Sl. No.
|
Date |
Topics to be
covered
|
|
1-2-2012
|
UNIT- 1 Services, mechanisms and attacks
|
|
3-2-2012
|
The OSI security
architecture
|
|
6-2-2012
|
A model for
network security
|
|
7-2-2012
|
UNIT- 2 Symmetric Cipher Model
|
|
10-2-2012
|
Substitution
Techniques
|
|
14-2-2012
|
Transposition
Techniques
|
|
15-2-2012
|
Simplified DES
|
|
16-2-2012
|
Data encryption
standard (DES)
|
|
21-2-2012
|
The strength of
DES
|
|
22-2-2012
|
Differential and Linear Cryptanalysis
|
|
27-2-2012
|
Block Cipher
Design Principles and Modes of Operation
|
|
29-2-2012
|
Evaluation
Criteria for Advanced Encryption Standard
|
|
1-3-2012
|
The AES Cipher
|
|
2-3-2012
|
UNIT- 3 Principles of Public-Key Cryptasystems
|
|
6-3-2012
|
The RSA
algorithm
|
|
7-3-2012
|
Key Management
|
|
8-3-2012
|
Diffie -
Hellman Key Exchange
|
|
13-3-2012
|
Elliptic Curve
Arithmetic
|
|
15-3-2012
|
Authentication
functions
|
|
19-3-2012
|
Hash Functions
|
|
21-3-2012
|
Authentication Protocols
|
|
22-3-2012
|
Authentication Protocols
|
|
26-3-2012
|
Authentication Protocols
|
|
27-3-2012
|
Digital
Signature Standard
|
|
28-3-2012
|
Digital
Signature Standard
|
|
29-3-2012
|
UNIT- 5 Web Security Consideration
|
|
30-3-2012
|
Web Security Consideration
|
|
2-04-2012
|
Web Security Consideration
|
|
3-04-2012
|
Security socket
layer (SSL) and Transport layer security
|
|
5-04-2012
|
Secure
Electronic Transaction
|
|
9-04-2012
|
Secure
Electronic Transaction
|
|
10-04-2012
|
UNIT- 6 Intruders
|
|
11-04-2012
|
Intruders
|
|
12-04-2012
|
Intruders
|
|
13-04-2012
|
Intrusion
Detection
|
|
16-04-2012
|
Password Management
|
|
17-04-2012
|
Password
Management
|
|
18-04-2012
|
UNIT- 7 Malicious software
|
|
23-04-2012
|
Malicious software
|
|
25-04-2012
|
Viruses and
Related Threats
|
|
26-04-2012
|
Viruses and
Related Threats
|
|
27-04-2012
|
Viruses and
Related Threats
|
|
30-04-2012
|
Virus
Countermeasures
|
|
02-05-2012
|
Virus
Countermeasures
|
|
03-05-2012
|
UNIT- 8 Firewalls Design Principles
|
|
04-05-2012
|
Firewalls Design Principles
|
|
07-05-2012
|
Firewalls
Design Principles
|
|
07-05-2012
|
Firewalls
Design Principles
|
|
08-05-2012
|
Trusted Systems
|
|
08-05-2012
|
Trusted Systems
|
|
09-05-2012
|
The Concept of
trusted system
|
|
10-05-2012
|
Trojan horse
defence
|
Text book:
1. Cryptography and Network Security, William Stalling, Pearson Education,
2003.
Reference books:
1.
Cryptography and Network Security, Behrouz A. Forouzan,
TMH, 2007.
2.
Cryptography and Network Security, Atul Kahate, TMH,
2003.