0% found this document useful (0 votes)
25 views

Cyptography and Network Security

He

Uploaded by

krsnagupta56
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Cyptography and Network Security

He

Uploaded by

krsnagupta56
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

MANIPAL UNIVERSITY JAIPUR

Department of IoT and Intelligent Systems


Course Hand-out
A. Basic Details:

Programme Name: B. Tech CSE (IoT and Intelligent Systems)

Course Name: Cryptography and Network Security

Course Code: IIS2242


LTPC (Lecture Tutorial Practical Credits): [3 0 0 3]
Session: Jan-May 2025

Class: B. Tech CSE – IoT and Intelligent Systems | SEM: IV

Course Coordinator: Mr. Rajesh Kumar


Course Instructor(s): Mr. Rajesh Kumar
Additional Practitioner(s) – if any (Industry Fellow/ Visiting To be decided and appointed later
Faculty/ Adjunct Faculty, etc.):

B. Introduction: This course is offered by the Department of IoT and Intelligent systems which provides students with a comprehensive
introduction to fundamental and advanced security concepts. Students will explore the principles of confidentiality, integrity, and
availability within the OSI security architecture and foundational topics such as number theory and probability in cryptography. The
course covers classical and modern cryptographic techniques, including block and stream ciphers, pseudorandom number
generation, and cryptographic hash functions. Additionally, it delves into public-key cryptography methods like RSA, Diffie-Hellman,
and elliptic curve cryptography, alongside digital signature schemes. Students will also learn to implement operating system security
measures, including authentication, access control, firewalls, and backups. Practical insights into security administration and
corporate espionage provide a real-world perspective on securing systems against evolving cyber threats.

C. Course Outcomes:

Target
CO Statement CO Level Target Attainment % Attainment
level

Explain the principles of confidentiality, integrity, 2 70 80


availability, and OSI security architecture. [IIS2242.1]

Apply classical and modern cryptographic


techniques, including block ciphers and 3 80 90
cryptographic modes. [IIS2242.2]

Use and Analyze public-key cryptography for 4 90 95


secure communication and key exchange. [IIS2242.3]

Apply operating system security measures like 3 80 90


authentication, access control, and firewalls. [IIS2242.4]
Information about attainment levels:

Attainment (%) Level


< 60 % 0
≥ 60% < 70% 1
≥ 70% < 80% 2
≥ 80 3

D. Program Outcomes and Program Specific Outcomes:


At the end of the course, students will be able to:

[PO. 1] Engineering knowledge: apply the knowledge of mathematics, computer science, and communication engineering
fundamentals to the solution of complex engineering problems.

[PO. 2] Problem analysis: identify, formulate, review research literature, and analyse complex engineering problems reaching
substantiated conclusions using basic principles of mathematics, computing techniques and communication engineering
principles.

[PO. 3] Design/development of solutions: design solutions for complex engineering problems and design system components or
processes that meet the specified requirements with appropriate consideration for law, safety, cultural & societal obligations
with environmental considerations.

[PO. 4] Conduct investigations of complex problems: use research-based knowledge and research methods including design of
experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.

[PO. 5] Modern tool usage: create, select, and apply appropriate techniques, resources, and modern engineering and IT tools
including prediction and modelling to complex engineering activities with an understanding of the limitations.

[PO. 6] The engineer and society: apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and
cultural issues and the consequent responsibilities relevant to the professional engineering practice.
[PO. 7] Environment and sustainability: understand the impact of the professional engineering solutions in societal and
environmental contexts, and demonstrate the knowledge of, and need for sustainable development.

[PO. 8] Ethics: apply ethical principles and commit to professional ethics, responsibilities and norms of the engineering practice.

[PO. 9] Individual and teamwork: function effectively as an individual, and as a member or leader in diverse teams, and in
multidisciplinary settings.

[PO. 10] Communication: communicate effectively for all engineering processes & activities with the peer engineering team,
community and with society at large. Clarity of thoughts, being able to comprehend and formulate effective reports and design
documentation, make effective presentations, and give and receive clear instructions.

[PO. 11] Project management and finance: demonstrate knowledge and understanding of the engineering and management principles
and apply these to one’s own work, as a member and leader in a team, to manage projects and in varied environments.

[PO. 12] Life-long learning: recognize the need for and have the preparation and ability to engage in independent and life-long learning
in the broadest context of technological change.

[PSO.1] Apply the fundamental knowledge of computer science and engineering in developing effective software/hardware for real
world complex engineering problems by adapting advanced technologies.
[PSO.2] Analyze and configure various IoT based innovative and smart applications using recent hardware and software tools.
[PSO.3] Design industrial IoT based solutions for improving operational efficiency at home and industry automation systems.

