Gujarat Technological University: Diploma in Information Technology
This document outlines the course content for an Information Security diploma program. The course covers 8 topics related to information security including introduction to information security, system security, symmetric key cryptography, substitution techniques, block ciphers, confidentiality using symmetric encryption, public key cryptography and RSA, and digital signatures and authentication protocols. It includes 12 hands-on programming labs to provide practical experience encrypting and decrypting data using different cipher techniques. The course aims to teach fundamental security concepts and cryptography methods over 42 total hours through lectures, readings from 4 recommended textbooks, and programming assignments.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
85 views
Gujarat Technological University: Diploma in Information Technology
This document outlines the course content for an Information Security diploma program. The course covers 8 topics related to information security including introduction to information security, system security, symmetric key cryptography, substitution techniques, block ciphers, confidentiality using symmetric encryption, public key cryptography and RSA, and digital signatures and authentication protocols. It includes 12 hands-on programming labs to provide practical experience encrypting and decrypting data using different cipher techniques. The course aims to teach fundamental security concepts and cryptography methods over 42 total hours through lectures, readings from 4 recommended textbooks, and programming assignments.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
GUJARAT TECHNOLOGICAL UNIVERSITY
DIPLOMA IN INFORMATION TECHNOLOGY
SEMESTER- VI
Subject Name: Information Security Subject Code: 2361602
Sr. No. Subject Content Total Hrs. 1 INTRODUCTION TO INFORMATION SECURITY 1.1 What Is Information Security? 1.2 Overview of information Security 1.3 Security Services, Mechanisms and Attacks 1.4 The OSI Security Architecture 1.5 A Model for Network Security
4 2 SYSTEM SECURITY 2.1 Intruders 2.1.1 Intruders 2.1.2 Intruders detection 2.1.3 Password management. 2.2 Malicious Software 2.2.1 Viruses and Related Threats 2.2.2 Virus Countermeasures 2.3 Firewalls 2.3.1 Firewalls Design principle 2.3.2 Trusted Systems
4 4 SUBSTITUTION TECHNIQUES 4.1 Creaser Cipher, Monoalphabetic Ciphers, Playfair Cipher 4.2 One Time Pad, Transposition Techniques , Stegnography
4 5 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD 5.1 Simplified DES , Block Cipher Principles 5.2 The Data Encryption Standard , The Strength of DES 5.3 Block Cipher Modes of Operation
6 6 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION 6.1 Placement of Encryption Function 6 6.2 Traffic Confidentiality 6.3 Key Distribution 6.4 Random Number Generation
7 PUBLIC-KEY CRYPTOGRAPHY AND RSA 7.1 Principles of Public-key Cryptosystems 7.2 RSA 7.3 Key Management in public-key cryptosystem 7.4 Diffie-Hellman Key Exchange
6 8 Digital Signature and Authentication Protocols 8.1 Digital Signatures 8.2 Authentication Protocols 8.3 Digital Signature Standard
4 Total 42
Laboratory Experiences: 1. Write a cprogram to Encrypt the plaintext and display the cipher text using Ceaser Cipher. 2. Write a cprogram to Decrypt the cipher text and display the plain text using Ceaser Cipher. 3. Write a cprogram to Encrypt the plaintext and display the cipher text using Monoalphabetic Substitution Cipher. 4. Write a cprogram to Decrypt the cipher text and display the plain text using Monoalphabetic Substitution Cipher. 5. Write a cprogram to Encrypt the plaintext and display the cipher text using playfair Cipher. 6. Write a cprogram to Decrypt the cipher text and display the plain text using playfair Cipher. 7. Write a cprogram to Encrypt the plaintext and display the cipher text using Vigenere Cipher. 8. Write a cprogram to Decrypt the cipher text and display the plain text using Vigenere Cipher. 9. Write a cprogram to Encrypt the plaintext and display the cipher text using Autokey Vigenere Cipher. 10. Write a cprogram to Decrypt the cipher text and display the plain text using Autokey Vigenere Cipher. 11.Write a cprogram to Encrypt the plaintext and display the cipher text using Columnar Transposition Cipher. 12.Write a cprogram to Decrypt the cipher text and display the plain text using Columnar Transposition Cipher
Text Book: (1) Cryptography and Network Security By William Stallings(Pearson Education)
Reference Books: (1) Computer Security Basics By Debby Russell, G.T. Gangemi, Sr.(Oreilly) (2) Network Security private communication in a PUBLIC world By Charlie Kaufman, Radia Perlman , Mike Speciner (3) Security in Computing, Charless P. Pfleeger, Shari Lawrence Pfleeger. (4) Enterprise Security, Robert C. Newman(Pearson Education)