Monday, February 6, 2012

Lesson Plan 06EC832 Network security



Sl. No.

Date

Topics to be covered

  1.  
1-2-2012
UNIT- 1 Services, mechanisms and attacks
  1.  
3-2-2012
The OSI security architecture
  1.  
6-2-2012
A model for network security
  1.  
7-2-2012
UNIT- 2 Symmetric Cipher Model               
  1.  
10-2-2012
Substitution Techniques
  1.  
14-2-2012
Transposition Techniques
  1.  
15-2-2012
Simplified DES
  1.  
16-2-2012
Data encryption standard (DES)
  1.  
21-2-2012
The strength of DES
  1.  
22-2-2012
 Differential and Linear Cryptanalysis
  1.  
27-2-2012
Block Cipher Design Principles and Modes of Operation
  1.  
29-2-2012
Evaluation Criteria for Advanced Encryption Standard
  1.  
1-3-2012
The AES Cipher
  1.  
2-3-2012
UNIT- 3 Principles of Public-Key Cryptasystems

  1.  
6-3-2012
The RSA algorithm
  1.  
7-3-2012
Key Management
  1.  
8-3-2012
Diffie - Hellman Key Exchange
  1.  
13-3-2012
Elliptic Curve Arithmetic
  1.  
15-3-2012
Authentication functions
  1.  
19-3-2012
Hash Functions

  1.  
21-3-2012
Authentication Protocols
  1.  
22-3-2012
Authentication Protocols
  1.  
26-3-2012
Authentication Protocols
  1.  
27-3-2012
Digital Signature Standard
  1.  
28-3-2012
Digital Signature Standard
  1.  
29-3-2012
 UNIT- 5 Web Security Consideration
  1.  
30-3-2012
Web Security Consideration
  1.  
2-04-2012
 Web Security Consideration
  1.  
3-04-2012
Security socket layer (SSL) and Transport layer security
  1.  
5-04-2012
Secure Electronic Transaction
  1.  
9-04-2012
Secure Electronic Transaction
  1.  
10-04-2012
 UNIT- 6 Intruders
  1.  
11-04-2012
Intruders
  1.  
12-04-2012
Intruders
  1.  
13-04-2012
Intrusion Detection
  1.  
16-04-2012
 Password Management
  1.  
17-04-2012
Password Management
  1.  
18-04-2012
UNIT- 7  Malicious software
  1.  
23-04-2012
 Malicious software
  1.  
25-04-2012
Viruses and Related Threats
  1.  
26-04-2012
Viruses and Related Threats
  1.  
27-04-2012
Viruses and Related Threats
  1.  
30-04-2012
Virus Countermeasures
  1.  
02-05-2012
Virus Countermeasures
  1.  
03-05-2012
 UNIT- 8 Firewalls Design Principles
  1.  
04-05-2012
Firewalls Design Principles
  1.  
07-05-2012
Firewalls Design Principles
  1.  
07-05-2012
Firewalls Design Principles
  1.  
08-05-2012
Trusted Systems
  1.  
08-05-2012
Trusted Systems
  1.  
09-05-2012
The Concept of trusted system
  1.  
10-05-2012
Trojan horse defence

Text book:
1.       Cryptography and Network Security, William Stalling, Pearson Education, 2003.

Reference books:
1.      Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2.      Cryptography and Network Security, Atul Kahate, TMH, 2003.