Department of Computer Science and Engineering

B.Tech. III (CO) Semester - 5

L

T

P

C

CO319 : INFORMATION SECURITY (EIS - I)

3

0

0

3

COURSE OBJECTIVES
  • Introduce students to the concepts, technologies, practices and challenges associated with Information Security and Privacy.
  • Introduce the principles and practice of cryptography and network security.
  • Examine schemes in different standards, and evaluate their use in different situations.
  • COURSE OUTCOMES
    After successful completion of this course, student will be able to
    • Understand the concepts related to the basics of cryptography and computer security.
    • Deduce the mechanisms to be employed while trying to satisfy any of the security services
    • Apply the concept of security services and mechanisms from the application developers and network administrator’s perspective.
    COURSE CONTENT
    INTRODUCTION

    (02 Hours)

    Information Security - Objectives, Services, Attacks

    CLASSICAL ENCRYPTION TECHNIQUES

    (08 Hours)

    Substitution Ciphers, Permutation/Transposition Ciphers, PlayFair and Hill Ciphers, Polyalphabetic Ciphers, OTP and Machine ciphers

    STEGANOGRAPHY

    (02 Hours)

    MODERN ENCRYPTION TECHNIQUES

    SKC and PKC, SP network

    (02 Hours)

    DES, AES

    (04 Hours)

    Cipher modes of operations

    (02 Hours)

    PUBLIC KEY CRYPTOGRAPHY

    Public Key characteristics, PKC Applications, Public Key requirements

    (02 Hours)

    RSA

    (02 Hours)

    CRYPTOGRAPHIC HASH FUNCTIONS

    (04 Hours)

    SIDE CHANNEL ATTACKS

    (02 Hours)

    AUTHENTICATION AND IDENTITY MANAGEMENT, CAPTCHA

    (04 Hours)

    BIOMETRICS AND APPLICATION CASE STUDIES

    (05 Hours)

    ADVANCED TOPICS

    (03 Hours)

    (Total Contact Time: 42 Hours)
    BOOKS RECOMMENDED
    1. Dhiren Patel, Information Security: Theory and Practice, PHI, 2008/2010.
    2. William Stallings, "Cryptography and Network Security Principles and Practice", 6/E, Pearson Education, 2013.
    3. Menezes Bernard, "Network Security and Cryptography", Cengage Learning India, 2010.
    4. Menezes, Oorschot, Vanstone : "Handbook of Applied Cryptography", CRC Press,1996.
    5. Douglas Stinson, "Cryptography: Theory and Practice", 2/E,Chapman& Hall ,2002.