Você está na página 1de 7

SCMS SCHOOL OF TECHNOLOGY AND MANAGEMENT

SCMS Campus, Prathap Nagar, Muttom, Aluva, COCHIN- !" #$ % COURSE NAME : Computer Security COURSE CODE : MCA 501 COURSE COORDINATOR :Ms.Anj n S.C! n"r n E#m i$: nj n %scms&roup.or&

Mo&ul' I Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : rou!s, "ings, Fields, Modular Arithmetic, #uclidean Algorithm, Finite Fields of the form F$!%,&olynomial Arithmetic, Finite Fields of the form F$'n%,(lassical #ncry!tion techni)ues, *lock (i!hers and +ata #ncry!tion Standard, Mo&ul' II Advanced #ncry!tion Standard, Multi!le #ncry!tion and -ri!le +#S, *lock (i!her Modes of o!eration, Stream (i!hers and "(., (onfidentiality using Symmetric #ncry!tion, Introduction to Number -heory: &rime Numbers, Fermat/s and #uler/s -heorems, -esting for &rimality, -he (hinese "emainder -heorem, +iscrete 0ogarithms, &ublic12ey (ry!togra!hy and "SA Mo&ul' III 2ey Management, +iffie13ellman 2ey #4change, #lli!tic (urve Arithmetic, #lli!tic (urve (ry!togra!hy, Message Authentication and 3ash Functions, 3ash and MA( Algorithms , +igital Signatures and Authentication &rotocols Mo&ul' I( Network Security: Authentication A!!lications, #lectronic Mail Security, I& Security, 5eb Security, System Security: Intruders, Malicious Software, Firewalls Mo&ul' ( 3ardware Solutions: (ry!togra!hic Accelerator, Authentication -okens, Smart (ards, *iometrics,+igital cash ,Secret sharing schemes ,6ero1knowledge techni)ues, Folklore, Secret Sharing , Interactive !roof ,

)EFE)ENCES

Stallings, 5,, (ry!togra!hy and Network Security, &rinci!les and &ractice, .th edition, &rentice 3all, Steve *urnett 7 Ste!hen &aine "SA Security8s Official uide to (ry!togra!hy, -ata Mc raw3ill *ehrou9 A, Forou9an,(ry!togra!hy 7 Network Security,-ata Mc raw 3ill, 2aufman, (,, &erlman, ",, S!eciner, M,, Network security, &rivate communication in a !ublic worls, &rentice 3all, '::',

-ra!!e, 5,, 5ashingotn, 0,(,, Introduction to (ry!togra!hy with coding theory, &earson1&rentice 3all, '::;, -anenbaum, A,S,, (om!uter Networks, .th edition, &rentice 3all, Stinson, +,, (ry!togra!hy, -heory and &ractice, 'nd edition, ("( &ress,

O*l+*' r'sour,'s <, Online resources of Stallings8s (ry!togra!hy and Network Security, &rinci!les and &ractice htt!:==williamstallings,com=(ry!to>e,html ', Online resources of Mene9, van Oorschot, ?anstone8s 3andbook of A!!lied (ry!togra!hy available at htt!:==www,cacr,math,uwaterloo,ca=hac=

SESSIONAL ASSESSMENT : TOTAL MARKS : 25

Assessment Criteri Unit Test Midterm Model Exam Assignment Class Performance and Attendance Tot $ 3 1 1 2 6 marks 4 marks 4 marks 8 marks 3 marks '5 m r(s

The student is required to do the assignment given to him and submit the same on the date concerned without fail. Assignments submitted after the submission date will not be considered. Each student has to keep a photocopy of their assignment with him for later use as study material. The assignment once submitted will not be given back. Assignment I: After com leting Cr! togra "! !o# "a$e %een "ired %! a go$ernment agenc! in Can%erra& '"ic" %elie$es t"at mem%ers of American (iterat#re )e artments at A#stralian Uni$ersities are #sing enci "ered messages to "ide terrorist acti$ities* +ort#natel!& d#e to ed#cational c#t%acks& t"e! 'ere onl! a%le to "ire a st#dent '"o com leted t"e first 'eeks of Cr! togra "! & and '"o is #na'are of t"e 'eaknesses of classical ci "ers* ,o#r s# er$isor resents !o# 'it" t"e follo'ing ro%lems %efore romoting !o# to more c"allenging tasks 'it"in t"e agenc!*

1 -f a .im le .#%stit#tion Ci "er is #sed /'it" an #nkno'n ke!0 and !o# interce t t"e ci "ertext O)AO t"en ex lain '"! !o# can %e confident t"at t"e laintext is not 1234* 2* ."o' t"at& for a Caesar Ci "er& encr! ting 'it" ke! k is t"e same as decr! ting 'it" ke! 26-k* /5emem%er t"at a s"ift of 6 is t"e same as a s"ift of 260* 3* +ecry!t the following ci!herte4t, which was obtained from #nglish !lainte4t using a

