Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views5 pages

OS Sample LP

Uploaded by

mercy joyce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views5 pages

OS Sample LP

Uploaded by

mercy joyce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Academic
Name of the B. Tech & Computer Science and 2024-25&
Year&
Program &Branch Engineering (AIML) I Semester
Semester
Theory
Course Title Network security and cryptography Course Type
& Lab
Course Code CY504PC Course Structure L-3, T-1 P-0 Credits -04

Regulation SDES-R22 Course Area/Module Security of network

Course Coordinator : G.MERCY


Course Instructor : G.MERCY JOYCE
JOYCE
Date of
Date of Closure
Commencement
Total No. of students registered
COURSE DESCRIPTION:

This course provides a comprehensive introduction to the principles and practices of network
security and cryptography. It explores the fundamental concepts of data protection, secure
communication, and cryptographic algorithms. Students will learn about various threats to
computer networks and the methods used to prevent and mitigate them. Topics include
symmetric and asymmetric encryption, hashing, digital signatures, key management,
authentication protocols, firewalls, intrusion detection systems, and VPNs.
.
PRE-REQUISITES FOR THE COURSE:

Students are expected to have knowledge on the following topics:


S. No Topic
1 Student will be able to understand basic cryptographic algorithms, message and web
authentication and security issues.
2 Ability to identify information system requirements for both of them such as client and
server
3 Ability to understand the current legal issues towards information security

COURSE OBJECTIVES:

Explain the importance and application of each of confidentiality, integrity, authentication


1
and availability Understand various cryptographic algorithms

2 Understand the basic categories of threats to computers and networks


3 Describe public-key cryptosystem
4 Describe the enhancements made to IPv4 by IPSec
5 Understand Intrusions and intrusion detection

COURSE OUTCOMES:
At the end of the course, the students will be able to:
Explain the basic concepts of network security, security threats, and
CO1
cryptographic principles.
Apply symmetric and asymmetric cryptographic algorithms (DES, AES, RSA,
CO2
etc.) for secure communication
Analyze key management techniques, digital signatures, and certificate-based
CO3
authentication
Evaluate the effectiveness of various network security mechanisms such as
CO4
firewalls, IDS, VPNs, and IPsec
Identify and propose solutions to emerging threats in wireless and mobile
CO5
networks.

COURSE ARTICULATION (CO-PO/PSO MAPPING):

CO \ PO/PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 - - - - - - 1 - - 2 1
CO2 3 3 2 1 1 - - - - 2 - - 3 2
CO3 3 2 2 2 - - - - - 2 - - 3 2
CO4 2 2 3 2 2 - - - - 2 - - 3 2
CO5 2 2 2 2 3 1 1 - - 2 - - 2 2

COURSE CONTENT (Syllabus):


UNIT - I
Security Concepts: Introduction, The need for security, Security approaches,
Principles of security, Types of Security attacks, Security services, Security
Mechanisms, A model for Network Security.
Cryptography Concepts and Techniques: Introduction, plain text and cipher t
ext, substitution techniques, transposition techniques, encryption and decryption,
symmetric and asymmetric key cryptography, steganography, key range and key
size, possible types of attacks.

UNIT - II
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA,
Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm,
Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

Unit-III
Cryptographic Hash Functions:
Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication
codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal
Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric
& Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509
Authentication Service, Public – Key Infrastructure
UNIT IV:
Transport-level Security: Web security considerations, Secure Socket Layer and
Transport Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE
802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT V:
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security
overview, IP Security architecture, Authentication Header, Encapsulating security
payload, combining security associations, Internet Key
Exchange Case Studies on Cryptography and security: Secure Multiparty
Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment
Transactions, Cross site Scripting Vulnerability.
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings,
Pearson Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition

REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan,
Wiley India, 1st Edition.
2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd
Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning

PEDAGOGICAL APPROACH:

S.
Approach P-IDX
No
1 Chalk and talk in the class room 1
2 NPTEL VIDEO Transcripts 2
3 PPTs 3
4 Home Assignments (Worksheets) 4
5 Quiz 5
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
LESSON PLAN
Academic Year : 2024 – 2025 Branch: CSE
Class& Semester : III B.Tech I Sem Faculty: Mercy Joyce
Subject : Network Security and cryptography
Cumulat P-IDX Tentative
S. No. of ive No. Completion
Topics to be covered
No Lectures of Date
Lectures
UNIT I- Security Concepts
1 Introduction 1 1 1
2 The need for security 1 2 1
3 Security approaches 1 3 1
4 Principles of security 2 5 4
5 Types of Security attacks 2 7 4
6 Security services 2 9 5
7 Security Mechanisms 2 11 4
8 Cryptography Concepts and Techniques: 1 12 5
9 Introduction, plain text and cipher text 1 13 5
10 transposition techniques 1 14 4
11 encryption and decryption 2 16 1
12 symmetric and asymmetric key cryptography 2 18 1
steganography, key range and key size, 2 20 1
13
possible types of attacks
UNIT II
14 Scheduling Criteria 1 14 1
15 Scheduling Algorithms 2 16 4
16 Multiple -Processor Scheduling 1 17 4
17 System call interface 1 18 1
18 Process management 1 19 4
19 Fork, exit, wait, waitpid 1 20 4
20 Deadlocks - System Model 1 21 1
21 Deadlocks Characterization 1 22 1
22 Methods for Handling Deadlocks 1 23 1
23 DeadlockPrevention 1 24 3
24 Deadlock Avoidance 1 25 2
25 Deadlock Detection 1 26 1
26 Recovery from Deadlock 1 27 1
UNIT III - Process Management and Synchronization
27 Critical Section Problem 1 28 2 19-09-2024
28 SynchronizationHardware 1 29 1 20-09-2024
29 Semaphores 1 30 1 21-09-2024
30 Classical Problems of Synchronization 1 31 1 23-09-2024
31 Critical Regions, Monitors 1 32 1 25-09-2024
1 33 1 30-09-2024
32 Interprocess Communication Mechanisms

IPC between processes on a single computer 1 34 3 1-10-2024


33
system
34 IPC between processes on different systems 1 35 3 3-10-2024
35 Pipes, FIFOs 1 36 3 4-10-2024
36 Message queues, shared memory 1 37 3 5-10-2024
UNIT IV-Memory Management and Virtual Memory
37 Logical versus Physical Address Space 1 38 1 14-10-2024
38 Swapping,Contiguous Allocation 1 39 3 16-10-2024
39 Paging, Segmentation 2 41 1 17-10-2024
40 Segmentation with Paging 1 42 1
41 Demand Paging 1 43 2 21-10-2024
42 PageReplacement 1 44 2 23-10-2024
43 Page Replacement Algorithms 1 45 3 25-10-2024
UNIT VFile System Interface and Operations
44 Access methods 1 46 1 29-10-2024
45 Directory Structure, Protection 2 48 2 30-10-2024
46 File SystemStructure 1 49 2 04-11-2024
47 Allocation methods 1 50 2 05-11-2024
48 Free-space Management 1 51 1 08-11-2024
49 Usage of open, create system calls 1 52 1 11-11-2024
50 Read, write, close system calls 2 54 2 13-11-2024
51 lseek, stat, ioctl system calls 1 55 1 20-11-2024

Mention Gaps Identified (Missing Content of syllabus / Industry/Profession Requirements


or POs) if any:

 Linux operating system


 Disk Management and Disk Scheduling Algorithms

Course Coordinator Module Coordinator Head of the Dept.

You might also like