ASSISTANT PROFESSOR COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
10 Marks: Class Test
20 Marks: Mid Term Examination
60 Marks: End Term Examination
10 Marks: Class Perfomance/Quiz/Seminar/Project
Assignment 1: [ Last Date for the submission : 29 September, 2017]
Registration for the Quiz:
1. Open the website,
and register yourself with your name, Last Name, and the Username:
For an Example: if your name is Amit Singh and Roll number is 14501,
then write your name : "Amit",
Last name: "Singh", and
the username: NITH14501
2. After the successful registration, login your account at
3. After Login, try to enroll yourself into the Class.
For this purpose, Click on to the "Search" button on top right corner.
4. Change the preference of the Class search into the
Search by "Teacher's Name" --> "LOKESH CHOUHAN "
5. Now you will get the list of various classes by me.
But try to register yourself inside the "Final Year CSE 2017-18/ Dual Degree VII 2017/ IIIT (CSE) VII 2017".
6. Now wait for the approval from my side.
7. After Allowing/Approval, you will be ready to appear in the Online Quiz.
8. At the time of Quiz, your quiz will be available to you.
Assignment 1: Install VMware workstation for Linux or windows.
Assignment 2: Install wireshark for Linux or windows.
Assignment 3: Open the website, "www.cert-in.org.in"
(i) write the procedure to report an incident.
(ii) write the procedure to report about the vulnerabilities.
(iii) Procedure to secure your PC.
(iv) List down various security realated tools and websites with proper explination. Alo install these tools on your system.
Assignment 4: Open the website, "http://pgportal.gov.in/" and write the procedure to file the public grievance.
Experiment 1: Select any browser and try to secure your browser by following settings:
(i) trusted sited/blocked sites etc.
(ii) by enabling or disabling the cookies.
(iii) use of pop up blocker
(iv) by enabling or disabling scripts
(v) by enabling or disabling scripts
(vi) browsing history
(vii) saving passwords/master password
LAB 2: DONE
Program1: WAP to demonstrate Caeser Cipher Cryptosystem.
Program2: WAP to demonstrate Vigenère Cipher Cryptosystem.
Program 3: WAP to demonstrate Rotor Machine Cryptosystem.
Program1: WAP to demonstrate Play Fair Cryptosystem.
Program2: WAP to find gcd between two numbers by using Euclid's Algorithm.
Program3: WAP to find Polynomial GCD between two polynomial a(x) and b(x) by using Euclid's Algorithm.
Program4: WAP to find inverse of a number within Galois Field (GF) with the help of extended Euclidean Algorithm,
e.g. Inverse of 550 in GF(1759)
Program 1: WAP to Implement the Rabin-Miller Primality Test to Check if a Given Number is Prime or not?
Program 2: WAP to Implement the AKS Test to Check if a Given Number is Prime or not?
Program1: WAP to demonstrate DES cryptosystem.
Program 2: WAP to demonstrate RSA cryptosystem.
Program3: WAP to demonstrate Diffie Hellman key exchange algorithm.
Program 1: WAP to demonstrate MD5 (message digest).
Program 2: WAP to demonstrate SHA (Secure Hash Algorithm).
Program 3: WAP to demonstrate HMAC (hash message authentication code ).
Symmetric Cipher Model, Cryptography Classification, Cryptanalysis, Substitution: Other forms, Poly-alphabetic Substitution Ciphers, One-Time Pad, Transposition (Permutation) Ciphers, Product Ciphers.
Groups, Rings, and Fields, Modular Arithmetic, Euclid‟s Algorithm, Finite Fields of the Form GF(p), Polynomial Arithmetic, Finite Fields of the Form GF(2n). Generation of large prime numbers, Prime factorization, Euler Totient Function ø(n), Euler's Theorem, Primality Test- Fermat's Little Theorem, Baillie-PSW, Solovay-Strassen, Miller Rabin Algorithm, AKS Algorithm, Cyclotomicprimality test, Elliptic Curve Primality Test, Prime Distribution, Chinese Remainder Theorem, Primitive Roots, Discrete Logarithms
Perfect security, Feistel Cipher Structure, Block Cipher- DES, differential and Linear Cryptanalysis,Avalanche Effect , Double-DES, Triple-DES, Electronic Codebook Book (ECB), Cipher Block Chaining (CBC), Message Padding, Cipher Text Stealing (CTS); Stream Cipher- Stream Modes of Operation-Cipher Feedback (CFB), Output Feedback (OFB), Counter (CTR),
Standards Organizations, Security Components OSI Security Architecture, Aspects of Security, Passive Attacks, Active Attacks, Security Services (X.800), Security Mechanism, Security Mechanisms (X.800), Services and Mechanisms Relationship, Model for Network Security, Model for Network Access Security,
1. Solutions of Cryptography and Network Security by Behrouz A. Forouzan
2. Study materials of CRYPTOGRAPHY AND NETWORK SECURITY by WILLIAM STALLINGS
3. Solutions of CRYPTOGRAPHY AND NETWORK SECURITY by WILLIAM STALLINGS (4e)
4. Video Lectures on Cryptography and Network Security by NPTEL
5. Cryptography Tutorial
RC4; Pseudo number generation- Linear-Congruential Generators, Blum BlumShub Generator, Nonlinear Generators, RNGs used in Common Software Packages, Block Ciphers as PRNGs, ANSI X9.17 PRG, Hardware Random number generator, Attacks, Entropy Gathering Daemon (EGD), Intel Digital Random Number Generator (DRNG), RNG in Linux, Windows and iOS7.
The Key Distribution Problem, Public-Key Cryptosystems, The RSA Algorithm
The Key Management riddle, The Diffie-Hellman Key Exchange, Elliptic Curve Cryptography,
Authentication, Access control policies, The Message Digest (MD5) Algorithm, RIPEMD-x and HMAC fundamentals, Message Authentication, requirements and functions, Message Authentication Codes, Hash Functions, Birthday Problem, SHA-X, SHA-512 overview, KECCAK,
Digital Signature basics, Authentication Protocols, The Digital Signature Standard, Kerberos Authentication scheme, Replay Attacks,The X.509 Directory Authentication scheme, Needham Schroeder Protocol,
Session security, SSL, SSH, Web security, HTTPS
IEEE 802.11, Wireless Application Protocol, Wireless Markup Language, Wired Equivalent Privacy (WEP), Wireless Transport Layer Security
Mail security, PGP, IP security, IPSec,
Intrusion vs. Extrusion Detection, Examples of Intrusion, Categories of Intruders, Hacker Behavior Example, Insider Behavior Example, Intrusion Techniques, Password Guessing and Capture, Notification Alarms, Types of IDS, Sample Signatures, Anomaly Based IDS, Statistical Anomaly Detection, Audit Records, Rule-Based Intrusion Detection, Types of ID, Host vs. Network IDS.