cryptography, Cryptanalysis

4
4 SUBSTITUTION TECHNIQUES
4.1 Creaser Cipher, Monoalphabetic Ciphers, Playfair Cipher
4.2 One Time Pad, Transposition Techniques , Stegnography

4
5 BLOCK CIPHERS AND THE DATA ENCRYPTION
STANDARD
5.1 Simplified DES , Block Cipher Principles
5.2 The Data Encryption Standard , The Strength of DES
5.3 Block Cipher Modes of Operation

6
6 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION
6.1 Placement of Encryption Function
6
6.2 Traffic Confidentiality
6.3 Key Distribution
6.4 Random Number Generation

7 PUBLIC-KEY CRYPTOGRAPHY AND RSA
7.1 Principles of Public-key Cryptosystems
7.2 RSA
7.3 Key Management in public-key cryptosystem
7.4 Diffie-Hellman Key Exchange

6
8 Digital Signature and Authentication Protocols
8.1 Digital Signatures
8.2 Authentication Protocols
8.3 Digital Signature Standard

4
Total 42

Laboratory Experiences:
1. Write a cprogram to Encrypt the plaintext and display the cipher text using Ceaser
Cipher.
2. Write a cprogram to Decrypt the cipher text and display the plain text using Ceaser
Cipher.
3. Write a cprogram to Encrypt the plaintext and display the cipher text using
Monoalphabetic Substitution Cipher.
4. Write a cprogram to Decrypt the cipher text and display the plain text using
Monoalphabetic Substitution Cipher.
5. Write a cprogram to Encrypt the plaintext and display the cipher text using playfair
Cipher.
6. Write a cprogram to Decrypt the cipher text and display the plain text using playfair
Cipher.
7. Write a cprogram to Encrypt the plaintext and display the cipher text using Vigenere
Cipher.
8. Write a cprogram to Decrypt the cipher text and display the plain text using Vigenere
Cipher.
9. Write a cprogram to Encrypt the plaintext and display the cipher text using Autokey
Vigenere Cipher.
10. Write a cprogram to Decrypt the cipher text and display the plain text using
Autokey Vigenere Cipher.
11.Write a cprogram to Encrypt the plaintext and display the cipher text using
Columnar Transposition Cipher.
12.Write a cprogram to Decrypt the cipher text and display the plain text using
Columnar Transposition Cipher



Text Book:
(1) Cryptography and Network Security By William Stallings(Pearson Education)

Reference Books:
(1) Computer Security Basics By Debby Russell, G.T. Gangemi, Sr.(Oreilly)
(2) Network Security private communication in a PUBLIC world By Charlie Kaufman,
Radia Perlman , Mike Speciner
(3) Security in Computing, Charless P. Pfleeger, Shari Lawrence Pfleeger.
(4) Enterprise Security, Robert C. Newman(Pearson Education)

You might also like