NE7202 NETWORK AND INFORMATION SECURITY Syllabus - Anna University ME CSE 2nd Semester Regulation 2013 NE7202 Syllabus

NE7202 NETWORK AND INFORMATION SECURITY

OBJECTIVES:

 To understand the fundamentals of Cryptography
 To acquire knowledge on standard algorithms used to provide confidentiality, integrity and authenticity.
 To understand the various key distribution and management schemes.
 To understand how to deploy encryption techniques to secure data in transit acros data networks
 To design security applications in the field of Information technology

UNIT I INTRODUCTION

An Overview of Computer Security-Security Services-Security Mechanisms-Security Attacks-Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.

UNIT II CRYPTOSYSTEMS & AUTHENTICATION

Classical Cryptography-Substitution Ciphers-permutation Ciphers-Block Ciphers-DESModes of Operation- AES-Linear Cryptanalysis, Differential Cryptanalysis- Hash Function - SHA 512- Message Authentication Codes-HMAC - Authentication Protocols -

UNIT III PUBLIC KEY CRYPTOSYSTEMS

Introduction to Public key Cryptography- Number theory- The RSA Cryptosystem and Factoring Integer- Attacks on RSA-The ELGamal Cryptosystem- Digital Signature Algorithm-Finite Fields-Elliptic Curves Cryptography- Key management – Session and Interchange keys, Key exchange and generation-PKI

UNIT IV SYSTEM IMPLEMENTATION

Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem Secure Software Development: Secured Coding - OWASP/SANS Top Vulnerabilities -
Buffer Overflows - Incomplete mediation - XSS - Anti Cross Site Scripting Libraries - Canonical Data Format - Command Injection - Redirection - Inference – Application Controls

UNIT V NETWORK SECURITY

Secret Sharing Schemes-Kerberos- Pretty Good Privacy (PGP)-Secure Socket Layer (SSL)- Intruders – HIDS- NIDS - Firewalls - Viruses

OUTCOMES:

Upon Completion of the course, the students will be able to
 Implement basic security algorithms required by any computing system.
 Analyze the vulnerabilities in any computing system and hence be able to design a security solution.
 Analyze the possible security attacks in complex real time systems and their effective countermeasures
 Identify the security issues in the network and resolve it.
 Evaluate security mechanisms using rigorous approaches, including theoretical derivation, modeling, and simulations
 Formulate research problems in the computer security field

REFERENCES:

1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third Edition, Pearson Education, 2006.
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education, 2002
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding Theory” Second Edition, Pearson Education, 2007
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press, 2007
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman & Hall/CRC, 2006
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First Edition, 2006.
7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi, 2011
8. Man Young Rhee, Internet Security, Wiley, 2003
9. OWASP top ten security vulnerabilities: http://xml.coverpages.org/OWASPTopTen.pdf