Diploma Website   Student Corner   Pay Fees   NIRF

Information Security (2710211)

Teaching Scheme (in Hours)

Theory Tutorial Practical Total
3 2 2 5

Subject Credit :  5

Examination Scheme (in marks)

Theory
ESE (E)
Theory
PA (M)
Practical
ESE Viva (V)
Practical
PA (I)
Total
0

Syllabus Content    Download

Unit-1:  Unit-1

Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and Transposition techniques.

Unit-2:  Unit-2

Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation.

Unit-3:  Unit-3

Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter mode.

Unit-4:  Unit-4

Public Key Cryptosystems with Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack.

Unit-5:  Unit-5

Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA).

Unit-6:  Unit-6

Message Authentication Codes, its requirements and security, MACs based on Hash Functions, Macs based on Block Ciphers.

Unit-7:  Unit-7

Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm.

Unit-8:  Unit-8

Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure.

Unit-9:  Unit-9

Remote user authentication with symmetric and asymmetric encryption, Kerberos.

Unit-10:  Unit-10

Software Flaws and Malware : Introduction, Software Flaws, Buffer overflow, Incomplete Mediation, Race Conditions Malware, Brain, Morris Worm, Code red, SQL Slammer, Trojan Example, Malware Detection, The Future of Malware, Cyber Disease versus Biological diseases, Miscellaneous software-based Attacks, Salami Attacks, Linearization, Time bombs, Trusting Software Insecurity in software: Software Reverse Engineering, Anti-disassembly Techniques, Anti-Debugging Techniques Software Tamper Resistance: Guards, Obfuscation, Metamorphism Revisited.

Reference Books

Sr. Title Author Publication Amazon Link
1 Cryptography And Network Security: Principles And Practice William Stallings Pearson
2 Information Security Principles and Practice Mark Stamp Wiley India
3 Cryptography & Network Security Forouzan, Mukhopadhyay McGraw Hill
4 Cryptography and Network Security Atul Kahate McGrawHill
5 Cryptography and Security C K Shyamala, N Harini, T R Padmanabhan Wiley-India
6 Information Systems Security: Security Management, Metrics, Frameworks And Best Practices Godbole Wiley-India
7 Information Security Principles and Practice Deven Shah Wiley-India
8 Security in Computing Pfleeger and Pfleeger Pearson
9 Build Your Own Security Lab : A Field Guide for network testing Michael Gregg Wiley-India

Course Outcome

After learning the course the students should be able to:

  • Define the concepts of Information security and their use.
  • Describe the principles of symmetric and asymmetric cryptography.
  • Understand and apply the various symmetric key algorithms.
  • Understand and apply the various asymmetric key algorithms.
  • Understand the concepts of hashing with algorithms and apply them.
  • Understand and use the message authentication and its requirement.
  • Understand the concepts of digital signature and digital certificates.
  • List and explain various digital signature algorithms.
  • Understand and use the various key management and remote authentication mechanisms.
  • Understand the concept of malware technology and its impacts.

About Us

Darshan Institute of Engineering & Technology is a leading institute offering undergraduate (B.E.), postgraduate (M.E.) and Diploma programs in engineering.

Our Contacts

At Hadala, Rajkot - Morbi Highway,
Gujarat-363650, INDIA

(+91) 97277 47310
(+91) 97277 47311

More contact details