Sei sulla pagina 1di 10

FORMAT : QP09 KCE/DEPT.

OF ECE

VL7002 - SECURITY SOLUTIONS IN VLSI


LTPC
3003
OBJECTIVES:
1. To study the different kinds of threats to information security.
2. To know the various techniques for data encryption.
3. To formulate case study based on VLSI for security threats.
4. To design and implement the various cryptography algorithms in VLSI.

UNIT I : BASIC CONCEPTS


9
Information system reviewed, LAN, MAN, WAN, Information flow, Security
mechanism in OS,,Targets: Hardware, Software, Data communication procedures.
Threats to Security: Physical security, Biometric systems, monitoring controls, Data
security, systems, security, Computer System security, communication security.
UNIT II ENCRYPTION TECHNIQUES
9
Conventional techniques, Modern techniques, DES, DES chaining+, Triple DES, RSA
algorithm, Key management. Message Authentication and Hash Algorithm:
Authentication requirements and functions secure Hash Algorithm, NDS message
digest algorithm, digital signatures, Directory authentication service.
UNIT III FIREWALLS AND CYBER LAWS
9
Firewalls, Design Principles, Trusted systems, IT act and cyber laws, Virtual private
network.
UNIT IV FUTURE THREATS TO NETWORK
9
Recent attacks on networks, VLSI Based Case study
UNIT V CRYPTO CHIP DESIGN
9
VLSI Implementation of AES algorithm. Implementation of DES, IDEA AES
algorithm, Development of digital signature chip using RSA algorithm.
REFERENCES:

SSV 1
FORMAT : QP09 KCE/DEPT. OF ECE

1. William Stalling Cryptography and Network Security Pearson Education, 2005


2. Charels P. Pfleeger Security in Computing Prentice Hall, 2006
3. Jeff Crume Inside Internet Security Addison Wesley, 2000.

Staff Incharge HOD

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING
COURSE PLAN
Sub. Code : VL7002 Branch / Year / Sem : M.E
VLSI / I / I
Sub.Name : SECURITY SOLUTIONS IN VLSI Batch : 2015-2017

COURSE OBJECTIVE
1. To study the different kinds of threats to information security.
2. To know the various techniques for data encryption.
3. To formulate case study based on VLSI for security threats.
4. To design and implement the various cryptography algorithms in VLSI.

LEARNING OUTCOME
A student who successfully fulfills the course requirements will have emonstrated:
The Students will able to explain concept of networks and security concepts.
Able Design and implement varius encryption algorithms for network security
(e.g., AES, DES algorithm)
The students know about IT acts and cyberlaws.
The students can describe the recent attacks on network.

REFERENCE BOOKS
R1. William Stalling Cryptography and Network Security Pearson Education,
2005
R2. Charels P. Pfleeger Security in Computing Prentice Hall, 2006
R3. Jeff Crume Inside Internet Security Addison Wesley, 2000.

WEB RESOURCES
W1.
http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf
W2. http://www.caaa.in/Image/cyber%20laws%20overview.pdf
W3. http://www.ijaiem.org/Volume2Issue4/IJAIEM-2013-04-23-058.pdf
W4. http://www.ijitee.org/attachments/File/v1i6/E0344101612.pdf

SSV 2
FORMAT : QP09 KCE/DEPT. OF ECE

W5. http://web.eecs.umich.edu/~taustin/papers/DATE10-rsa.pdf
W6. http://web.cs.ucla.edu/~miodrag/papers/Majzoobi_2011.pdf
W7 . http://www.ijitee.org/attachments/File/v3i1/A0930063113.pdf
W8. http://ethesis.nitrkl.ac.in/4977/1/109EC0215.pdf
W9. http://www.it.uu.se/research/group/core/publications/thesis_tobias_bandh.pdf
W10. http://www.cs.ucy.ac.cy/courses/EPL475/slides/Lecture_07.pdf
W11. http://research.microsoft.com/en-us/um/people/blampson/63-
C4ISecurity/Acrobat.pdf
W12. http://www-i4.informatik.rwth-

aachen.de/content/teaching/lectures/sub/sikon/sikonWS0001/01_introduction.pdf
W13. http://nptel.ac.in/courses/106105031/11

