Venue: SIC 201, 2nd Floor, KReSIT, IITBombay
Timings:
Monday 3:30pm - 5:00pm
Thursday 3:30pm - 5:00pm



Please subscribe to course mailing list
All further announcements will be conveyed over this mailing list as well as on moodle.


Marks distribution :

Homework : 5-10 Marks
End sem : 45-50 Marks
3 Quizzes : (15 Marks each)

Audit Students can give any 2 quizes out of 3 to pass the course. They might have to give endsem as well which will depend on their performance in 2 quizes.


Course Contents

  • Introduction
    • Threats, Vulnerabilities, Attacks
    • Data Integrity, Confidentiality, Anonymity
    • Message and Entity Authentication
    • Authorization, Non-repudiation

  • Symmetric Key Cryptography
    • DES, Triple DES
    • AES
    • Key distribution
    • Attacks

  • Public Key Cryptography
    • RSA
    • ECC

  • Integrity, Authentication and Non-Repudiation
    • Hash Functions (Examples - MD5, SHA5) : Properties and implementation
    • Message Authentication Code (MAC)
    • Digital Signature (RSA, DSA Signatures)

  • Public Key Infrastructure
    • Digital Certificates
    • Certifcation Authorities

  • Key Exchange
    • Discrete Logarithm Problem
    • Diffie-Hellman Key Exchange
    • Attacks
  • Protocols
    • Basic Authentication Protocols
      • Attacks(Replay, Reflection, Man-in-the-middle)
      • Needham Schroeder Protocol
      • Kerberos
    • Security Protocols
      • Network Security with IPSec
      • SSL/TSL

  • Software Vulnerabilities
    • Buffer Overflow
    • Cross Site Scripting
    • SQL Injection

  • Case Studies worms and viruses
    • E-mail Viruses
    • Internet worms
    • Mobile viruses
    • e.g. Sammy, Blaster, Code Red, Slammer, email melissa etc.

  • Attacks
    • Attacks on DNS
    • Phishing and Pharming
    • Denial of Service (DoS and DDoS)

  • Different kinds of Firewalls

  • Intrusion detection system (Host based and Network based)

  • Honeypots