MSC CS&is Syllabus
MSC CS&is Syllabus
MSC CS&is Syllabus
Contents
1 Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . ..... 3
1.1 Motivation.. . . . . . . . . . . . . . . . . . . . 4
1.1 Aim and Objective . . . . . . . . . . . . . . . . . . .... 4
2 Regulations. . . . . . . . . . . . . . . . . . . . . . . . .. 5
2.1 Course Description . . . . . . . . . . . . . . . . . . . 5
2.2 Salient Features . . . . . . . . . . . . . . . . . . . . .. 5
2.3 Eligibility . . . . . . . . . . . . . . . . . . . . . . . ..
6
2.4 Admissions . . . . . . . . . . . . . . . . . . . . . . . . 6
2.5 Assessment, Evaluation and Grading System. 6
2.6 Total Credit Requirements . . . . . . . . . . . . . .. . 7
3 Courses . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 7
3.1 Core Courses . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Elective Courses . . . . . . . . . . . . . . . . . . . . . . 8
3.3 Mini Projects . . . . . . .. .8
3.4 Project/Internship . . . . . . . . . . . . . . . . . . . . .. 9
4 Semester-wise Breakup of Courses for 2 years. . ..... 10
5 Syllabus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.1 Core Courses . . . . . . . . . . . . . . . . . . . . . . 12
5.2 Electives . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1. Preamble
This document details the proposal to launch a Master of Science programme in Computer
Science and Information Security by the Indian Institute of Information Technology and
Management - Kerala (IIITM-K) and to get affiliated by Cochin University of Science and
Technology (CUSAT). IIITM-K is an autonomous institution set up by the Government of
Kerala in 2000 with a mission to become an institution of excellence in education, research,
development, and training in Information Technology, Management and aligned areas.
In the memorandum of Association of Indian Institute of Information Technology and
Management-Kerala, dated 26-08-2000, the main objective of the institute is
To offer consultancy, guidance to the Government, to State and Central Public Sector
Undertakings and other organizations in their drive for computerization, to train personnel
involved in such activities and to help the Government formulate various policies,
schemes, and projects for the promotion of wide spread application of information
Technology in all walks of life, without the objective of making profits.
1.1 Motivation
The handling of information through electronic means is a defining technology of our age.
Enormous volumes of information are routinely stored, processed and transmitted worldwide
indeed, most aspects of our daily lives would come to a halt if the information infrastructure
fail. The field of Information Security, namely the study of measures and countermeasures to
real and serious security threats to information, has grown very rapidly in the recent years.
The subject embraces technologies such as cryptography, computer security, network
security, digital forensics and fraud detection, as well management of security and trade-offs
while implementing information security.
This MSc programme provides students a systematic understanding and critical awareness of
the current threats to the security of electronic information and the measures available to
counteract them. It is designed to introduce all technical aspects of Information Security and
is intended as a foundation, or a building block, for a career in the field
To impart theoretical knowledge that underpins the various areas of Computer Science
and Information Security
To cater the needs of government, industry and scientific organizations in the Computer
Science and Information Security areas.
To train computer scientists who can work on real life challenging problems.
2 Regulations
2.1 Course Description
Master of Science in Computer Science and Information Security will be a flagship
programme offered by the Indian Institute of Information Technology and ManagementKerala, aims at offering a high standard curriculum in Computer Science and Information
Security. The programme focuses on a broad grasp of foundations in Computer Science and
Information Security, deep understanding of the area of specialization, an innovative ability to
solve new problems, and a capacity to learn continually and interact with trans-disciplinary
groups. The technology enhanced e-learning methodologies with web based course
management system and on-line learning system enriches the programme, allow to broaden
their horizons.
The duration of the programme is 2 years and the courses are carefully designed to
attain technical aspects that enable the students to grow into competent information
security professionals. There are 9 core courses of 3 credits each spread across the first 3
semesters accumulating 27 credits. The students are required to do a minor project of 2
credits each during the second and third semesters accumulating 4 credits, a lab of 1 or
2 credits during the first three semesters accumulating 5 credits. The students are also
required to take 1 elective course during the first semester and two elective courses
during second semester and three elective courses during the third semester of 3 credits
each accumulating 18 credits. The 4th semester is for project/internship of 18 credits.
Students are required to undergo an industry or research oriented project in any
leading IT or R &D organizations. The total requirement for the programme is 72
credits.
