sszg513
TRANSCRIPT
-
8/3/2019 sszg513
1/3
Birla Institute of Technology & Science, Pilani
Work-Integrated Learning Programmes Division
First Semester 2011-2012
Course Handout
Course No. : SS ZG513
Course Title : Network Security
Instructor : Murali P, K Haribabu
Course Description
The primary goal of the course is to introduce the student to system and application design aspects of
network security including cryptographic, systemic and computational security aspects of the network /
internetwork systems.
Scope and Objectives
The course covers fundamental aspects of security in a modern networked environment with the focus on
system design aspects and cryptography in the specific context of network / internetwork security. It alsodwells into basics of cryptographic techniques, algorithms and protocols required to achieve these properties;
computational issues in implementing cryptographic protocols and algorithms; and system/application design
issues in building secure networked systems.
Prescribed Text Book
T1. Stallings William, Cryptography and Network Security, Pearson Education, 4th Edition, 2006Reference Books
R1. Harrington, Jan L., Network Security: A Practical Approach, Morgan Kaufmann (Elsevier), 2005.R2. Bruce Schneier, Applied Cryptography, Wiley Student Edition, 2nd Edition, 1996R3. Alfred Menezes, Paul van Oorschot, and Scott Vanstone: Handbook of Applied Cryptography. CRC
Press, NY.
R4. C.Kauffman, R. Perlman and M.Spenser, Network Security, 2nd Edition, Prentice Hall, 2002.R5. S.Bellovin and W.Chesvick: Internet Security and Firewalls, 2nd Ed., Addison-Wesley, 1998.
-
8/3/2019 sszg513
2/3
SS ZG513 (Course Handout) First Semester 2011-2012 Page 2
Plan of Self Study
Week
No.
Learning Objective Topic(s) Chapter Reference
1 Introduction & Foundation T1-Ch.1
2
To learn the basic terminologies
used Attacks - Services Mechanisms-
Model of Network security.-OSIarichitecture
T1-Ch.1
3 To learn how cryptographic
algorithms were written in the
initial days
Conventional Encryption - Classical
and Modern Technique
T1-Ch.2
4 To learn the basics of Block
Ciphers in general:
Block Ciphers And The Data
Encryption Standard
T1-Ch.3
6 -An example modern block
cipher
Advanced Encryption Standard. T1-Ch.5
7 - Some of the additionaltechniques used in the
development of symmetric
ciphers
Contemporary Symmetric Ciphers &Confidentiality Using Symmetric
Encryption
T1-Ch.6 & Ch.7
5 To learn some of the basic
mathematical back ground
essential for understanding
cryptographic techniques
Cryptography Theory and Related
Mathematics
T1-Ch.4
8 To learn the basics of Public Key
cryptography
RSA - Elliptic Curve Cryptography -
Number Theory Concepts-
T1-Ch.8 & Ch.9
Syllabus for Mid-Semester Test (Closed Book): Topics in Week No. 1 to 8
9 To learn the basics of keymanagement
Key Management: Other Public KeyCryptosystems
T1-Ch.10
10 To learn about secure hashing
and its applications
Message Authentication And Hash
Functions-Hash Algorithms.
T1-Ch.11 & Ch.12
11 To learn about non-repudiationtechniques available
Digital Signatures And AuthenticationProtocols
T1-Ch.13
12 To learn some of the current
techniques used for
authentication
Authentication Applications
Kerberos-X.509 Authentication
Service-
T1-Ch.14
13 To learn basics of secured email
communication
Electronic Mail Security T1-Ch.15
14 To understand the various
security risks and some of the
techniques used in the IP Layer
Ip Security T1-Ch.16
15 To understand the various
security risks and some of the
techniques used while using web-based services
Web Security T1-Ch.17
16 To understand the various
techniques used in DMZ and
effectively understand how to
protect a network deployment
System Security: Intrusion Detection
Systems-Firewalls
T1-Ch.18, Ch.19 &
Ch.20
Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study
-
8/3/2019 sszg513
3/3
SS ZG513 (Course Handout) First Semester 2011-2012 Page 3
Evaluation Scheme:
EC No. Evaluation Component &
Type of Examination
Duration Weightage Day, Date, Session,Time
EC-1 Assignment/Quiz TBA 10% TBA
EC-2 Mid-Semester Test
(Closed Book)*
2 Hours 30% Saturday, 03/09/2011 (FN)*
10 AM 12 NoonEC-3 Comprehensive Exam
(Open Book)*
3 Hours 60% Saturday, 29/10/2011 (FN)*
9 AM 12 Noon
* Legend:
AN: AfterNoon Session; FN: ForeNoon Session; TBA : To be announced
Closed Book Test: No reference material of any kind will be permitted inside the exam hall.
Open Book Exam: Use of any printed / written reference material (books and notebooks) will be permitted inside the
exam hall. Loose sheets of paper will not be permitted. Computers of any kind will not be allowed inside the exam hall.
Use of calculators will be allowed in all exams. No exchange of any material will be allowed.
Note:It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the
course handout, attend the online/on demand lectures as per details that would be put up in the BITS WILP website
www.bits-pilani.ac.in/dlp-home and take all the prescribed components of the evaluation such as Mid Semester Test
and Comprehensive Examination according to the Evaluation Scheme given in the respective Course Handout. If the
student is unable to appear for the Regular Test/Examination due to genuine exigencies, the student must refer to the
procedure for applying for Make-up Test/Examination, which will be available through the Important Information
link on the BITS WILP website on the date of the Regular Test/Examination. The Make-up Tests/Exams will be
conducted only at selected exam centres on the dates to be announced later.
Instructor-in-Charge