Lesson Plan-Cs6701
Lesson Plan-Cs6701
LESSON PLAN
Course outcomes:
COs At the end of this course , The student will be able to K-level
CO1: Explain the basics of number theory and compare various encryption techniques K4
CO2: Summarize the functionality of public key cryptography K1
CO3: Apply various message authentication functions and secure algorithms K3
CO4: Demonstrate different types of security systems and applications K5
CO5: Discuss different levels of security and services K2
K-Levels:
K1 – Remember K2 – Understand K3-Apply K4 – Analyse K5 –Evaluate K6 -Create
Page 1 of 5
PO6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant
to the professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.
PO8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
PO9 Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
PO10 Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one‘s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
CO- PO Mapping:
POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
COs
K-level K K K K K K K K K K K K
CO1 K 3 3 3 2 3 - - - - - - 3
CO2 K 3 3 3 2 3 - 2 - - - - 3
CO3 K 3 2 3 2 2 3 1 3 3 2 3 3
CO4 K 3 3 2 1 3 3 2 3 3 2 2 3
CO5 K 3 3 1 2 2 2 2 2 - - - 3
Average 3 2.8 2.4 1.8 2.6 2.7 1.7 2.7 3 2 2.5 3
Correlation - 1: Low 2: Medium 3: High
Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
Introduction of security services,
1. CT 1
mechanisms and attacks
The OSI security architecture and
2. ICT-PPT 1
Network security model
Classical Encryption techniques
3. (Symmetric cipher model, CT and BB 1
substitution techniques)
Classical Encryption techniques
4. (Transposition techniques, CT and BB 1
steganography)
Finite Fields and Number Theory:
5. CT 1
Groups, Rings
Page 2 of 5
Finite Fields and Number Theory:
6. CT 1
Fields
Modular arithmetic:Euclid’s
7. algorithm-Finite fields- Polynomial CT 1
Arithmetic, Prime numbers
Modular arithmetic: Fermat’s and
8. CT 1
Euler’s theorem.
9. The Chinese remainder theorem CT and BB 1
10. Discrete logarithms CT and BB 1
Number of hours required to complete Unit I 10
Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
Page 3 of 5
Hash function: Security of hash
24. CT and BB 1
function
25. Hash function: MAC CT 1
26. MD5 CT and BB 1
27. SHA CT and BB 1
28. HMAC and CMAC CT 1
Digital signature and authentication
29. CT 1
protocols
DSS(Digital Signature Standards),
30. 1
EI Gamal and Schnorr
Number of hours required to complete Unit III 10
Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
40. E-mail Security: Security Services for ICT-PPT 1
E-mail-attacks possible through
Page 4 of 5
E-mail
Establishing keys privacy,
41. authentication of the source, Message ICT-PPT 1
Integrity
Non-repudiation-Pretty Good
42. Privacy-S/MIME. ICT-PPT 1
IPSecurity: Overview of IPSec
IP and IPv6, Authentication Header,
43. Encapsulation Security Payload ICT-PPT 1
(ESP)
Internet Key Exchange (Phases of
IKE, ISAKMP/IKE Encoding).
44. ICT-PPT 1
Web Security: SSL/TLS Basic
Protocol
Computing the keys- client
45. authentication-PKI as deployed by ICT-PPT 1
SSL
Attacks fixed in v3- Exportability-
46. ICT-PPT 1
Encoding
47. Secure Electronic Transaction (SET). ICT-PPT 1
48. Revision CT 1
Number of hours required to complete Unit V 9
Note: Teaching Methodologies
1. Lecture (Chalk & Talk (CT), Deliberation, Black board(BB), White board(WB))
2. Information and Communication Technology(ICT) tools (PPT, Video, OHP)
3. Experience Learning (Demonstration, Visiting the Artifact, Modeling)
4. Social Learning (Project & Problem based learning (PBL), Group Discussion(GD), Panel
discussion(PD), Seminar, Collaborative learning(CL), Co-operative learning(CL))
5. Enabling (Quiz, Brainstorming, Debate)
TEXT BOOKS:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education,
March 2013. (UNIT I,II,III,IV).
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of
India, 2002. (UNIT V).
REFERENCES:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and
Protocols”, Wiley Publications, 2003.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia, 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition,
Private Communication in Public World”, PHI 2002.
6. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley
Dreamtech India Pvt Ltd, 2003.
7. Douglas R Simson “Cryptography – Theory and practice”, First Edition, CRC Press, 1995.
8. http://nptel.ac.in/.
Page 5 of 5
ONLINE MATERIALS & WEBSITE LINKS:
Sl. No. Sources Website links
1. NPTEL http://nptel.ac.in/.
2. Handouts http://lecturenotes.in/.
Lecture/Demo
3. Youtube: InFinite Tutorials
Videos
ASSIGNMENT:
COs Assignment topics Submission date
CO1
CO2
CO3
CO4
CO5
NOTE:
1. Based on content added by faculty in the above tables, page number may exceed.
2. Times New Roman, font size of 12 is to be used.
3. K-Level for CO has to be fixed by Course handling faculty. Faculties have to justify
K-level fixed by them for their course.
4. K-level for PO has to be fixed for curriculum (Discussion with all faculties in their
Department). It is common to all Courses in their department.
5. Teaching methodology to be followed for each topic should be mentioned specifically
like Lecture – CT, ICT- PPT, ICT- Videos, and Enabling –Quiz. etc.,
Page 6 of 5