- Teacher: Dr Sarika Jadhav
- Teacher: Mrs. Veena Kiragi
Name of the Course: Information Security
- Course Instructor:
- Name: Dr. Sunanda Mulik
Office Number: 452
Phone: 9112702866
Email: sunanda.mulik@dypiu.ac.in
Office hours:
Location: 4th Floor, Office no 452
- Teaching Assistant:
Name: --
Contact:
Office Hours: Time slots
Location
- Level (who can take this course?):
- Credit: 4-0-0-6
- Evaluation: Theory + Practical
- Breakup of evaluation: % wise
ESE (Theory)- 50 %
Practical-20
Mid Term-15%
Assignments-15%
- Maximum Number of Students: 21
Course Objectives:
Students will be able to understand-
1. To provide the ability to examine and analyze real-life security cases.
2. To provide a thorough introduction to the different concepts of information security practices.
3. To impart knowledge of different mechanisms for encryption, digital signature, MAC, and hash functions.
4. To make students understand how to apply these principles for securing data over the internet.
Course
Prerequisites:
Nil
Course Syllabus:
Sr. No |
Content |
Date |
1 |
To make students understand how to apply these principles for securing data over the internet. |
|
2 |
Aspects of security: Attacks, services and mechanisms, Taxonomy |
|
3 |
Generic types of attack Network Security Model |
|
4 |
Stream ciphers, Block ciphers. Design considerations for stream ciphers, Cryptanalysis of stream ciphers |
|
5 |
Conventional Cryptographic Techniques |
|
6 |
Combined encryption and encoding. |
|
7 |
Block Ciphers – DES and variant, modes of use of DES |
|
8 |
Public key cryptography, characteristics |
|
9 |
Applications, and schemes |
|
10 |
RSA: Use, working, Key generation, and distribution |
|
11 |
Key distribution in asymmetric encryption, Diffie Hellman Key Exchange |
|
12 |
set up , examples |
|
13 |
Introduction to Message Authentication & e-mail |
|
14 |
MAC and its Usage |
|
15 |
Hash function- MD-5, SHA-512, working of SHA I, |
|
16 |
compression function, HMAC structure |
|
17 |
Digital Signatures: Properties requirements, standards, verification process |
|
18 |
Public Key distribution: Digital Certificates, Certificate Authority, X.509 Authentication service, |
|
19 |
certificate format, certificate renewal, revocation, delta revocation |
|
20 |
Email privacy, cryptographic algorithms and secrets, certificates |
|
21 |
SMTP |
|
22 |
PGP (Pretty Good Privacy), operations, authentication and confidentiality , and services, |
|
23 |
compression and segmentation service |
|
24 |
MIME : headers , contents, techniques |
|
25 |
Introduction to IPSec, Benefits, Types of modes, |
|
26 |
AH protocol , ESP protocol, security Association and database. |
|
27 |
Web security requirements |
|
28 |
Network security approaches |
|
29 |
Data Compression Technique |
|
30 |
IP Security: Architecture, Authentication Leader, Encapsulating security Payload – Key Management |
|
31 |
Web Security: SSL, TLS, SET |
|
32 |
SSL-Change-cipher_spec Protocol, Alert Protocol, Handshake Protocol |
|
33 |
Phases and handshake procedure of TLS |
|
34 |
SET – working, business requirement, duel signature |
|
35 |
Firewalls Design principle, techniques, established systems, types, Packet filter router, |
|
36 |
attacks and countermeasures, application level firewall, circuit level gateway, |
|
Laboratory
Sr. No |
Content |
Date |
1 |
Write a script to perform email analysis.
|
|
2 |
Generate hash value of a file using script.
|
|
3 |
Programmatically illustrate the symmetric substitution encryption technique.
|
|
4 |
Write a script to generate RSA key pair. |
|
5 |
Network Analysis |
|
- Course Outcome:
On completion of the course the student should be able to:
Define the terms used in information security such as attacks, virus, firewall, encryption, digital signature etc.
Explain different types of encryption techniques.
Apply their knowledge of securing e-mails, sending secured data over network.
List the alternative solutions for data and information security from different active and passive attacks.
- Text Book:
W. Stallings, Network Security Essentials (Applications and Standards), 7th ed., Pearson Education.
- Reference Book:
W. Stallings, Cryptography and network Security, 5rd ed., Pearson Education.
R. Bragg, M. Rhodes, Network Security: The complete reference, 3rd ed., TMH
Buchmann,
Introduction to Cryptography, Springer
- Study Materials:
Uploaded from time to time
- Teacher: Anupurba Das
- Teacher: Dr Sunanda R Mulik
- Teacher: Dr. Rahul Sharma
- Teacher: Dr. Maheshwari Biradar
- Teacher: Dr. Samarjit Roy