RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
New Scheme Based On AICTE Flexible Curricula
Information Technology, VIII- semester
IT 801- Information Security
Course Objectives:
The objective of this course is to familiarize the students with the fundamentals of information
security and the methods used in protecting both the information present in computer storage as
well as information traveling over computer networks.
Unit I Introduction: Fundamental Principles of Information Security- Confidentiality,
Availability, Integrity, Non Repudiation, The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, a Model for Network Security; Classical Encryption
Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques,
Steganography
Unit II Block Ciphers and Data Encryption Algorithm: Block Cipher Principles, The Data
Encryption Standard, The Strength of DES, Differential and linear cryptanalysis, Block Cipher
Design Principles; Advanced Encryption Standard: Evaluation criteria of AES, The AES Cipher,
Multiple Encryption and Triple DES, Block Cipher modes of operation, Stream Ciphers,
Confidentiality using Symmetric Encryption
Unit III Public Key Encryption: Principles of Public Key Cryptosystems, The RSA algorithm,
Key Management, Diffie-Hellman Key Exchange, Elliptic curve cryptography; Message
Authentication and Hash Functions: Authentication requirements, Authentication Functions,
Message Authentication Codes, Hash Functions, Security of Hash Functions and MACs; Hash
and MAC algorithms: Secure Hash Algorithm, HMAC; Digital Signatures and Authentication
Protocols, Digital Signature Standard
Unit IV Authentication Applications, Kerberos, X.509 Authentication Service, Public key
infrastructure; Electronic Mail Security: Pretty Good Privacy; IP Security: IP Security Overview,
Architecture, Authentication header, encapsulating security payload, Key management; Web
Security: Web security considerations, Secure Socket Layer and Transport layer Security, Secure
Electronic Transaction
Unit V System Security: Intruders, Intrusion Detection, Password management; Malicious
Software: Different type of malicious software, Viruses and related threats, Virus
Countermeasures, Threats and attacks on Information Security, DoS and DDos Attacks; Security
controls required for Information Security, Firewalls: Firewall design principles, Trusted Systems,
Common criteria for information technology security evaluation
References:
1. William Stallings, "Cryptography and Network Security", Fourth edition, PHI
2. Atul Kahate, “Cryptography and Network Security”, McGraw Hill.
3. V.K. Pachghare, “Cryptography and Information Security”, PHI Learning
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
New Scheme Based On AICTE Flexible Curricula
Information Technology, VIII- semester
Departmental Elective IT 802 (A) Machine Learning
Course Objectives:
To familiarize students with the knowledge of machine learning and enable them to apply suitable
machine learning techniques for data handling and to gain knowledge from it. Evaluate the
performance of algorithms and to provide solution for various real-world applications.
Unit I Introduction:
Introduction, Examples of various Learning Paradigms, Perspectives and Issues, Concept
Learning, Version Spaces, Finite and Infinite Hypothesis Spaces, PAC Learning, VC Dimension
Unit II Supervised Learning Algorithms:
Learning a Class from Examples, Linear, Non-linear, Multi-class and Multi-label classification,
Decision Trees: ID3, Classification and Regression Trees (CART), Regression: Linear
Regression, Multiple Linear Regression, Logistic Regression, Neural Networks: Introduction,
Perceptron, Multilayer Perceptron, Support vector machines: Linear and NonLinear, Kernel
Functions, K-Nearest Neighbors
Unit III Ensemble Learning:
Ensemble Learning Model Combination Schemes, Voting, Error-Correcting Output Codes,
Bagging: Random Forest Trees, Boosting: Adaboost, Stacking
Unit IV Unsupervised Learning:
Introduction to clustering, Hierarchical: AGNES, DIANA, Partitional: K-means clustering, K-
Mode Clustering, Self-Organizing Map, Expectation Maximization, Gaussian Mixture Models,
Principal Component Analysis (PCA), Locally Linear Embedding (LLE), Factor Analysis
Unit V Probabilistic Learning:
Bayesian Learning, Bayes Optimal Classifier, Naïve Bayes Classifier, Bayesian Belief Networks,
Mining Frequent Patterns
References:
1. EthemAlpaydin,"Introduction to Machine Learning”, MIT Press, Prentice Hall of India,
Third Edition 2014.
2. MehryarMohri, AfshinRostamizadeh, AmeetTalwalkar "Foundations of Machine
Learning”, MIT Press, 2012.
3. Tom Mitchell, “Machine Learning”, McGraw Hill, 3rd Edition,1997.
4. Charu C. Aggarwal, “Data Classification Algorithms and Applications”, CRC Press,
2014.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
New Scheme Based On AICTE Flexible Curricula
Information Technology, VIII- semester
Open Elective IT 803 (A) Blockchain Technology
Course Objectives:
The objective of this course is to provide conceptual understanding of how block chain
technology can be used to innovate and improve business processes. The course covers the
technological underpinning of block Chain operations in both theoretical and practical
implementation of solutions using block Chain technology.
Unit I Introduction: Overview of Block chain, Public Ledgers, Bitcoin, Smart Contracts, Block in
a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain, Understanding
Cryptocurrency to Block chain, Permissioned Model of Block chain, Overview of Security
aspects of Block chain; Basic Crypto Primitives: Cryptographic Hash Function, Properties of a
hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography, A basic
cryptocurrency
Unit II Understanding Block chain with Crypto currency: Bitcoin and Block chain: Creation of
coins, Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in
Bitcoin Network, Block Mining, Block propagation and block relay.
Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a
Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW,
Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed
Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Unit III Understanding Block chain for Enterprises: Permissioned Block chain: Permissioned
model and use cases, Design issues for Permissioned block chains, Execute contracts, State
machine replication, Overview of Consensus models for permissioned block chain- Distributed
consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem,
Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over
Asynchronous systems.
Unit IV Enterprise application of Block chain: Cross border payments, Know Your Customer
(KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade –
Trade Finance Network, Supply Chain Financing, and Identity on Block chain
Unit V Block chain application development: Hyperledger Fabric- Architecture, Identities and
Policies, Membership and Access Control, Channels, Transaction Validation, Writing smart
contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview of Ripple
and Corda
References:
1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
2. Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain
Technology and Leveraging Block Chain Programming”
3. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017