Course Name: Network Security

Course Codes: INSE630E, INSE840E, INSE240E, INSE840C, INSE240C

Session: January - May; Even Semester

Venue: Room No. 5206, CC-III

Classroom Slides / Resources:-

MTech & Dual Degree Assignments

  1. Group-01     Presentation     Report

  2. Group-02     Presentation     Report

  3. Group-03     Presentation     Report

  4. Group-04     Presentation     Report

  5. Group-05     Presentation     Report

  6. Group-06     Presentation     Report

  7. Group-07     Presentation     Report

  8. Group-08     Presentation     Report

  9. Group-09     Presentation     Report

  10. Group-10     Presentation     Report

  11. Group-11     Presentation     Report

  12. Group-12     Presentation     Report


Introduction: Security Goals, Attacks, Security Services and Mechanisms.

Fundamentals of Cryptography: Revision to NP Problems, One-Way Function, Symmetric Cryptography, Asymmetric Cryptography, Hash Function, MAC Function, Digital Signature, RSA, Discrete Log Problem, Elliptic Curve Cryptography, Block Cipher vs. Stream Cipher.

Entity Authentication: Password based Authentication, Challenge Response Protocols, Zero-Knowledge Protocols, Biometric Authentication.

Key Management: Symmetric Key Distribution, KERBEROS, Symmetric Key Agreement, Diffie-Hellman Key Establishment, Public Key Distribution.

Application Layer Security in Internet: E-mail Security, PGP, S/MIME, DKIM.

Transport Layer Security in Internet: SSL Architecture and Protocols, SSL Message Formats, S-TLS Protocol.

Network Layer Security in Internet: IPSec. Protocol – two modes of operation, AH & ESP Protocol, Security Association and Security Policy Management in IPSec., IKE Protocol, ISAKMP Protocol.

WLAN (IEEE 802.11) Security: IEEE802.11 WLAN Overview, WLAN Threats, IEEE 802.11i WLAN Security Protocol - WEP, WPA, RSN.

Advanced Wireless Networks and Their Security Issues: Security in MANET, VANET, WSN etc.

Formal Verification of Security Protocols: Introduction to formal verification of security protocol, BAN Logic Analysis.

Book References:-

  1. B. A. Forouzan and D. Mukhopadhyay, Cryptography & Network Security, McGraw Hill, Special Indian Edition. Click Here for E-Book

  2. W. Stallings, Cryptography and Network Security, Pearson Education. Click Here for E-Book

  3. N. Krawety, Introduction to Network Security, Thompson, Special India Ed.

Grading Policy:-

  • 20%: Mid-semester examination

  • 30%: End-semester examination

  • 20%: Quiz-I (Closed Book Test - MCQ Questions)

  • 20%: Quiz-II for B.Tech. (Closed Book Test - MCQ Questions) & Homework Assignments for M. Tech. (Paper Study Work)

  • 10%: Attendance

Indian Institute of Information Technology, Allahabad, india

All Rights Reserved © 2017 by Soumyadev Maity.

This site was designed with the
website builder. Create your website today.
Start Now