CS6500 - Network Security

Course Data :


  • Nov 2016 : Course Title and Syllabus Updated. Title changed from "Cryptography & Network Security"


The objective of this course is to teach the concepts of securing computer network protocols, based on the application of cryptography techniques.

Course Contents:

  • Basic of cryptography, including conventional and public-key cryptography, hash functions, authentication, and digital signatures. (9 hrs)
  • Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509 Certificates, Public-Key Infrastructure. (2 hrs)
  • User Authentication: Remote User-Authentication Principles, Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User Authentication Using Asymmetric Encryption. (2 hrs)
  • Malicious Software: Viruses, Worms, System Corruption, Attack Agents, Information Theft � Keyloggers, Phishing, Spyware Payload Stealthing, Backdoors, Rootkits, Distributed Denial of Service Attacks. (4 hrs)
  • Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X Port-Based Network Access Control. (3 hrs)
  • IP Security: IP Security Overview, IP Security Policy, Encapsulating Security Payload, Combining Security Associations, Internet Key Exchange (IKE). (4 hrs)
  • Transport-Level Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS standard, Secure Shell (SSH) application. (4 hrs)
  • Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. (4 hrs)
  • Wireless Network Security: Mobile Device Security, IEEE 802.11i, Wireless LAN Security. (4 hrs)
  • Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations. (4 hrs)
  • Adv. Topics including Blockchains, Cloud Security and IoT security.
There will be 4-5 programming assignments involving the use of tools, libraries and packages such as Wireshark, OpenSSL and Snort.

Text Books:

  1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings, 2014, Pearson, ISBN13:9780133354690.

Reference Books:

  1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C. Kaufman, Prentice Hall, 2002.
  2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-0596005696.
  3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141-1.
  4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013, ISBN-10: 1284031675, ISBN-13: 978-1284031676.
  5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press, 2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.



Credits Type Date of Introduction
4-0-0-0-8-12 Elective Jan 2005

Previous Instances of the Course

© 2016 - All Rights Reserved - Dept of CSE, IIT Madras
Website Credits