National Institute of Technology Rourkela

राष्ट्रीय प्रौद्योगिकी संस्थान राउरकेला

ଜାତୀୟ ପ୍ରଯୁକ୍ତି ପ୍ରତିଷ୍ଠାନ ରାଉରକେଲା

An Institute of National Importance

Syllabus

Course Details

Subject {L-T-P / C} : CS6304 : Network Security { 3-0-0 / 3}

Subject Nature : Theory

Coordinator : Prof. Ramesh Kumar Mohapatra

Syllabus

Inter-networking Concepts:
Internet architecture, and current networking technologies. Layering and packet formats for all the Internet protocols, including TCP, IP, Routing, DHCP, and DNS.
New trends in Internet systems, Internet of Things.

Message Integrity and Message Authentication:
Message integrity, Random oracle Model, message authentication. Cryptographic Hash Functions: iterated hash functions, description of MD hash family, Whirlpool, SHA-512. Digital signature: comparison, process, services, attacks on digital signatures.

Entity Authentication:
Key Management, Symmetric Key distribution, Symmetric-Key agreement, Public-key distribution, Kerberos, Password based Authentication, Challenge response protocols, Zero knowledge protocols, Biometrics. .

Security at various network layers
E-mail System, Email Security: Pretty good privacy (PGP), Secure/Multipurpose Internet Mail extension (S/MIME).
Security services at transport layer, SSL architecture, SSL Message formats.
Security at the network layer, IP Security (IPSec), Modes of IPSec, Security protocols, Security association, Security Policy, Internet Key Exchange (IKE).

Course Objectives

  • To learn network security issues, and understand their existing solutions using cryptography protocols.
  • To learn inter-networking techniques, that is techniques and processes for connecting different networks, and the related security issues.

Course Outcomes

On successful completion of this course, the students will be able to: <br />1. Identify network and inter-networking security threats, classify the threats and develop a security model to prevent, detect and recover from the attacks. <br />2. Encrypt and decrypt messages using block ciphers, sign and verify messages using well known signature generation and verification algorithms. <br />3. Analyze existing authentication and key agreement protocols, identify the weaknesses of these protocols.

Essential Reading

  • Behrouz A. Forouzan and D. Mukhopadhyay, Cryptography & Network Security, McGraw Hill, New Delhi.
  • Douglas E. Comer, Internetworking with TCP/IP, Pearson

Supplementary Reading

  • William Stallings, Network Security Essentials Applications and Standards, Pearson Education
  • Eric Malwald, Fundamentals of Network Security, CRC Press