Sim!le Substitution (i!her $to make things slightly easier we have included the characters s!ace and , in the ci!herte4t in the same !ositions that they a!!ear in the !lainte4t%: -G(P.FG O. OLG P.C/NG% .DG E0F 0N S./ OLG NOC1GDON O. (GE/D EH.CO 0DS./FEO0.D NGPC/0O2% OL0N FGEDN LE/1 -./Y% L.-G)G/ -G E(N. -EDO OLGF O. GDM.2 OLGFNG()GN% OLG P.C/NG ED1 OLG (GPOC/GN NL.C(1 HG SCD 3(GENG (GO CN YD.- 0S OLG/G E/G ED2 3/.H(GFN N. OLEO -G PED EOOGF3O O. P.//GPO OLGF%
T!is ssi&nment s!ou$" *e "one in"i+i"u $$y n" must *e su*mitte" "urin& ,ourt! -ee( o, . nu ry -it!out ny , i$ure .

Assignment II: ,o#r s# er$isor resents !o# 'it" t"e follo'ing ro%lems %efore romoting !o# to more c"allenging tasks 'it"in t"e agenc!* 1 -he ci!herte4t M1) O2FGA S/NTE CN4 .2DIL N-)/ M1) 3HM) was obtained

by encry!ting -3# @AI(2 *"O5N FOB CAM&S O?#" -3# A-# using a Sim!le Substitution (i!her, a, 3ow much of the key is determined if this !lainte4t = ci!herte4t !air are knownD b, 3ow many different !ossible keys could have been used to encry!t the !lainte4tD c, +ecry!t the ci!herte4t M1) T)HL)P /HE HTH( C/ND PNEYNE 0NN, which is known to have been encry!ted with the same key as the above e4am!le,
2 -he ci!herte4t 2NHYSMCD2OP was obtained by encry!ting an #nglish word using a

?igenre Ci "er* a, -he first and ninth letters of the !lainte4t are identical, 5hat does this tell you about the keyD b, iven that the key length is less than E, the third and fourth letters of the !lainte4t are F and O res!ectively, and that A is a letter in the key word, find the key word and the !lainte4t,
T!is ssi&nment s!ou$" *e "one in"i+i"u $$y n" must *e su*mitte" "urin& t!ir" -ee( o, /e*ru ry -it!out ny , i$ure.

0ate &enalties -n fairness to ot"er st#dents& 'ork s#%mitted after t"e deadline 'ill 42T 7E ACCEPTE) * -n t"e e$ent of %erea$ement or rolonged illness affecting !o#r a%ilit! to meet t"e deadline& !o# s"o#ld disc#ss !o#r sit#ation 'it" t"e Co#rse Co-ordinator* ,o# m#st $erif! !o#r claim& e*g*& rod#ce a medical certificate* Extensions 'ill onl! %e granted #nder t"ese conditions* 4o extension is ossi%le %ased on a st#dent8s 'orkload*

Assi&nment Su*mission 0 1ener $ 1ui"e$ines Assignments are to %e onl! in A4 si9e a ers* 3and'ritten assignments are referred #nless s ecified ot"er'ise* A margin of minim#m 2*:cms s"o#ld %e gi$en on t"e left"and side of eac" age* A co$ering s"eet /as er s ecimen ro$ided else'"ere in t"e doc#ment0 s"o#ld %e ro$ided* Plastic folders;stick < %inding are not to %e #sed* -f t"e =lengt"8 of t"e assignment is s ecified / in =n#m%er of 'ords80 %! t"e fac#lt!& t"e same s"o#ld %e strictl! ad"ered to. Assi&nments s!ou$" *e su*mitte" *e,ore 2:05 .m. on t!e "ue " te3 in t!e c "emic o,,ice ,ter "u$y si&nin& in t!e s!eet pro+i"e" s proo, o, your su*mission. -t is ad$ised t"at t"e st#dent carries a co ! of t"e assignment s#%mitted for f#t#re references and in an! case of loss* Assignments 'ill %e s#%mitted #sing eit"er email or t"e assessment s#%mission facilit! in (M.;or ot"er'ise %ased as er t"e instr#ctions for t"e indi$id#al assignments* An ex lanation of "o' t"is 'orks for eac" iece of assessment 'ill %e ro$ided closer to t"e time of s#%mission* Ass'ssm'*t 56 Class T'st There will be three closed book tests conducted. The paper will be descriptive type. C$ose" *oo( test 1 -i$$ *e con"ucte" ,ter t!e comp$etion o, unit 1 C$ose" *oo( test ' -i$$ *e con"ucte" ,ter t!e comp$etion o, unit ' C$ose" *oo( test 4 -i$$ *e con"ucte" ,ter t!e comp$etion o, unit 5 Note: 16 T!ere -i$$ not *e ny Retest con"ucte" un"er ny circumst nces. 2) Any type of copying / malpractice during the conduct of Test /Exam will be dealt as a cheating case and the concerned test will be cancelled for the candidate who is caught without any prior information.