SSV 3
FORMAT : QP09 KCE/DEPT. OF ECE

Topi Topic Books Page Teaching No. of Cumulati


c No for No. Methodolo Hours ve No. of
Referen gy Require periods
ce d
UNIT I BASIC CONCEPTS
(9)
Information system
01 reviewed, LAN, MAN, R2 412 BB 1 1
WAN
Information flow,
02 Security mechanism in R1 9-28 BB 1 2
OS,,
Targets: Hardware,
Software, Data
03 communication
R2 415 BB 1 3
procedures.
Threats to Security:
Physical security,
04 Biometric systems,
R2 425-438 BB 2 5
monitoring controls
05 Data security W12 1-13 PPT 1 6
06 Systems security, W12 14-15 PPT 1 7
Computer System
07 security,
W12 16-18 PPT 1 8
08 Communication security W11 1-17 PPT 1 9
LEARNING OUTCOME
At the end of unit, students should be able to
Understand network concepts
Able to define communication procedures.
Describe threats to security..
Know about Data and system security.
UNIT II ENCRYPTION TECHNIQUES
(9)
Conventional techniques, R1 77 BB
09 Modern techniques, DES 1 10
W13 NPTEL
77-88
DES chaining+, Triple R1
10 DES, 197 - BB 1 11
R3
238
11 RSA algorithm, R1 277-290 BB 1 12
Key management.
12 Message Authentication R1 333-342 BB 1 13
and Hash Algorithm:
Authentication
13 requirements and R1 362-371 BB 1 14
functions secure
14 Hash Algorithm,. R1 342-351 BB 1 15
NDS message digest
15 algorithm,
W9 1-69 BB 1 16
16 digital signatures R1 395-407 BB 1 17
Directory authentication
17 service
W10 1-47 BB 1 18
LEARNING OUTCOME
At the end of unit, students should be able to
Describe different type of algorithms.

SSV 4
FORMAT : QP09 KCE/DEPT. OF ECE

Able to define and compute the histogram of a digital image as well as the
information that could be inferred from it.
Know the concept of Keymanagement in encryption and decryption.
Understand the concept of digital signature and directory authentication
service.
UNIT III FIREWALLS AND CYBER LAWS
(9)
R2 486-495
18 Firewalls BB 1 19
R3 88-89
19 Design Principles R2 280-300 BB 2 21
20 Trusted systems R2 258-261 BB 2 23
W1 1-34
21 IT act and cyber laws, BB 2 25
W2 1-111
Virtual private network.
22 R2 461-467 BB 2 27
LEARNING OUTCOME
At the end of unit, students should be able to
Understand the concept of firewall.
Describe Trusted systems.
Able to know the IT Act and cyber laws.
Describe the concept of Virtual Private network.
UNIT IV FUTURE THREATS TO NETWORK
(9)
Recent attacks on W5 1-6
23 BB 3 30
networks R3 1 - 74
VLSI Based Case
24 W6 1 - 38 BB 6 36
study
LEARNING OUTCOME
At the end of unit, students should be able to
Know the concept of threats in networks.
Understand about different attacks on networks.
Describe the concept of attacks occur in VLSI.
Able to analyse the security attacks and its solutions.
UNIT V CRYPTO CHIP DESIGN
(9)
VLSI Implementation of
25 AES algorithm
W3 1-6 PPT 2 38
26 Implementation of DES W4 1-5 BB 2 40
27 IDEA AES algorithm W7 13 BB 2 42
Development of digital
28 signature chip using RSA W8 1-47 PPT 3 45
algorithm.
LEARNING OUTCOME
At the end of unit, students should be able to
Describe the concept of AES algorithm.
Able to implement VLSI concept in AES and DES algorithm .
Know the concept of IDEA AES algorithm.
Understand the concept of digital signature chip using RSA algorithm.

COURSE OUTCOME
At the end of the course, the students will be able to

SSV 5
FORMAT : QP09 KCE/DEPT. OF ECE

Describe and explain concept of networks and security concepts.


Design and implement varius encryption algorithms for network security
(e.g., AES, DES algorithm)
Know about IT acts and cyberlaws.
Describe the recent attacks on network.
Able to implement the AES and DES algorithm in VLSI .

