top of page

Course Name: Network Security

Course Codes: INSE630E, INSE840E, INSE240E, INSE840C, INSE240C

Session: January - May; Even Semester

Venue: Room No. 5206, CC-III

Classroom Slides / Resources:-

MTech & Dual Degree Assignments

  1. Group-01     Presentation     Report

  2. Group-02     Presentation     Report

  3. Group-03     Presentation     Report

  4. Group-04     Presentation     Report

  5. Group-05     Presentation     Report

  6. Group-06     Presentation     Report

  7. Group-07     Presentation     Report

  8. Group-08     Presentation     Report

  9. Group-09     Presentation     Report

  10. Group-10     Presentation     Report

  11. Group-11     Presentation     Report

  12. Group-12     Presentation     Report

Syllabus:-

Introduction: Security Goals, Attacks, Security Services and Mechanisms.

​

Fundamentals of Cryptography: Revision to NP Problems, One-Way Function, Symmetric Cryptography, Asymmetric Cryptography, Hash Function, MAC Function, Digital Signature, RSA, Discrete Log Problem, Elliptic Curve Cryptography, Block Cipher vs. Stream Cipher.

​

Entity Authentication: Password based Authentication, Challenge Response Protocols, Zero-Knowledge Protocols, Biometric Authentication.

​

Key Management: Symmetric Key Distribution, KERBEROS, Symmetric Key Agreement, Diffie-Hellman Key Establishment, Public Key Distribution.

​

Application Layer Security in Internet: E-mail Security, PGP, S/MIME, DKIM.

​

Transport Layer Security in Internet: SSL Architecture and Protocols, SSL Message Formats, S-TLS Protocol.

​

Network Layer Security in Internet: IPSec. Protocol – two modes of operation, AH & ESP Protocol, Security Association and Security Policy Management in IPSec., IKE Protocol, ISAKMP Protocol.

​

WLAN (IEEE 802.11) Security: IEEE802.11 WLAN Overview, WLAN Threats, IEEE 802.11i WLAN Security Protocol - WEP, WPA, RSN.

​

Advanced Wireless Networks and Their Security Issues: Security in MANET, VANET, WSN etc.

​

Formal Verification of Security Protocols: Introduction to formal verification of security protocol, BAN Logic Analysis.

Book References:-

  1. B. A. Forouzan and D. Mukhopadhyay, Cryptography & Network Security, McGraw Hill, Special Indian Edition. Click Here for E-Book

  2. W. Stallings, Cryptography and Network Security, Pearson Education. Click Here for E-Book

  3. N. Krawety, Introduction to Network Security, Thompson, Special India Ed.

Grading Policy:-

  • 20%: Mid-semester examination

  • 30%: End-semester examination

  • 20%: Quiz-I (Closed Book Test - MCQ Questions)

  • 20%: Quiz-II for B.Tech. (Closed Book Test - MCQ Questions) & Homework Assignments for M. Tech. (Paper Study Work)

  • 10%: Attendance

bottom of page