Department of Computer Science & Engineering
National Institute of Technology Srinagar
Course Title Network Security Semester 7th
Department Computer Science & Course Code CST417
Engineering
Credits 04 L T P
Course Type Theory 3 1 0
Course Objectives
• To help the students to understand important security goals in the networks-
Confidentiality, Integrity, Authenticity, Non-repudiation and Availability and
cryptographic techniques to implement these security goals.
• To provide a necessary review of mathematical concepts to implement different
cryptographic techniques to achieve the network security goals and then provides a
deeper dive to the field of cryptography- symmetric and asymmetric key cryptography
and methods to implement them.
• The course provides a top down approach to explore the security implementations in
different network layers-application, transport and network.
Learning Outcomes
After completion of this course the students should be able to:
• Visualize the security goals clearly in the networks.
• Analyse the basic concepts of network security to predict and classify attacks on a
system/network.
• Understand and apply authentication techniques to provide secure communication.
• Assess the security threats to ICT infrastructure using modern tools such as firewalls,
UTMs, etc.
Course Synopsis
Cryptography, classical encryption, Divisibility, Modular Arithmetic,Random Numbers.
Course Outline / Content
Unit Topics Week
1. Introduction 1
Review of Layered Architecture of the Network - the OSI
Reference Model, Computer Security Concepts, The OSI
58
Security Architecture, Security - Attacks, Services and
Mechanisms.
2. Cryptography Introduction: Classical Encryption 1
Techniques
Techniques for Implementing Security Goals: An Overview of
Cryptography and Steganography, A brief recap of cryptographic
principles and motivations for secure network, General thoughts
on breaking the cryptosystems.
3. Review & Self Study - Mathematics for Symmetric Key 2
Cryptography
Review of important mathematical concepts: Divisibility,
Modular Arithmetic, Groups and Rings. Classical Encryption
Techniques - Substitution and Transposition
4. Random Number (PRN) Generation and Stream Cipher 2
Random Numbers, True Random Number Generators, Pseudo
Random Numbers - principles and generators, Cryptographically
Secure Random Number Generators, One Time Pad, Stream
Cipher- RC4
5. Block Ciphers - Data Encryption Standard (DES) and 2
Advanced Encryption Standard (AES)
Block Cipher Structure, Introduction to Data Encryption
Standard, Triple DES - introduction, structure & implementation,
Fields, Finite Fields - GF(p), GF(2n) and polynomial arithmetic.
Advanced Encryption Standard (AES) - Introduction, structure &
implementation.
6. Block Cipher Operations 2
Modes of Operations, Electronic Code Book Mode, Cipher
Block Chaining Mode, Output Feedback Mode, Cipher Feedback
Mode, Counter Mode, Enhancing the Security of Block Ciphers:
Multiple Encryption, 3DES and DESX, Meet-in-the Middle
Attack.
7. Data Integrity 2
Introduction & Motivation, Hash Functions from Block Cipher,
Message Digest (MD) Hash Family, Secure Hash Algorithm
59
(SHA-1 and SHA-3), Message Authentication Codes (MAC).
8. Review & Self Study - Mathematics for Asymmetric Key 2
Cryptography
Review of important mathematical concepts used in asymmetric
key cryptography – Euclidean and Extended Euclidean
Algorithm, Euler’s Phi Function, Prime Numbers and Primality
Testing, Euler's and Fermat's Theorem.
9. Asymmetric Key Cryptography 1
Introduction & Principles of Asymmetric Key Cryptography,
Different Public Key Algorithms, Introduction to RSA, RSA in
Practice and Attacks, Diffe-Hellman Key Exchange.
10. Digital Signatures 1
Introduction & Motivation, Principles and Applications, RSA
based Digital Signature, RSA Probilistic Signature Scheme.
11. Mutual Trust - Key Management and User Authentication 1
Introduction and challenges in key distribution, Symmetric Key
Distribution and Agreement, Public Key Distribution, Principles
of user authentication, User Authentication Protocol – Kerberos,
Public-Key Infrastructure.
12. Security at the Application Layer 1
Application Layer Security - Objectives, Issues and Need, Email
Security, Pretty Good Privacy, Secure/Mulitpurpose Internet
Mail Extension, Domain Keys Identfied Mail.
13. Security at the Transport Layer 1
Web Security: Threats and Challenges, Securing Web-based
transactions at the transport layer, Secure Socket Layer,
Transport Layer Security, HTTPS, Combining HTTP and
SSL/TLS - the secure HTTPS, Remote login, Challenges, One
Possible Solution Approach – SSH, Wireless Security – TLS and
WAP End-to-End Security.
14. Security at the Network Layer 1
IP Security: Overview and Policy, Encapsulating Security
Payload, Combining Security Associations, Internet Key
Exchange, Cryptogaphic Suites.
60
15. System Security 2
Malwares – Virus, Worms, etc, Malicious Software and Anti-
malwares, Distributed Denial of Service Attacks, Intruders and
Intrusion Detection, Firewall Need and Characteristics, Types of
Firewalls and Biasing, Firewall Location and Confgurations.
Text Books
1. Stallings William: Cryptography and Network Security - Principles and Practice,
Pearson India, 6th Edition, 2014.
References
1. ChristofPaar and Jan Pelzl: Understanding Cryptography - A Textbook for
Students and Practitioners, Springer, 1st Edition, 2010.
2. SchneierBruice: Applied Cryptography : Protocols, Algorithms And Source Code
In C, Wiley India, 2nd Edition, Reprint - 2013.
3. Kurose James F and Keith W. Ross: Computer Networking: A Top-Down
Approach, Pearson India, 5th Edition, 2012.
61