0% found this document useful (0 votes)
134 views6 pages

Lesson Plan-Cs6701

This lesson plan is for a Cryptography and Network Security course taught by J. Viswanath. The course aims to help students understand the basics of number theory, compare encryption techniques, apply message authentication functions and secure algorithms, and discuss different levels of security and applications. Over the course of 10 lectures, students will learn about topics like classical encryption techniques, finite fields, modular arithmetic, block ciphers, and public key cryptography. They will learn algorithms like DES, AES, RSA and explore their use through lectures, tutorials and practical sessions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views6 pages

Lesson Plan-Cs6701

This lesson plan is for a Cryptography and Network Security course taught by J. Viswanath. The course aims to help students understand the basics of number theory, compare encryption techniques, apply message authentication functions and secure algorithms, and discuss different levels of security and applications. Over the course of 10 lectures, students will learn about topics like classical encryption techniques, finite fields, modular arithmetic, block ciphers, and public key cryptography. They will learn algorithms like DES, AES, RSA and explore their use through lectures, tutorials and practical sessions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

Format ERA 15

NPR Nagar, Natham, Dindigul - 624401, Tamil Nadu, India. Issue 01


(Approved by AICTE, New Delhi & Affiliated to Anna University, Chennai)
Phone No: 04544- 246 500, 246501, 246502
Revision 00
Website : www.nprcolleges.org, www.nprcet.org Email:[email protected]

LESSON PLAN

Faculty Name & Code J.Viswanath Designation Assistant Professor


Course &
Department CSE B.E CSE & 2013
Regulation
Year & Semester IV & VII Academic Year 2018-2019
Subject Code & Name CS6701 & Cryptography and Network Security
L T P C
3 0 0 3

Course outcomes:
COs At the end of this course , The student will be able to K-level
CO1: Explain the basics of number theory and compare various encryption techniques K4
CO2: Summarize the functionality of public key cryptography K1
CO3: Apply various message authentication functions and secure algorithms K3
CO4: Demonstrate different types of security systems and applications K5
CO5: Discuss different levels of security and services K2
K-Levels:
K1 – Remember K2 – Understand K3-Apply K4 – Analyse K5 –Evaluate K6 -Create

Program Outcomes (POs)


On successful completion of the programme,
PO1 Engineering knowledge: Apply the knowledge of mathematics, science, engineering
fundamentals and an engineering specialization to the solution of complex engineering
problems.
PO2 Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
PO3 Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.
PO4 Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of
the information to provide valid conclusions.
PO5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.

Page 1 of 5
PO6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant
to the professional engineering practice.
PO7 Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and
need for sustainable development.
PO8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
PO9 Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
PO10 Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.
PO11 Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one‘s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.

CO- PO Mapping:
POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
COs
K-level K K K K K K K K K K K K
CO1 K 3 3 3 2 3 - - - - - - 3
CO2 K 3 3 3 2 3 - 2 - - - - 3
CO3 K 3 2 3 2 2 3 1 3 3 2 3 3
CO4 K 3 3 2 1 3 3 2 3 3 2 2 3
CO5 K 3 3 1 2 2 2 2 2 - - - 3
Average 3 2.8 2.4 1.8 2.6 2.7 1.7 2.7 3 2 2.5 3
Correlation - 1: Low 2: Medium 3: High

UNIT I – INTRODUCTION & NUMBER THEORY


No.Lecture

Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
Introduction of security services,
1. CT 1
mechanisms and attacks
The OSI security architecture and
2. ICT-PPT 1
Network security model
Classical Encryption techniques
3. (Symmetric cipher model, CT and BB 1
substitution techniques)
Classical Encryption techniques
4. (Transposition techniques, CT and BB 1
steganography)
Finite Fields and Number Theory:
5. CT 1
Groups, Rings

Page 2 of 5
Finite Fields and Number Theory:
6. CT 1
Fields
Modular arithmetic:Euclid’s
7. algorithm-Finite fields- Polynomial CT 1
Arithmetic, Prime numbers
Modular arithmetic: Fermat’s and
8. CT 1
Euler’s theorem.
9. The Chinese remainder theorem CT and BB 1
10. Discrete logarithms CT and BB 1
Number of hours required to complete Unit I 10

UNIT II - BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY


No.Lecture

Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned

11. Data Encryption Standard CT 1


Block cipher principles-block cipher
12. CT and BB 1
modes of operation
Advanced Encryption Standard
13. ICT-PPT 1
(AES)
14. Triple DES, Blowfish ICT-PPT 1
15. RC5 algorithm CT and BB 1
Public key cryptography: Principles
16. CT 1
of public key cryptosystems
17. The RSA algorithm CT and BB 1
18. Key management : Diffie Hellman CT 1
Key exchange: Elliptic curve
19. CT and BB 1
arithmetic
20. Elliptic curve cryptography. CT 1
Number of hours required to complete Unit II 10

