[go: up one dir, main page]

0% found this document useful (0 votes)
22 views4 pages

CSS - Autonomy Syllabus

The document outlines the course CSC602: Cryptography & System Security offered by Vivekanand Education Society’s Institute of Technology, detailing its objectives, outcomes, and modules. It covers topics such as ethical hacking, encryption techniques, authentication protocols, and network security, along with assessment methods including mid-term tests and continuous assessments. The course aims to equip students with knowledge and skills in cryptography and cybersecurity, preparing them for challenges in the field.

Uploaded by

vidya zope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

CSS - Autonomy Syllabus

The document outlines the course CSC602: Cryptography & System Security offered by Vivekanand Education Society’s Institute of Technology, detailing its objectives, outcomes, and modules. It covers topics such as ethical hacking, encryption techniques, authentication protocols, and network security, along with assessment methods including mid-term tests and continuous assessments. The course aims to equip students with knowledge and skills in cryptography and cybersecurity, preparing them for challenges in the field.

Uploaded by

vidya zope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Vivekanand Education Society’s Institute of Technology

Department of Computer Engineering


(Affiliated to University of Mumbai, Approved by AICTE & Recognized by Govt. of Maharashtra)

Course Code Course Title Credit

CSC602 Cryptography & System Security 3

Prerequisite: Computer Networks

Course Objectives

1 To introduce system security goals, ethical hacking and system security concepts.

To explore the classical encryption techniques, working principles and utilities of various
2 cryptographic algorithms including secret key cryptography, hashes and message digests, and
public key algorithms.

To explore the design issues and working principles of various authentication protocols, PKI
3
standards and various secure communication standards including Kerberos, IPsec, and SSL/TLS.

To develop the ability to use existing cryptographic utilities to build programs for secure
4
communication

5 To understand cyber crimes and cyber security.

Course Outcomes

Understand system security goals, ethical hacking and concepts, analyze and apply system
1
security concepts to recognize malicious code.

Understand classical encryption techniques, compare and apply different encryption and
2
decryption techniques to solve problems related to confidentiality and authentication

Understand and analyze the symmetric public-key cryptography, RSA and other public-key
3
cryptosystems ,the key distribution and management schemes

Apply different message digest and digital signature algorithms to verify integrity and achieve
4
authentication and design secure applications

Understand network security basics, analyze different attacks on networks and evaluate the
5
performance of firewalls and security protocols like SSL, IPSec, and PGP and S/MIME

6 Understand various cyber crimes and cyber security

Modul Content Hours

Introduction - Number Theory and Basic Cryptography

Security Goals, Attacks, Services and Mechanisms, Techniques. Concept of


1.1 Ethical Hacking and essential terminologies-Threat,Attack,Vulnerabilities,
1 Reconnaissance and Footprinting. 08

1.2 System Security: Buffer Overflow, malicious Programs: Worms and Viruses
Vivekanand Education Society’s Institute of Technology
Department of Computer Engineering
(Affiliated to University of Mumbai, Approved by AICTE & Recognized by Govt. of Maharashtra)

Modular Arithmetic: Euclidean Algorithm, Fermat‘s and Euler‘s theorem


Classical Encryption techniques, Symmetric cipher model, monoalphabetic and
1.3
polyalphabetic substitution techniques: Vigenere cipher, playfair cipher, Hill
cipher, transposition techniques: keyed and keyless transposition ciphers

Symmetric and Asymmetric key Cryptography and key Management

Block cipher principles, block cipher modes of operation, DES,


2.1
Double DES, Triple DES, Advanced Encryption Standard (AES), Introduction
2 08
to Stream Ciphers

2.2 Public key cryptography: Principles of public key cryptosystems- The RSA
Cryptosystem

Cryptographic Hash Functions & Key Distribution

Cryptographic Hash Functions: Properties of secure hash function, SHA-512,


3.1
MAC, HMAC 06
3
Symmetric Key Distribution: KDC, Needham-schroeder protocol.
3.2 Kerberos: Kerberos Authentication protocol, Symmetric key agreement:
Diffie Hellman, Public key Distribution: Digital Certificate: X.509

Authentication Protocols & Digital Signature Schemes

User Authentication, Entity Authentication: Password Base, Challenge 04


4.1
4 Response Based

Digital Signature, Attacks on Digital Signature, Digital Signature Scheme:


4.2
RSA.

Network Security and Applications

Network security basics: TCP/IP vulnerabilities (Layer wise), Network


5.1
Attacks: Packet Sniffing, ARP spoofing, port scanning, IP spoofing.
5 08
Denial of Service: DOS attacks, ICMP flood, SYN flood, UDP flood,
5.2
Distributed Denial of Service.