2.3 Eligibility
Entry-level requirement is a Bachelor's degree in any branch of Engineering/
Technology with minimum score of 60 percentage marks or CPI/CGPA of above 6.5 in
10 points, in the qualifying examination.
OR
Bachelors
Degree
in
Mathematics
qualifying examination.
2.4 Admissions
Students are selected through an All India entrance examination and an interview under the
supervision of CUSAT.. Reservation of seats for SC/ST, OBC etc. is applicable as per
CUSAT rules. The final selection of the candidates is done through an interview from the
short listed candidates of written test. The total intake of the students is 40.
Range Grade
S-Outstanding
Weightage
10
80-89
A-Excellent
70-79
60-69
50-59
Below 50%
B- Very Good
C-Good
D- Satisfactory
F-Failed
8
7
6
0
There will be a Grade W and I, where W is withheld and I is incomplete. The Performance
Index (PI) of a student over a set of credited courses c1 , ... cn is a measure of the student's
average performance over that set of courses. PI is calculated as the average grade point over
the set of credited courses weighted by the number of credits for each course.
Overall performance at the end of the semester will be indicated by Semester Performance
Index
(SPI) and is calculated as follows:
SPI = G1C1 + G2C2 + G3C3 + ..+GnCn
C1+C2+C3+...+Cn.
where G refers to the grade weightage and C refers to the credit value of corresponding
course
undergone by the student.
At the end of the final semester the Cumulative Performance Index (CPI) will also be
calculated
based on the above formula.
Each course has assigned a fixed number of credits. In addition there are 18 credits for
research and internship projects. The student should have accumulated a total of at least 72
credits. The minimum grade for attaining the degree is 6.5.
3 COURSES
The curriculum comprises of core courses, elective courses, mini projects and
internship/project. The credit requirements for the degree are summarized below.
Requirement
Core Courses
Elective Courses
Mini Projects
Internship/Project
Total Credits
Credits
27
18
04
18
72
19.
20.
21.
22.
23.
24.
ISMS2106
ISMS2107
ISMS2207
ISMS2307
3.5 Project/Internship
A student is required to do a project related to Information Security during the Semester 4,
independently under the guidance of any faculty member of the institute or as an internship
project in an industry or any reputed academic/research institute. If a student is opting for an
internship project in an industry or any other reputed academic/research institute, he is
required to have an internal guide from the institute. The project/internship aims to provide
the student an opportunity to participate and work in a major research/development activity.
Typically, the industry internship helps the student to learn about work culture, business
processes, technologies, marketing strategies, etc. At the end of the semester the student is
required to submit a report of the project/internship and give an oral presentation of the
project/internship carried out by him/her. The project report and the oral presentation will be
evaluated by both an internal committee comprising of the faculty members of the institute
including the project guide as well as an external committee constituted by the university. The
internal and external evaluation of the project report and the oral presentation carries 250
marks each. The project/internship carries 18 credits.
The projects/internship is:
1. ISMS2401 Project/Internship
Semester I
No
C.Code
Course Title
Number Theory and
Algebra
Computer Networks,
Security and Cyber
Crimes
Credits
Lect
Lab
IE
UE
Tot
ISMS2101
40
60
100
ISMS2102
40
60
100
ISMS2103
ISMS2104
ISMS2EL1
Computer Architecture
and Organization
Object Oriented
Programming in JAVA
Elective 1
40
60
100
40
60
100
40
60
100
ISMS2106
50
50
ISMS2107
50
50
18
15
300
300
600
Credits
3
3
Lect
3
3
Lab
0
0
IE
40
40
UE
60
60
Tot
100
100
40
60
100
40
60
100
Semester II
No
1
2
C.Code
ISMS2201
ISMS2202
ISMS2203
ISMS2EL2
Course Title
Cryptography
Operating Systems
Data Structures and
Algorithms
Elective 2
ISMS2EL3
Elective 3
40
60
100
ISMS2206
Mini Project 1
50
50
ISMS2207
Cryptology Lab
50
50
18
15
300
300
600
IE - Internal Examination
UE - University Examination
Semester III
No
C.Code
ISMS2301
ISMS2302
ISMS2EL4
Course Title
Database Management
Systems and Security
Information Systems
Control and Audit
Elective 4
Credits
Lect
Lab
IE
UE
Tot
40
60
100
40
60
100
40
60
100
ISMS2EL5
Elective 5
40
60
100
ISMS2EL6
Elective 6
40
60
100
ISMS2306
Mini Project 2
50
50
ISMS2307
50
50
18
15
300
300
600
Semester IV
No
C.Code
ISMS2401
5. SYLLABUS
Course Title
Project/Internship
IE
250
Marks
UE
Total
250
500
Core Courses
1.