UNIT III - HASH FUNCTIONS AND DIGITAL SIGNATURES


No.Lecture

Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned

21. Authentication requirement CT 1


22. Authentication function CT 1
23. Message Authentication Control CT 1

Page 3 of 5
Hash function: Security of hash
24. CT and BB 1
function
25. Hash function: MAC CT 1
26. MD5 CT and BB 1
27. SHA CT and BB 1
28. HMAC and CMAC CT 1
Digital signature and authentication
29. CT 1
protocols
DSS(Digital Signature Standards),
30. 1
EI Gamal and Schnorr
Number of hours required to complete Unit III 10

UNIT IV – SECURITY PRACTICE & SYSTEM SECURITY


No.Lecture

Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned

31. Authentication applications CT and BB 1


32. Kerberos CT 1
33. X.509 Authentication services CT and BB 1
Internet Firewalls for Trusted System:
34. Roles of Firewalls and Firewall ICT-PPT 1
related terminology
35. Types of Firewalls ICT-PPT 1
Firewall designs and SET for
36. ICT-PPT 1
E-Commerce Transactions
Intruder: Intrusion detection system,
Virus and related threats
37. ICT-PPT 1
Countermeasures, principles, Trusted
systems
Practical implementation of
38. ICT-PPT 1
cryptography and security.
39. Revision CT 1
Number of hours required to complete Unit IV 9

UNIT V - E-MAIL, IP & WEB SECURITY


No.Lecture

Page in No. of
Teaching
Topics to be Covered Text Book / hours Applications
methodology
Reference planned
40. E-mail Security: Security Services for ICT-PPT 1
E-mail-attacks possible through

Page 4 of 5
E-mail
Establishing keys privacy,
41. authentication of the source, Message ICT-PPT 1
Integrity
Non-repudiation-Pretty Good
42. Privacy-S/MIME. ICT-PPT 1
IPSecurity: Overview of IPSec
IP and IPv6, Authentication Header,
43. Encapsulation Security Payload ICT-PPT 1
(ESP)
Internet Key Exchange (Phases of
IKE, ISAKMP/IKE Encoding).
44. ICT-PPT 1
Web Security: SSL/TLS Basic
Protocol
Computing the keys- client
45. authentication-PKI as deployed by ICT-PPT 1
SSL
Attacks fixed in v3- Exportability-
46. ICT-PPT 1
Encoding
47. Secure Electronic Transaction (SET). ICT-PPT 1
48. Revision CT 1
Number of hours required to complete Unit V 9
Note: Teaching Methodologies
1. Lecture (Chalk & Talk (CT), Deliberation, Black board(BB), White board(WB))
2. Information and Communication Technology(ICT) tools (PPT, Video, OHP)
3. Experience Learning (Demonstration, Visiting the Artifact, Modeling)
4. Social Learning (Project & Problem based learning (PBL), Group Discussion(GD), Panel
discussion(PD), Seminar, Collaborative learning(CL), Co-operative learning(CL))
5. Enabling (Quiz, Brainstorming, Debate)
TEXT BOOKS:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education,
March 2013. (UNIT I,II,III,IV).
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of
India, 2002. (UNIT V).

REFERENCES:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and
Protocols”, Wiley Publications, 2003.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia, 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition,
Private Communication in Public World”, PHI 2002.
6. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley
Dreamtech India Pvt Ltd, 2003.
7. Douglas R Simson “Cryptography – Theory and practice”, First Edition, CRC Press, 1995.
8. http://nptel.ac.in/.

Page 5 of 5
ONLINE MATERIALS & WEBSITE LINKS:
Sl. No. Sources Website links
1. NPTEL http://nptel.ac.in/.
2. Handouts http://lecturenotes.in/.
Lecture/Demo
3. Youtube: InFinite Tutorials
Videos

CONTENT BEYOND SYLLABUS:


Internal /External
Sl. No. Topics Mode of Lecture
Resource person
Recent trends in AES design and Internal- J.Viswanath,
1. Seminar
symmetric cipher design AP/CSE
Latest Trends in Internet security and E- Internal-R.Hariharan ,
2. PPT
transaction AP/CSE

ASSIGNMENT:
COs Assignment topics Submission date
CO1
CO2
CO3
CO4
CO5

FACULTY IN-CHARGE HoD PRINCIPAL

NOTE:
1. Based on content added by faculty in the above tables, page number may exceed.
2. Times New Roman, font size of 12 is to be used.
3. K-Level for CO has to be fixed by Course handling faculty. Faculties have to justify
K-level fixed by them for their course.
4. K-level for PO has to be fixed for curriculum (Discussion with all faculties in their
Department). It is common to all Courses in their department.
5. Teaching methodology to be followed for each topic should be mentioned specifically
like Lecture – CT, ICT- PPT, ICT- Videos, and Enabling –Quiz. etc.,

Page 6 of 5

You might also like