Name of the Course: Information Security

 

  • Course Instructor:
  • Name: Dr. Sunanda Mulik

Office Number: 452

Phone: 9112702866

Email: sunanda.mulik@dypiu.ac.in

Office hours:  

Location: 4th Floor, Office no 452

 

  • Teaching Assistant:

Name:   --

Contact:

Office Hours: Time slots

Location

 

  • Level (who can take this course?):
  • Credit: 4-0-0-6
  • Evaluation: Theory + Practical
  • Breakup of evaluation: % wise

ESE (Theory)- 50 %

Practical-20

Mid Term-15%

Assignments-15%

 

  • Maximum Number of Students: 21

 

Course Objectives:

 

Students will be able to understand-

 

1. To provide the ability to examine and analyze real-life security cases.

2. To provide a thorough introduction to the different concepts of information security practices.

3. To impart knowledge of different mechanisms for encryption, digital signature, MAC, and hash functions.

4. To make students understand how to apply these principles for securing data over the internet.

 

Course

 

Prerequisites:

 

Nil

 

Course Syllabus:

 

Sr. No

Content

Date

1

To make students understand how to apply these principles for securing data over the internet.

 

2

Aspects of security: Attacks, services and mechanisms, Taxonomy

 

3

Generic types of attack

Network Security Model

 

4

Stream ciphers, Block ciphers.

Design considerations for stream ciphers, Cryptanalysis of stream ciphers

 

5

Conventional Cryptographic Techniques

 

6

Combined encryption and encoding.

 

7

Block Ciphers – DES and variant, modes of use of DES

 

8

Public key cryptography, characteristics

 

9

Applications, and schemes

 

10

RSA: Use, working, Key generation, and distribution

 

11

Key distribution in asymmetric encryption, Diffie Hellman Key Exchange

 

12

set up , examples

 

13

Introduction to Message Authentication & e-mail

 

14

MAC and its Usage

 

15

Hash function- MD-5, SHA-512, working of SHA I,

 

16

compression function, HMAC structure

 

17

Digital Signatures: Properties requirements, standards, verification process

 

18

Public Key distribution: Digital Certificates, Certificate Authority, X.509 Authentication service,

 

19

certificate format, certificate renewal, revocation, delta revocation

 

20

Email privacy, cryptographic algorithms and secrets, certificates

 

21

SMTP

 

22

PGP (Pretty Good Privacy), operations, authentication and confidentiality , and

services,

 

23

compression and segmentation service

 

24

MIME : headers , contents, techniques

 

25

Introduction to IPSec, Benefits, Types of modes,

 

26

AH protocol , ESP protocol, security Association and database.

 

27

Web security requirements

 

28

Network security approaches

 

29

Data Compression Technique

 

30

IP Security: Architecture, Authentication Leader, Encapsulating security Payload – Key Management

 

31

Web Security: SSL, TLS, SET

 

32

SSL-Change-cipher_spec Protocol, Alert

Protocol, Handshake Protocol

 

33

Phases and handshake procedure of TLS

 

34

SET – working, business requirement, duel signature

 

35

Firewalls Design principle, techniques, established systems, types, Packet filter router,

 

36

attacks and countermeasures, application level firewall, circuit level gateway,

 

 

 

 

Laboratory

 

Sr. No

Content

Date

1

Write a script to perform email analysis.

 

 

2

Generate hash value of a file using script.

 

 

3

Programmatically illustrate the symmetric substitution encryption technique.

 

 

4

Write a script to generate RSA key pair.

 

5

Network Analysis

 

 

 

  • Course Outcome:

On completion of the course the student should be able to:

 

Define the terms used in information security such as attacks, virus, firewall, encryption, digital signature etc.

 

Explain different types of encryption techniques.

 

            Apply their knowledge of securing e-mails, sending secured data over network.

 

List the alternative solutions for data and information security from different active and passive attacks.

 

  • Text Book:

W. Stallings, Network Security Essentials (Applications and Standards), 7th ed., Pearson Education.

 

  • Reference Book:

 

W. Stallings, Cryptography and network Security, 5rd ed., Pearson Education.

 

R. Bragg, M. Rhodes, Network Security: The complete reference, 3rd ed., TMH

Buchmann,

 

Introduction to Cryptography, Springer

 

  • Study Materials:

Uploaded from time to time