ASSIGNMENT I (10) ASSIGNMENT II (20)


Descriptive Questions
1. Explain in detail about 1. Develop an application using DES Algorithm.
data communication 2. Develop and implement an application using
precedures.
AES Algorithm.
2. Expail DATA security.
3. Describe the concept of 3. Develop an application using RSA algorithm.
system security.
4. Explain about Triple DES
algorithm.
5. Explain RSA algorithm.

CONTENT BEYOND THE SYLLABUS

1. Smart card content security

INTERNAL ASSESSMENT DETAILS


ASST. NO. I II MODEL
Topic Nos. 1-13 14-22 1-28
Date

ASSIGNMEN I II
T ASSIGNMENT DETAILS
Topic Nos.
for
SSV 6
reference
Deadline
FORMAT : QP09 KCE/DEPT. OF ECE

Prepared by Verified By
Mr. P.RAJAPIRIAN
HOD/ECE

Approved by
PRINCIPAL

REVIEW SHEET

SSV 7
FORMAT : QP09 KCE/DEPT. OF ECE

After Completion of syllabus

Faculty experience in handling / covering syllabus

Unit I :

Unit II :

Unit III :

Unit IV :

Unit V :

Difficulties (if any)

Feedback on University Question Paper

SIGNATURE OF STAFF
HOD/ECE

SSV 8
FORMAT : QP09 KCE/DEPT. OF ECE

GENERAL GUIDELINES
Course Objectives are brief, clear statements that describe the desired
learning of instruction; i.e., the specific skills, values, and attitudes students
are intended to acquire. Three learning objectives are
What do you want your graduates to know?
What do you want your graduates to think or care about?,
What do you want your graduates to be able to do?
Learning Outcome are set of statements setting out what the participants
should be able to do / understand by the end of the Unit. Learning
Outcomes are statements that describe significant and essential learning
that learners have achieved, and can reliably demonstrate at the end of a
course or program
Learning outcome muse be clear and precise, learner-oriented, realistic and
achievable. (Words such as State, Describe, Explain, Use, Identify, Analyze,
Compare, Demonstrate, Plan, Develop can be used)
Course Outcome are set of statements setting out what the participants
should be able to do / understand at the end of the course.
Teaching Methodology includes
o BB - Black board o GL - Guest Lecture
o CBT - Computer Based o IV - Industrial visit
Tutorial based
o PPT - Power Point learning
o V - Video o CS - Case study
o Demo- Demonstration o Tut - Tutorial
o OHP - Over Head o NPTEL- National
Projector Programme
usage on
(OHP slides) Technology
o Sem - Seminar Enabled
Learning
Minimum of 1 NPTEL class per course should be included and
executed.
Assignment dates shall be fixed in consent with all 6 subject faculties
so as to give equal time slot balance for the students. Assignment dates
should be prior to Assessment & Model Exams.
Course plan Pages 1 to 6 shall be included in Question bank
Review sheet is experience summary sheet to be included in the
course file for future reference (staff has to fill in the sheet after
completing the course) & need not be included in Question Bank.
Updated Question Bank shall be given appropriate version numbers
GUIDELINES FOR ASSIGNMENT
1. Student Groups shall be formed (Eg. Class strength :50, each group
comprising 10 members, totaling 5 groups). As per the number of
groups, Assignment question I, II has to be identified by faculty. (5
groups means, 5 questions for Assignment I, II). Group 1 shall be
allotted Qn 1 from Assignment I & Qn. 1 from Assignment II and
likewise the other groups.
2. For Assignment I, each group has to attend 1 question in detail (Min. of
8 pages). Marks will be credited for Assessment I.
3. For Assignment II, as per the specification mentioned student groups
has to develop model/simulate the assigned task. Work has to

SSV 9
FORMAT : QP09 KCE/DEPT. OF ECE

documented individually (Title, Objective, Description, Requirement,


Implementation details, Inference).
4. Award of marks :Document-05, Presentation-05, Demo-10
5. Marks secured in Document, Presentation will be credited for
Assessment-II.
6. Work has to be Demonstrated to the faculty in-charge for award of
marks & credited for Model exam.
7. Progress of Assignment II will be monitored through faculty-batch
interaction.

SSV 10

Potrebbero piacerti anche