Friday 3 May 2013

Network Security
B.Sc. (IT) Sem. V

 

Syllabus

Unit 1. Cryptography
Introduction. Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The AffineCipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers,Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher,Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon'sTheory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, SpuriousKeys and Unicity Distance.The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, DifferentialCryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES.Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, TheChinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA,Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial InformationConcerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method,Dixon's Algorithm and the Quadratic Sieve, Factoring Algorithms in Practice.

Unit 2. Signature Schemes
Introduction, The ElGamal Signature Scheme, The Digital Signature Standard, One-time Signatures,Undeniable Signatures, Fail-stop Signatures.

Hash Functions
Signatures and Hash Functions, Collision-free Hash Functions, The Birthday Attack, A Discrete LogHash Function, Extending Hash Functions, Hash Functions from Cryptosystems, The MD4 HashFunction, Timestamping.

Key Distribution and Key Agreement
Introduction, Key Predistribution , Blom's Scheme, Diffie-Hellman Key Predistribution, Kerberos,Diffie-Hellman Key Exchange, The Station-to-station Protocol, MTI Key Agreement Protocols, KeyAgreement Using Self-certifying Keys

Unit 3. 
Security Trends, The OSI Security Architecture Security Attacks, Security services, SecurityMechanisms, A Model for Network Security

Unit 4. 
Authentication Applications

Kerberos, X.509 Authentication Service, Public-Key Infrastructure, Recommended Reading and WebSites, Key Terms, Review Questions and Problems, A Kerberos Encryption Techniques, ElectronicMail Security, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, and Problems, A DataCompression Using Zip, Radix-64 Conversion, PGP Random Number Generation.

Unit 5. 
IP Security
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating SecurityPayload, Combining Security Associations, Key Management, Recommended Reading and Web Site,Key Terms, Review Questions, and Problems.

Web Security
Web Security Considerations, Secure Socket Layer and Transport Layer, Security, Secure ElectronicTransaction, Recommended Reading and Web Sites.

Unit 6. 
Intruders
Intrusion Detection, Password Management, Recommended Reading and Web Sites.

Malicious Software
Viruses and Related Threats, Virus Countermeasures, Distributed Denial of Service Attacks,Recommended Reading and Web Sites.

Firewalls
Firewall Design Principles, Trusted Systems, Common Criteria for Information Technology Security Evaluation, Recommended Reading and Web Sites.

Books


Cryptography: Theory and Practice, Douglas Stinson, CRC Press, CRC Press LLC (Unit I and II)

Cryptography and Network Security Principles and Practices, Fourth Edition, William
Stallings, PHI(Pearson), (Unit: III-VI)
 

Practical List:


1 Substitution Techniques :

a Write a program to perform substitution ciphers to encrypt the plain text to Caesar cipher and to decrypt it back to plain text.

b Write a program to perform substitution ciphers to encrypt the plain text to Modified Caesar cipher and to decrypt it back to plain text.

c Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text.


d Write a program to perform substitution ciphers to encrypt the plain text to monoalphabetic cipher and to decrypt it back to plain text.

e Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text.


f Write a program to perform substitution ciphers to encrypt the plain text topolyalphabetic cipher and to decrypt it back to plain text.

2 Transposition Ciphers
a Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using rail fence technique.

b Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Simple Columnar technique.

c Write a program to perform transposition ciphers to encrypt the plain text to cipher andto decrypt it back to plain text using Columnar with multiple rounds.

d Write a program to encrypt a plain text to a cipher text and decrypt it back to plain textusing vernam cipher as the transposition technique

3 Write a program to generate Symmetric Keys for the following Cipher algorithms DES, AES, Blowfish, TripleDES, HmacMD5 and HmacSHA1.

4 Write a program to generate assymmetric Keys for the following Cipher algorithms a)DSA (Digital Signature Algorithm), b) DH (DiffieHellman), c) RSA.

5 Write a program to encrypt input string by using SecretKey of the following algorithms, and then decrypt the encrypted string and compare the decrypted string with the input string. Use the following algorithms for encryption and decryption:a. DES
b. BlowFish
c. IDEA
d. Triple DES

6 Write a program to encrypt input string by using SecretKey of the following algorithms, and then decrypt the encrypted string and compare the decrypted string with the input string. Use the following algorithms for encryption and decryption:
a. RSA
b. AES
c. DSA

7 Implement following HashFunctions: RSHash, JSHash, BKDRHash, SDBMHash, DJBHash.

8 Write a program to encrypt the given string by using RC4 , MD5, algorithms.

9 Write a program for creating, exporting and validating Digital Certificate.

10 Create a permission that controls access to pages of a book. The permission nameconsists of a book id, a colon, and a set of allowable pages.


 

No comments:

Post a Comment