Assessment 4: O+er $$ 7er,orm nce O, T!e Stu"ent -it! Atten" nce

T"e st#dents erformance & %e"a$io#r and reg#larit! in t"e class 'ill %e e$al#ated and t"e marks 'ill %e granted %ased on t"is*

Assessment 585: Mi"term test n" Mo"e$ E9 m Mid term and model exam erformance of t"e st#dent 'ill also %e taken into consideration as mentioned a%o$e* Note:16 T!ere -i$$ not *e ny Retest con"ucte" un"er ny circumst nces. 2)Any type of copying / malpractice during the conduct of Test /Exam will be dealt as a cheating case and the concerned test will be cancelled for the candidate who is caught without any prior information.

Session 7$ n
Mod#le 1

Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : rou!s, "ings, Fields, Modular Arithmetic, #uclidean Algorithm, Finite Fields of the form F$!%,&olynomial Arithmetic, Finite Fields of the form F$' n%,(lassical #ncry!tion techni)ues, *lock (i!hers and +ata #ncry!tion Standard, Introduction: OSI Security Architecture, Security attacks Security Services, Security Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : rou!s, "ings, Fields Modular Arithmetic, Modular Arithmetic, #uclidean Algorithm, Finite Fields of the form F$!%, &olynomial Arithmetic, Finite Fields of the form F$'n%, (lassical #ncry!tion techni)ues (lassical #ncry!tion techni)ues (lassical #ncry!tion techni)ues *lock (i!hers +ata #ncry!tion Standard, Advanced #ncry!tion Standard, Multi!le #ncry!tion and -ri!le +#S, *lock (i!her Modes of o!eration, Stream (i!hers and "(., (onfidentiality using Symmetric #ncry!tion, Introduction to Number -heory: &rime Numbers, Fermat/s and #uler/s -heorems, -esting for &rimality, -he (hinese "emainder -heorem, +iscrete 0ogarithms, &ublic1 2ey (ry!togra!hy, Advanced #ncry!tion Standard Multi!le #ncry!tion and -ri!le +#S *lock (i!her Modes of o!eration Stream (i!hers and "(.,

Class 1 2 3 4 : 6 > 8 ? 16 11 12 13 Mod#le Test Mod#le 2

14-1: 16 1> 18

1?-26 21 22 23-24 2: Mod#le Test Mod#le 3

(onfidentiality using Symmetric #ncry!tion Introduction to Number -heory: &rime Numbers, Fermat/s -heorem #uler/s -heorems, -esting for &rimality, -he (hinese "emainder -heorem, +iscrete 0ogarithms &ublic12ey (ry!togra!hy, 2ey Management, +iffie13ellman 2ey #4change, #lli!tic (urve Arithmetic, #lli!tic (urve (ry!togra!hy, Message Authentication and 3ash Functions, 3ash and MA( Algorithms , +igital Signatures and Authentication &rotocols 2ey Management, +iffie13ellman 2ey #4change #lli!tic (urve Arithmetic, #lli!tic (urve (ry!togra!hy Message Authentication and 3ash Functions,Authentication "e)uirement,Authentication Function,Message Authentication (odes 3ash Functions, Security Of 3ash Functions and MA(s 3ash and MA( Algorithms, Secure 3ash Algorithm 5hirl!ool 3MA( (MA( +igital Signatures and Authentication &rotocols Authentication &rotocols +igital Signature Standard Network Security: Authentication A!!lications, #lectronic Mail Security, I& Security, 5eb Security, System Security: Intruders, Malicious Software, Firewalls Network Security: Authentication A!!lications1 2erberos B,F:G Authentication Service &ublic 2ey Infrastructure #lectronic Mail Security, I& Security, 5eb Security System Security1 Intruders,Intrusion +etection,&assword Management Malicious Software, Firewalls 3ardware Solutions: (ry!togra!hic Accelerator, Authentication -okens, Smart (ards, *iometrics,+igital cash ,Secret sharing schemes ,6ero1 knowledge techni)ues, Folklore, Secret Sharing , Interactive !roof , 3ardware Solutions: (ry!togra!hic Accelerator Authentication -okens, Smart (ards *iometrics,+igital cash Secret sharing schemes

26 2> 28 2? 36 31 32 33 34 3: 36 3> 38 Mod#le 4

3? 46 41 42 43 44 4: 46 4>

Module -est
Mod#le :

48 4? :6 :1 :2

:3 :4 :: :6 Model Exam

6ero1knowledge techni)ues Folklore Secret Sharing Interactive &roof

Você também pode gostar