E. Assessment Plan:

Criteria Description Maximum Marks


Mid-Term Examination (Close/ Open Book) 30
Internal CWS (Quiz:10, Cybersecurity Essentials (Cisco Networking 30
Assessment Academy):10, Presentation /Assignment :10). Link for Cisco Course:
(Summative) Cybersecurity Essentials Course with Real-World Scenarios
End Term Exam End Term Exam (Close/ Open Book) 40
(Summative)
Total 100

F. Syllabus:
Introduction: confidentiality, integrity, availability, OSI security architecture; Number theory: finite fields, Galois field, primes, primality testing,
factoring algorithms; Probability and information theory: Shannon’s theory, perfect security; Classical ciphers; Block ciphers: DES, AES,
electronic codebook mode, cipher block chaining mode, cipher feedback mode, output feedback mode, counter mode; Pseudorandom number
generation; Stream ciphers; Cryptographic hash functions; Message authentication codes; Public-key cryptography: computational security,
computational assumptions, RSA, ElGamal, elliptic curve cryptography, digital signatures, Diffie- Hellman key exchange; Operating systems
security: security capabilities of different platforms, identification, authentication, user accounts, file permissions, backups, access control,
firewalls, methods of protection, ownership, assessing and securing a system, information warfare, security administration, corporate espionage

REFERENCE BOOKS
1. W. Stallings, "Cryptography and Network Security, Principles and Practices", 6th Edition, Pearson Education, 2013.
2. B. A. Forouzan, “Cryptography and Network Security”, 3rd Edition, McGraw Hill, 2015.
3. Atul Kahate, Cryptography and Network Security, 2nd Edition, McGraw Hill, 2008.
4. D. Stinson, Cryptography: Theory and Practice, (4e), CRC Press, 2018.
5. Pieprzyk, T. Hardjono, J. Seberry, “Fundamentals of Computer Security”, springer- Verlag Berlin Heidelberg, 2013.
6. C. P. Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall, 2014.

G. Lecture Plan:

Mode of
Lecture
Major Topics Topics Mode of Delivery Corresponding CO Assessing the
No.
Outcome
Introduction and
1 course handout Course handout Lecture NA NA
briefing
confidentiality, integrity Class Quiz
and availability
2 Lecture [IIS2242.1] Mid-Term

Introduction:
Lecture Class Quiz
3-4 OSI security architecture; [IIS2242.1] Mid-Term

finite fields and Galois field, Class Quiz


primes, primality testing
5-6 Lecture [IIS2242.1] Mid-Term

Number theory:
Class Quiz
7 factoring algorithms Lecture [IIS2242.1] Mid-Term
End-Term

Class Quiz
Shannon’s theory and
8-9 Lecture [IIS2242.1] Mid-Term
perfect security
Probability and
information
theory: Class Quiz
10-11 Classical ciphers Lecture [IIS2242.2] Mid-Term

12 Block ciphers: DES Lecture [IIS2242.2] Class Quiz


Mid-Term
End-Term

Class Quiz
13-14 AES Lecture [IIS2242.2] Mid-Term
End-Term

electronic codebook mode,


Class Quiz
cipher block chaining mode,
15-16 cipher feedback mode, Lecture [IIS2242.2] Mid-Term
output feedback mode,
End-Term
counter mode

Pseudorandom number Class Quiz


17 Lecture [IIS2242.2]
generation End-Term

Class Quiz
18 Stream ciphers Lecture [IIS2242.2]
End-Term

Class Quiz
Cryptographic hash
19 Lecture [IIS2242.2] Mid-Term
functions
End-Term

20 Message authentication [IIS2242.2] Class Quiz


codes
Mid-Term
End-Term

Mid-Term Exam

computational security, Class Quiz


21 Public-key Lecture [IIS2242.3]
cryptography: computational assumptions End-Term
22-23 RSA Lecture [IIS2242.3] Class Quiz
End-Term

24 ElGamal Lecture [IIS2242.3] Class Quiz


End-Term

25-26 elliptic curve cryptography Lecture [IIS2242.3] Class Quiz


End-Term

27 digital signatures Lecture [IIS2242.3] Class Quiz


End-Term

28-29 Diffie- Hellman key Lecture [IIS2242.3] Class Quiz


exchange;
End-Term

security capabilities of Class Quiz


30 Lecture [IIS2242.4]
different platforms End-Term
Operating systems
security:
Class Quiz
identification, authentication,
31 Lecture [IIS2242.4] End-Term
user accounts
Class Quiz
file permissions, backups,
32 Lecture [IIS2242.4] End-Term
access control

firewalls, methods of
protection, ownership, End-Term
33-34 Flip Activity [IIS2242.4]
assessing and securing a
system
information warfare,
security administration, End-Term
35-37 corporate espionage Flip Activity [IIS2242.4]

END-TERM EXAM
H. Course Articulation Matrix:

CORRELATION WITH PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMS


CO STATEMENT
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

Explain the principles of


[IIS2242.1] confidentiality, integrity, availability, 3 3 1 1 2 3
and OSI security architecture.

Apply classical and modern


cryptographic techniques,
[IIS2242.2] 3 3 2 1 1 1 1 2 2
including block ciphers and
cryptographic modes.

Use and Analyze public-key


[IIS2242.3] cryptography for secure 2 3 2 1 2 2 2
communication and key exchange.

Apply operating system security


[IIS2242.4] measures like authentication, 2 1 2 1 2 2
access control, and firewalls.

1-Low Correlation; 2- Moderate Correlation; 3- Substantial Correlation

You might also like