Internet Security Protocols: SSL, IPSEC, PGP.


5.3
Network security: IDS, Firewalls.

Cyber Crime And Cyber Security

6.1 CyberCrime and Information Security, Classifications of Cyber Crimes – Tools


6 and Methods –Password Cracking, Keyloggers, Spywares, SQL Injection – 05
Network Access Control.

6.2 Web Security: Electronic Payment SET.

Total 39
Vivekanand Education Society’s Institute of Technology
Department of Computer Engineering
(Affiliated to University of Mumbai, Approved by AICTE & Recognized by Govt. of Maharashtra)

Textbooks

William Stallings, “Cryptography and Network Security, Principles and Practice”, 6th Edition,
1
Pearson Education, March 2013

2 Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill

Behrouz A. Forouzan & Debdeep Mukhopadhyay, “Cryptography and Network Security” 3rd
3
Edition, McGraw Hill

Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer
4
Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence by
5
Nihad A. Hassan (Author), Rami Hijazi (Author)

Reference Books

Bruce Schneier, “Applied Cryptography, Protocols Algorithms and Source Code in C”, Second
1
Edition, Wiley.

2 Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill Education, 2003.

Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth Edition,
3
Prentice Hall, New Delhi, 2015.

4 Eric Cole, “Network Security Bible”, Second Edition, Wiley, 2011.

OSINT Techniques - Resources for Uncovering Online Information - 10th Edition (2023) by
5
Michael Bazzell

Useful Links

Resources

1 https://onlinecourses.nptel.ac.in/noc22_cs90/preview

2 https://onlinecourses.nptel.ac.in/noc22_cs03/preview

3 https://cse29-iiith.vlabs.ac.in/

4 https://threema.ch/press-files/2_documentation/cryptography_whitepaper.pdf

5 http://surl.li/uhndp

6 https://netleon.com/blog/cryptography-real-world-application/

Case Studies
Vivekanand Education Society’s Institute of Technology
Department of Computer Engineering
(Affiliated to University of Mumbai, Approved by AICTE & Recognized by Govt. of Maharashtra)

7 https://www.kroll.com/en/insights/publications/cyber/case-studies

AI Tools

8 https://www.maltego.com/

9 https://www.recordedfuture.com/threat-intelligence-101/tools-and-technologies/osint-tools

https://www.kali.org/tools/spiderfoot/
10

Internal Assessment
Assessment consists of one Mid Term Test of 20 marks and Continuous Assessment of 20 marks. The Mid
Term test is to be conducted when approximately 50% syllabus is completed and its duration will be one
hour.
Continuous Assessment
Continuous Assessment is of 20 marks. The rubrics for assessment will be considered on approval by the
subject teachers. It should be minimum 2 or maximum 4 from the following table.
Sr. No Rubrics Marks
1 Multiple Choice Questions (Quiz) 5
2 Literature review of papers/journals 5
Participation in event/ workshop/ talk / competition followed by small report and
3 5
certificate of participation relevant to the subject
4 Wins in the event/competition/hackathon pertaining to the course 10
Case study, Presentation, group discussion, technical debate on recent trends in the
5 10
said course
6 Project based Learning and evaluation / Extra assignment / Question paper solution 10
7 NPTEL/ Coursera/ Udemy/any MOOC Certificate course for 4 weeks or more 10
8 Content beyond syllabus presentation 10
9 Creating Proof of Concept 10
10 Mini Project / Extra Experiments/ Virtual Lab 10
11 GATE Based Assignment test/Tutorials etc 10
12 Peer Review and participation 5/10
*For sr.no.7, the date of certification exam should be within the term and in case a student is unable
complete the certification, the grading has to be done accordingly.

Indirect Assessment

1 Mock Viva/Practical

2 Skill Enhancement Lecture

You might also like