Computer Science & IT
Published on Computer Science & IT (https://www.csit.iisuniv.ac.in)

Home > Information Security (Theory)

Information Security (Theory) [1]

Paper Code: 
24SBCA401
Credits: 
02
Periods/week: 
02
Max. Marks: 
100.00
Objective: 
  1. Understand the fundamentals of Cryptography
  2. Understand how to deploy encryption techniques to secure data in transit across data
  3. Acquire knowledge on standard algorithms used to provide confidentiality, integrity and Authenticity

 

Course Outcomes: 

Course

Learning Outcome

 (at course         level)

Learning and teaching strategies

Assessment Strategies

Course

 Code

Course

Title

24SBCA

401

 

Information Security

(Theory)

 

CO259. Design effective information security measures for network protection.

CO260. Compare various cryptographic algorithms.

CO261. Interpret message authentication and hash functions.

CO262. Assess security at various layers.

CO263.Analyse intrusion detection problem.

CO264. Contribute effectively in course-  specific interaction.

Approach in teaching: Interactive Lectures, Discussion, Reading assignments, Demonstration.

 

Learning activities for the students: Self learning assignments, Effective questions, Seminar presentation.

Class test, Semester end examinations, Quiz, Assignments, Presentation.

 

 

6.00
Unit I: 

Information Security:

Introduction, History of Information security, what is Security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.

 

6.00
Unit II: 

Cryptography:

Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric Key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.

 

6.00
Unit III: 

Message Authentication and Hash Functions:

Authentication requirements and functions, MAC and Hash Funtions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos.

 

6.00
Unit IV: 

Security at layers (Network, Transport, Application):

IPSec, Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.

 

6.00
Unit V: 

Intruders, Virus and Firewalls:

Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls.

 

ESSENTIAL READINGS: 
  1. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, CENGAGE Learning, 4th Edition.
  2. William Stallings, “Cryptography and Network Security”, Pearson Education, 4th Edition.
  3. Forouzan and Mukhopadhyay, “Cryptography and Network Security”, McGraw Hill, 2nd Edition.

 

REFERENCES: 

Suggested READINGS: 

1. C K Shyamala, N Harini, Dr T R Padmanabhan, “Cryptography and Network Security”, Wiley India, 1st Edition.

2. Bernard Menezes, “Network Security and Cryptography” CENGAGE Learning

3. Atul Kahate, “Cryptography and Network Security”, McGraw Hill, 2nd Edition

4. WM. Arthur Conklin, “Principles of Computer Security”, Greg White, TMH

5. Neal Krawetz “Introduction to Network Security”, CENGAGE Learning

6. Yang Xiao, Frank H Li, Hui Chen, “Handbook of Security of Networks”, World Scientific, 2011.

e -RESOURCES:

  1. https://www.techtarget.com/searchsecurity/feature/Cryptography-basics-Symmetric-key-encryption-algorithms [2]
  2. https://freevideolectures.com/course/3027/cryptography-and-network-security [3]
  3. http://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptography_and_Network_Security.pdf [4]

JOURNALS:

1.Journal of Network Security, Springer

 

Academic Year: 
2024-25 [5]

Footer Menu

  • Home
  • Univ Home
  • Contact Us
  • About Us
  • Site Map
  • Downloads
  • Feedback
  • Jobs
  • Site Login

Follow Computer Science & IT on:

Facebook Twitter YouTube

IIS (Deemed to be University)

Gurukul Marg, SFS, Mansarovar, Jaipur 302020, (Raj.) India Phone:- +91-141-2400160-61, 2397906-07, Fax: 2395494, 2781158


Source URL: https://www.csit.iisuniv.ac.in/courses/subjects/information-security-theory

Links:
[1] https://www.csit.iisuniv.ac.in/courses/subjects/information-security-theory
[2] https://www.techtarget.com/searchsecurity/feature/Cryptography-basics-Symmetric-key-encryption-algorithms
[3] https://freevideolectures.com/course/3027/cryptography-and-network-security
[4] http://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptography_and_Network_Security.pdf
[5] https://www.csit.iisuniv.ac.in/academic-year/2024-25