Department of Computer Science & Engineering

M.Tech. I (CO) Semester - 1

L

T

P

C

CO605: INTRODUCTION TO COMPUTER SECURITY   

3

0

2

4

COURSE OBJECTIVES
  • Introduce students to the concepts, technologies, practices and challenges associated with Information Security and Privacy.
  • Introduce the principles and practice of cryptography and network security.
  • Examine schemes in different standards, and evaluate their use in different situations.
  • COURSE OUTCOMES
    After successful completion of this course, student will be able to
    • Understand the concepts related to the basics of cryptography and computer security.
    • Deduce the mechanisms to be employed while trying to satisfy any of the security services
    • Apply the concept of security services and mechanisms from the application developers and network administrator’s perspective
    COURSE CONTENT
    INTRODUCTION

    (04 Hours)

    Security Attacks, attacks on Data/Software, Hardware, Network.

    CLASSICAL ENCRYPTION TECHNIQUES

    (06 Hours)

    Caesar Cipher, Monoalphabetic Ciphers, Polyalphabetic Ciphers, Transposition techniques.

    SYMMETRIC KEY CRYPTOGRAPHY

    (06 Hours)

    PUBLIC KEY CRYPTOGRAPHY (INTRODUCTION)

    (04 Hours)

    RSA and DH Key Exchange.

    CRYPTOGRAPHIC HASH FUNCTIONS

    (04 Hours)

    DIGITAL SIGNATURES

    (03 Hours)

    AUTHENTICATION PROTOCOLS and BIOMETRICS

    (05 Hours)

    NETWORK SECURITY

    (06 Hours)

    Firewall Design Principles, IP Security - Security Policy, SSL., Intrusion Detection Systems.

    INTRODUCTION TO E -COMMERCE

    (06 Hours)

    Electronic Voting / Polling systems -Standards and Applications.

    (Total Contact Time: 42 Hours)

    PRACTICALS
    1. Implement classical ciphers.
    2. Cryptanalysis tool for classical ciphers.
    3. Symmetric key ciphers.
    4. Hash functions.
    5. Crypto tools - J-API/C-API.
    BOOKS RECOMMENDED
    1. Thomas H. Cormen, Charles E. Leiserson, Ron ald L. Rivest, and Cliff Stein," Introduction to Algorithms", 2/E, MIT Press and MGH, 2001.
    2. Bruce Scheneir: "Applied Cryptography", 2/E, John Wiley, 1996.
    3. Behrouz Forouzan: "Cryptography & Network Security", 1/E, TMH, 2007.
    4. Menezes, Oorschot, Vanstone: "Handbook of Applied Cryptography", CRC Press, 1996.
    5. D Stinson, "Cryptography: Theory and Practice", 2/E, Chapman & Hall, 2002.