About Me

header ads

INFORMATION AND NETWORK SECURITY (BIS703)

INFORMATION AND NETWORK SECURITY

Course Code BIS703 
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 4:0:0:0 
SEE Marks 50
Total Hours of Pedagogy 50 
Total Marks 100
Credits 04 
Exam Hours 3
Examination type (SEE) Theory




Module-1

Introduction. How to Speak Crypto. Classic Crypto. Simple Substitution Cipher.

Cryptanalysis of a Simple Substitution. Definition of Secure. Double Transposition Cipher.

One-time Pad. Project VENONA. Codebook Cipher. Ciphers of the Election of 1876.

Modern Crypto History. Taxonomy of Cryptography. Taxonomy of Cryptanalysis.

Textbook:1-Chapter 2




Module-2 

What is a Hash Function? The Birthday Problem. Non-cryptographic Hashes. Tiger Hash.

HMAC. Uses of Hash Functions. Online Bids. Spam Reduction. Other Crypto-Related

Topics. Secret Sharing. Key Escrow. Random Numbers. Texas Hold 'em Poker. Generating

Random Bits. Information Hiding.

Textbook:1-Chapter 5




Module-3 

Random number generation, Providing Freshness, Fundamentals of entity authentication,

Passwords, Dynamic password schemes, Zero-knowledge mechanisms, further reading.

Cryptographic Protocols: Protocol Basics, From objectives to a protocol, Analysing a

simple protocol, Authentication and key establishment protocols.

Textbook:2-Chapter 8, Chapter 9




Module-4

Key management fundamentals, Key lengths and lifetimes, Key generation, Key

establishment, Key storage, Key usage, Governing key management.

Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key

management models, Alternative approaches.

Textbook:2-Chapter 10, Chapter 11




Module-5 

Cryptographic Applications: Cryptography for securing the Internet, Cryptography for

wireless local area networks, Cryptography for mobile telecommunications, Cryptography

for secure payment card transactions, Cryptography for video broadcasting, Cryptography

for identity cards.

Textbook:2-Chapter 12 (12.1 to 12.6).




Suggested Learning Resources:

Textbook

1. Information Security: Principles and Practice, 2nd Edition by Mark Stamp, Wiley

2. Everyday Cryptography: Fundamental Principles and Applications Keith M. Martin

Oxford Scholarship Online: December 2013.



Reference Books:

1. Applied Cryptography Protocols, Algorithms, and Source Code in C by Bruce

Schneier.


Post a Comment

0 Comments