0% found this document useful (0 votes)
50 views

Lesson Plan Unit I Introduction & Number Theory 10 Hours

The lesson plan outlines 5 units that cover various topics in network security over 36 hours. Unit I introduces number theory and classical encryption techniques over 10 hours. Unit II covers block ciphers and public key cryptography over 10 hours, including AES, DES, RSA, and Diffie-Hellman. Unit III focuses on hash functions and digital signatures over 8 hours, such as MD5, SHA, and digital signatures. Unit IV discusses security practices and system security over 8 hours, including firewalls, intrusion detection, and viruses. Finally, Unit V examines e-mail, IP, and web security over 9 hours, covering PGP, IPSec, SSL/TLS, and SET.

Uploaded by

shika2906
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Lesson Plan Unit I Introduction & Number Theory 10 Hours

The lesson plan outlines 5 units that cover various topics in network security over 36 hours. Unit I introduces number theory and classical encryption techniques over 10 hours. Unit II covers block ciphers and public key cryptography over 10 hours, including AES, DES, RSA, and Diffie-Hellman. Unit III focuses on hash functions and digital signatures over 8 hours, such as MD5, SHA, and digital signatures. Unit IV discusses security practices and system security over 8 hours, including firewalls, intrusion detection, and viruses. Finally, Unit V examines e-mail, IP, and web security over 9 hours, covering PGP, IPSec, SSL/TLS, and SET.

Uploaded by

shika2906
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Lesson Plan

UNIT I
INTRODUCTION & NUMBER THEORY
10 hours
1. Services, Mechanisms and attacks, OSI security architecture
2. Network security model and Classical Encryption techniques, Symmetric cipher model
3. Substitution techniques
4. Substitution techniques
5. Transposition techniques and Steganography
6. FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic
7. Euclid’s algorithm
8. Finite fields, Polynomial Arithmetic,
9. Prime numbers , Fermat’s and Euler’s theorem, Testing for primality
10. The Chinese remainder theorem, Discrete logarithms.
UNIT II
BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY
10 hours
1. Block cipher principles and block cipher modes of operation
2. Data Encryption Standard
3. Advanced Encryption Standard (AES)- Structure, Transformation Function
4. Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation
5. Triple DES and Blowfish
6. RC5 algorithm.
7. Principles of public key cryptosystems
8. The RSA algorithm and Key management
9. Diffie Hellman Key exchange
10. Elliptic curve arithmetic and Elliptic curve cryptography
UNIT III
HASH FUNCTIONS AND DIGITAL SIGNATURES
8 hours
1. Authentication requirement and Authentication function
2. MAC and Hash function
3. Security of hash function and MAC
4. MD5 and SHA
5. HMAC and CMAC
6. Digital signature and authentication protocols
7. DSS
8. EIgamal and Schnorr
UNIT IV
SECURITY PRACTICE & SYSTEM SECURITY
8 hours
1. Authentication applications and Kerberos
2. X.509 Authentication services
3. Roles of Firewalls, Firewall related terminology and Types of Firewalls
4. Firewall designs and SET for E-Commerce Transactions.
5. Intruder and Intrusion detection system
6. Virus and related threats, Countermeasures
7. Firewalls design principles, Trusted systems
8. Practical implementation of cryptography and security.
UNIT V
E-MAIL, IP & WEB SECURITY
9 hours
1. E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys,
privacy
2. Authentication of the source, Message Integrity and Non-repudiation
3. Pretty Good Privacy and S/MIME.
4. IPSecurity: Overview of IPSec, IP and IPv6
5. Authentication Header and Encapsulation Security Payload(ESP)
6. Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
7. Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication
8. PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding
9. Secure Electronic Transaction (SET).

You might also like