2.
3.
4.
5.
6.
7.
8.
9.
Core Labs
1.
2.
3.
4.
Elective Courses
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
Module 4
Groups, Definitions, basic properties, and examples, Subgroups, Cosets and quotient groups,
Group homomorphisms and isomorphisms, Cyclic groups
Vector spaces, Definitions, basic properties, Linear independence and bases, dimension.
Module 5
Finite fields, The existence of finite fields, The subfield structure and uniqueness of
finite fields
References:
1. V. Shoup, A computational introduction to number theory and algebra, Cambridge
University Press, 2nd Edition, 2005.
2. Neal Koblitz,. A Course in Number Theory and Cryptography, Springer Verlag (low
price edition), 2nd Edition, 1994
3. I N Herstein, Topics in Algebra, Wiley India, 2nd Edition, 2006
4. M. Mignotte, Mathematics for computer algebra, Springer-Verlag, 1992.
5. Niven, H.S. Zuckerman and H.L. Montgomery, An introduction to the theory of
numbers, John Wiley, 5th Edition, 1991.
6. Ireland and Rosen , A Classical Introduction to Modern Number Theory, Springer
Verlag, 2nd Edition, 1990,
7. H. Cohen, A course in computational algebraic number theory, Springer-Verlag, 1st
Edition, 1993.
8. M. Artin, Algebra, Pearson; ; 2 edition (2011)
Module 5
Malwares, Computer viruses, denial of service attacks and Trojan horses, Network Crimes,
Hacking methodologies and its history, social engineering, Password Cracking, Insecure
Network connection, Malicious Code, Programming Bugs, Cyber crime and Cyber terrorism.
References
1. Doublas E. Comer, Internetworking with TCP/IP Vol.1: Principles, Protocols, and
Architecture, Prentice Hall; 5 edition (July 10, 2005)
2. Andrew Tanenbaum, Computer Networks, Prentice Hall 3rd and 4th Edition, 2003
3. William Stallings, Cryptography and Network Security Principles and Practice,
Fifth, Edition, Prentice-hall, 2010.
4. Dorothy E. Denning, Information Warfare and Security, Addison-Wesley, 1999.
5. Alberto Leon-Garcia and Indra Widjaja, Communication Networks: Fundamental
Concepts and Key Architectures, McGraw-Hill, 2 edition (May 2003)
6. Matt Bishop, Computer Security, Art and Science, Pearson Education, 2003.
7. Proctor Paul, The Practical Intrusion Detection Handbook, Third Edition, PrenticeHall, Englewood Cliffs, 2001.
8. Erbschloe Michael, Information Warfare: How To Survive Cyber Attacks, Tata
McGraw-Hill, New Delhi, 2001.
9. Bruce, Schneier, Applied Cryptography, Wiley; 2nd edition (October 18, 1996)
10. Man Young Rhee, Internet Security, Wiley , 2003.
11. C. P. Pfleeger, A. L. Pfleeger, D. N. Shah, Security in Computing, Pearson, 4th
Edition, 2006
Module 4
Pipelining: Instruction Pipeline, RISC Pipeline, Data Dependency
Module 5
Advanced Computer Architecture: Parallel Processing, Characteristics of Multiprocessors,
Interconnection Structures, Interprocessor Arbitration, Interprocessor Communication and
Synchronization, Cache Coherence, Vector/Array Processing.
