Schedule Online Admission Counselling Meeting with Us
Apply Now - 2024

Information Security

GANPAT UNIVERSITY 

FACULTY OF ENGINEERING & TECHNOLOGY

Programme 

Bachelor of Technology 

Branch/Spec .

Computer Science & Engineering  (CBA/BDA)

Semester 

VI 

Version 

1.0.0.0

Effective from Academic Year 

2021-22 

Effective for the batch Admitted in 

June 2019

Subject code 

2CSE602 

Subject Name 

INFORMATION SECURITY

Teaching scheme 

Examination scheme (Marks)

(Per week) 

Lecture(D 

T)

Practical(Lab. )

Total 

CE 

SEE 

Total

TU 

TW

Credit 

Theory 

40 

60 

100

Hours 

Practical 

30 

20 

50

Pre-requisites:

Computer Network, Programming Language

Learning Outcome:

After learning the course the students should be able to: 

Understand the principles and practices of cryptographic techniques.  

Understand information security goals for designing secure systems.  

Apply security algorithms in solving real-life security problems in communicating systems.  Apply security to information over the network and world wide web.

Theory syllabus

Unit 

Content 

Hrs

1

Basics of Information Security 

Information Security understanding,Security goals, Security attacks, Security services,  security mechanisms

4

2

Cryptographic Mathematics 

Modular arithmetic, linear congruence, Algebraic structure, checking of primeness, quadratic  congruence

4

Classical Ciphers 

Symmetric cipher model, substitution ciphers, transposition ciphers, steganography

5

Modern symmetric key ciphers 

Modern block ciphers, modern stream ciphers, Data Encryption standard, advanced  encryption standard, Electronic code book mode, CBC, cipher feedback mode, output feedback  mode

7

Public key cryptography 

RSA, RSA proof, RSA attacks, Rabin cryptosystem, Key management: Diffie Hellman

6

Message Authentication and Hash functions 

Authentication requirements, functions, Message authentication codes (MAC), Hash functions,  security of Hash functions

6

Hash algorithms, Digital Signatures 

SHA- 512, Basics, digital signature standards

6



 

Network and System Security 

IP and Network Security ,Web security Email Security, System Security, tools

7

Practical content

Practical contents will be based on performing web security attacks to understand security goals, Perform  Substitution Techniques for Encryption, Perform Block Cipher Encryptions, Implement Digital Signature  Algorithm, Perform Asymmetric Key Encryptions, Implement MAC.

Text Books

William Stallings: “Cryptography and Network Security – Principles and Practice”,Pearson Education.

Reference Books

Bruce Scheneir: “Applied Cryptography”, John Wiley.

Behrouz Forouzan: “Cryptography & Network Security”, TMH.

Course Outcomes:

COs 

Description

CO1 

Understand the principles and practices of cryptographic techniques.

CO2 

Understand a variety of generic security threats and vulnerabilities, and identify & analyze  particular security problems for given applications.

CO3 

Apply security algorithms in solving real-life security problems in communicating systems. 

CO4 

Apply security to information over the network and world wide web.



 

Mapping of CO and PO:

COs 

PO1 

PO2 

PO3 

PO4 

PO5 

PO6 

PO7 

PO8 

PO9 

PO10 

PO11 

PO12

CO1 

0

CO2 

0

CO3 

0

CO4 

0