gallery/csenith

Dr. Lokesh Chouhan

Teaching

 

 

Presently Teaching: 

 

1. INFORMATION SECURITY CSD-410

 

 

Syllabus

 

 

Enrolled Students:

 

 

Marks Evaluations:

 

  10 Marks: Class Test

  20 Marks: Mid Term Examination

  60 Marks: End Term Examination

  10 Marks: Class Perfomance/Quiz/Seminar/Project

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  Assignment 1: [ Last Date for the submission :  29 September, 2017]

 

Registration for the Quiz:

 

1. Open the website, 

    http://quizstar.4teachers.org/student/registrs.jsp

    and register yourself with your name, Last Name, and the Username:

    For an Example: if your name is Amit Singh and Roll number is 14501,

    then write your name : "Amit",

                     Last  name: "Singh", and

                 the username: NITH14501

2. After the successful registration, login your account at 

    http://quizstar.4teachers.org/indexs.jsp

3. After Login, try to enroll yourself into the Class.

    For this purpose, Click  on to the "Search" button on top right corner. 

4. Change the preference of the Class search into the

     Search by "Teacher's Name" --> "LOKESH CHOUHAN "

5. Now you will get the list of various classes by me.

    But try to register yourself inside the "Final Year CSE 2017-18/ Dual Degree VII 2017/ IIIT (CSE) VII 2017".

6. Now wait for the approval from my side.

7. After Allowing/Approval, you will be ready to appear in the Online Quiz.

8. At the time of Quiz, your quiz will be available to you.

 

 

 

 

 

2. Information Security Lab: [CSD-415]

 

LAB1: DONE

Assignment 1: Install VMware workstation for Linux or windows.

Assignment 2: Install wireshark for Linux or windows.

Assignment 3: Open the website, "www.cert-in.org.in" 

                          (i) write the procedure to report an incident.

                          (ii)  write the procedure to report about the vulnerabilities.

                          (iii) Procedure to secure your PC.

                          (iv) List down various security realated tools and websites with proper explination. Alo install these tools on your system.

Assignment 4: Open the website, "http://pgportal.gov.in/" and write the procedure to file the public grievance.

Experiment 1: Select any browser and try to secure your browser by following settings:

                       (i) trusted sited/blocked sites etc.

                       (ii) by enabling or disabling the cookies.

                       (iii) use of pop up blocker

                       (iv) by enabling or disabling scripts

                       (v) by enabling or disabling scripts

                       (vi) browsing history

                       (vii) saving passwords/master password

LAB 2: DONE

Program1: WAP to demonstrate Caeser Cipher Cryptosystem.

Program2: WAP to demonstrate Vigenère Cipher Cryptosystem.   

Program 3: WAP to demonstrate Rotor Machine Cryptosystem.   

 

LAB3: DONE

Program1: WAP to demonstrate Play Fair Cryptosystem. 

Program2: WAP to find gcd between two numbers by using Euclid's Algorithm. 

Program3: WAP to find Polynomial GCD between two polynomial a(x) and b(x) by using Euclid's Algorithm. 

Program4: WAP to find inverse of a number within Galois Field (GF) with the help of extended Euclidean Algorithm,

                   e.g. Inverse of 550 in GF(1759)

 

LAB 4:

Program 1: WAP to Implement the Rabin-Miller Primality Test to Check if a Given Number is Prime or not?

Program 2: WAP to Implement the AKS Test to Check if a Given Number is Prime or not?

 

LAB 5:DONE

Program1: WAP to demonstrate DES cryptosystem.

Program 2: WAP to demonstrate RSA cryptosystem.

Program3: WAP to demonstrate Diffie Hellman key exchange algorithm.

LAB 6:

Program 1: WAP to demonstrate MD5 (message digest).

Program 2: WAP to demonstrate SHA (Secure Hash Algorithm).

Program 3: WAP to demonstrate HMAC (hash message authentication code ).

