20SCN13-Information Seccurity Group 2
20SCN13-Information Seccurity Group 2
20SCN13-Information Seccurity Group 2
Textbook(s):
1 Embedded Systems: Architecture, Raj Kamal Tata McGraw 2013
Programming, and Design hill, 2nd
edition
Reference Book(s):
1 Computer as Components, Marilyn Wolf Elsevier, 3rd 2014
Principles of Embedded Computing edition
System Design
Wireless network security: Wireless security, Wireless network threats, Wireless network
measures, mobile device security, security threats, mobile device security strategy, IEEE
802.11 Wireless LAN overview, the Wi-Fi alliance, IEEE 802 protocol architecture. Security,
IEEE 802.11i services, IEEE 802.11i phases of operation, discovery phase, Authentication
phase, key management phase, protected data transfer phase, the IEEE 802.11i pseudorandom
function. Web Security Considerations: Web Security Threats, Web Traffic Security
Approaches. Secure Sockets Layer: SSL Architecture, SSL Record Protocol, Change Cipher
Spec Protocol, Alert Protocol, and shake Protocol, Cryptographic Computations. Transport
Layer Security: Version Number, Message Authentication Code, Pseudorandom Functions,
Alert Codes, Cipher Suites, Client Certificate Types, Certificate Verify and Finished
Messages, Cryptographic Computations, and Padding. HTTPS Connection Initiation,
Connection Closure. Secure Shell(SSH) Transport Layer Protocol, User Authentication
Protocol, Connection Protocol
Module-5
Electronic Mail Security: Pretty good privacy, notation, operational; description, S/MIME,
RFC5322, Multipurpose internet mail extensions, S/MIME functionality, S/MIME messages,
S/MIME certificate processing, enhanced security services, Domain keys identified mail,
internet mail architecture, E-Mail threats, DKIM strategy, DKIM functional flow. IP
Security: IP Security overview, applications of IPsec, benefits of IPsec, Routing applications,
IPsec documents, IPsec services, transport and tunnel modes, IP Security policy, Security
associations, Security associations database, Security policy database, IP traffic processing,
Encapsulating Security payload, ESP format, encryption and authentication algorithms,
Padding, Anti replay service, transport and tunnel modes, combining security associations,
authentication plus confidentiality, basic combinations of security associations, internet key
exchange, key determinations protocol, header and payload formats, cryptographic suits.
Question paper pattern:
The question paper will have ten questions.
Each full question is for 20 marks.
There will be 2 full questions (with a maximum of four sub questions in one full
question) from each module.
Each full question with sub questions will cover the contents under a module.
Students will have to answer 5 full questions, selecting one full question from each
module. ∎
Textbook/Reference Books
Title of the book Author Name Publisher’s Publication
Name year
Textbook(s):
1 Cryptography and Network William Stallings Pearson, 6 th 2013
Security edition
Reference Book(s):
1 Cryptography and Information V K Pachghare PHI, 2nd 2015
Security edition