INFORMATION AND NETWORK SECURITY
Course Code BIS703
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 4:0:0:0
SEE Marks 50
Total Hours of Pedagogy 50
Total Marks 100
Credits 04
Exam Hours 3
Examination type (SEE) Theory
Module-1
Introduction. How to Speak Crypto. Classic Crypto. Simple Substitution Cipher.
Cryptanalysis of a Simple Substitution. Definition of Secure. Double Transposition Cipher.
One-time Pad. Project VENONA. Codebook Cipher. Ciphers of the Election of 1876.
Modern Crypto History. Taxonomy of Cryptography. Taxonomy of Cryptanalysis.
Textbook:1-Chapter 2
Module-2
What is a Hash Function? The Birthday Problem. Non-cryptographic Hashes. Tiger Hash.
HMAC. Uses of Hash Functions. Online Bids. Spam Reduction. Other Crypto-Related
Topics. Secret Sharing. Key Escrow. Random Numbers. Texas Hold 'em Poker. Generating
Random Bits. Information Hiding.
Textbook:1-Chapter 5
Module-3
Random number generation, Providing Freshness, Fundamentals of entity authentication,
Passwords, Dynamic password schemes, Zero-knowledge mechanisms, further reading.
Cryptographic Protocols: Protocol Basics, From objectives to a protocol, Analysing a
simple protocol, Authentication and key establishment protocols.
Textbook:2-Chapter 8, Chapter 9
Module-4
Key management fundamentals, Key lengths and lifetimes, Key generation, Key
establishment, Key storage, Key usage, Governing key management.
Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key
management models, Alternative approaches.
Textbook:2-Chapter 10, Chapter 11
Module-5
Cryptographic Applications: Cryptography for securing the Internet, Cryptography for
wireless local area networks, Cryptography for mobile telecommunications, Cryptography
for secure payment card transactions, Cryptography for video broadcasting, Cryptography
for identity cards.
Textbook:2-Chapter 12 (12.1 to 12.6).
Suggested Learning Resources:
Textbook
1. Information Security: Principles and Practice, 2nd Edition by Mark Stamp, Wiley
2. Everyday Cryptography: Fundamental Principles and Applications Keith M. Martin
Oxford Scholarship Online: December 2013.
Reference Books:
1. Applied Cryptography Protocols, Algorithms, and Source Code in C by Bruce
Schneier.

.png)
0 Comments