 

Assignement1             Assignement2

 

gallery/computer-security1

Week No

Topics Covered

Study Materials/Slides

1

Symmetric Cipher Model, Cryptography Classification, Cryptanalysis, Substitution: Other forms, Poly-alphabetic Substitution Ciphers, One-Time Pad, Transposition (Permutation) Ciphers, Product Ciphers.

 

2

Groups, Rings, and Fields, Modular Arithmetic, Euclid‟s Algorithm, Finite Fields of the Form GF(p), Polynomial Arithmetic, Finite Fields of the Form GF(2n). Generation of large prime numbers, Prime factorization, Euler Totient Function ø(n), Euler's Theorem, Primality Test- Fermat's Little Theorem, Baillie-PSW, Solovay-Strassen, Miller Rabin Algorithm, AKS Algorithm, Cyclotomicprimality test, Elliptic Curve Primality Test, Prime Distribution, Chinese Remainder Theorem, Primitive Roots, Discrete Logarithms

3_4

Perfect security, Feistel Cipher Structure, Block Cipher- DES, differential and Linear Cryptanalysis,Avalanche Effect , Double-DES, Triple-DES, Electronic Codebook Book (ECB), Cipher Block Chaining (CBC), Message Padding, Cipher Text Stealing (CTS); Stream Cipher- Stream Modes of Operation-Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR),

AES

1_a

Standards Organizations, Security Components OSI Security Architecture, Aspects of Security, Passive Attacks, Active Attacks, Security Services (X.800), Security Mechanism, Security Mechanisms (X.800), Services and Mechanisms Relationship, Model for Network Security, Model for Network Access Security, 

SM

Supplymentary Materials:

1. Solutions of  Cryptography and Network Security by Behrouz A. Forouzan

2. Study materials of CRYPTOGRAPHY AND NETWORK SECURITY by WILLIAM STALLINGS

3. Solutions of CRYPTOGRAPHY AND NETWORK SECURITY by WILLIAM STALLINGS (4e)

4. Video Lectures on Cryptography and Network Security by NPTEL

5. Cryptography Tutorial

5

RC4; Pseudo number generation- Linear-Congruential Generators, Blum BlumShub Generator, Nonlinear Generators, RNGs used in Common Software Packages, Block Ciphers as PRNGs, ANSI X9.17 PRG, Hardware Random number generator, Attacks, Entropy Gathering Daemon (EGD), Intel Digital Random Number Generator (DRNG), RNG in Linux, Windows and iOS7.

5

The Key Distribution Problem, Public-Key Cryptosystems, The RSA Algorithm

6

The Key Management riddle, The Diffie-Hellman Key Exchange, Elliptic Curve Cryptography,

7

Authentication, Access control policies, The Message Digest (MD5) Algorithm, RIPEMD-x and HMAC fundamentals, Message Authentication, requirements and functions, Message Authentication Codes, Hash Functions, Birthday Problem, SHA-X, SHA-512 overview, KECCAK,

8

Digital Signature basics, Authentication Protocols, The Digital Signature Standard, Kerberos Authentication scheme, Replay Attacks,The X.509 Directory Authentication scheme, Needham Schroeder Protocol,

9

Session security, SSL, SSH, Web security, HTTPS

IEEE 802.11, Wireless Application Protocol, Wireless Markup Language, Wired Equivalent Privacy (WEP), Wireless Transport Layer Security 

10

Mail security, PGP, IP security, IPSec,

11

Intrusion vs. Extrusion Detection, Examples of Intrusion, Categories of Intruders, Hacker Behavior Example, Insider Behavior Example, Intrusion Techniques, Password Guessing and Capture, Notification Alarms, Types of IDS, Sample Signatures, Anomaly Based IDS, Statistical Anomaly Detection, Audit Records, Rule-Based Intrusion Detection, Types of ID, Host vs. Network IDS.