References
1. John L. Hennesy, David A. Patterson Computer Organization and Design: The
Hardware / Software Interface (Third Edition), Morgan Kaufmann, 2004
2. William Stallings, Computer Organization and Architecture: Designing for
Performance (Seventh Edition), Prentice-Hall India, 2006
3. Carl Hamacher, Zvonko Vranesic and Safwat Zaky, Computer Organization (Fifth
Edition), McGraw Hill, 2002
Object Oriented Paradigm and JAVA overview: Object oriented Concepts: Introduction to
OOPS, Abstraction, Encapsulation, Objects and Classes, Constructors Inheritance,
Polymorphism, Abstract Classes, Interfaces, Introduction to Java, JVM, Primitive data types,
Control Statements, Methods, Classes Introduction to Java Compilers and Lab
Module 2
JAVA statements: Java's selection statements, iteration statements, jump statements,
Introduction to classes: Class fundamentals, declaring object reference variable, Introducing
methods, constructors, the key word, garbage collection, the finalize (), method. Methods and
Classes Overloading methods, using objects as parameters
Module 3
Java Arrays, Utilities and Packages: Java Arrays, Wrapper Classes, Java IO, Inheritance,
Super class, Polymorphism, java Packages, class libraries, Interfaces, Exception Handling,
JAVA Strings
Module 4
Multithreading and JAVA Networking: The Java thread model, the main thread, creating
thread, creating multiple thread, using is alive () and join (). Thread priorities,
synchronization, Inter thread communications, suspending resuming and stopping thread
using multithreading Networking: Networking basics, Java and the Internet Address, TCP/IP
client Sockets, URL, URL connection, TCP/IP server Sockets The Applet Class
Module 5
Java 2 Security Model, SSL, SSH, Messaging, Synchronous and Asynchronous, Java
Encryption, cryptography algorithms: secret key, public key, and hash functions. SHA
algorithms, Message Digest algorithm, Message Authentication Code, JCE-Java
Cryptography Extension, Digital Signatures.
References
1. Patrick Naughton, Helbert Schildt, "The Complete Reference JAVA 2", Tata
McGraw-Hill, fifth edition, 2002
2. C. Thomas Wu, "An Introduction to Object-Orinted Programming with java
MCGraw-Hill Science/Engineering/Math; 4 edition (January 13, 2005)
3.
4. Bruce Eckel, Chuck Allison, "Thinking in Java", Edition 4, Prentice Hall, 2006
5. Cay Horstmann, Computing Concepts With JAVA 2 Essentials, 2ND ED, Published
by Wiley-India, 2006
6. Jalil Feghhi, Peter Williams, Digital Certificates: Applied Internet Security, AddisonWesley,1998
5. ISMS2201 Cryptography
Core/Elective: Core, Semester: II, Credits: 3
Module 1
Classical Cryptography: Some Simple Cryptosystems, Shift Cipher, Substitution
Cipher,Affine Cipher, Vigenere Cipher,Hill Cipher, Permutation Cipher, Stream Ciphers.
Cryptanalysis of the AffineHill and LFSR Stream Cipher, Product Cryptosystems.
Module 2
Block Ciphers: Substitution Permutation Networks, Linear Cryptanalysis, Differential
Cryptanalysis, Data Encryption Standard (DES), Advanced Encryption Standard (AES).
Module 3
Cryptographic Hash Functions: Hash Functions and Data integrity, Security of Hash
Functions, iterated hash functions- MD5, SHA 1.
Module 4
Public Key Cryptography, RSA Crypto System, Discrete Log,, Diffie Hellman Key
Exchange, ElGamal Cryptosystem, Rabin Cryptosystem, Elliptic Curve Cryptosystem
Module 5
Signature Schemes: RSA Signature, The ElGamal Signature Scheme, The Digital Signature
Standard
Module 2
Process Synchronization: Race Conditions - The Critical-Section Problem - Mutual Exclusion
- Semaphores - Monitors. Deadlock: Deadlock Characterization - Methods for Handling
Deadlocks - Deadlock Prevention - Deadlock Avoidance - Deadlock Detection - Recovery
from Deadlock - Two Phase Locking
Module 3
Memory Management: Memory Management Functions - Memory Architecture Evolution Swapping - Multiprogramming with Partitions - Contiguous Memory Allocation - Paging Design issues for paging systems - Segmentation. Virtual Memory: Demand Paging - Page
Replacement - Allocation of Frames - Thrashing - Memory Management with bit maps,
linked lists - Buddy Systems
Module 4
File System: File Concepts - Access Methods - Directory Structure - Security and Protection
- File-System Structure - Allocation Methods - Free-Space Management Directory
Implementation - Efficiency and Performance - Disk Scheduling - Log-Structured File
System. I/O System: Principles of I/O hardware - Principles of I/O software - I/O Requests
Handling - Transforming I/O to Hardware Operations - Kernel I/O Subsystem Performance
Module 5
Distributed Systems: Design Issues - Sockets - Remote Procedure Calls - Remote Method
Invocation - Object Registration - Event Ordering - Synchronization - Mutual Exclusion Deadlock Handling Election Algorithms. Protection: Domain of Protection - Access Matrix
- Revocation of Access Rights - Language-Based Protection. Security: Authentication Program Threats - System Threats - Threat Monitoring - Encryption - Computer-Security
Classifications
References
1. Avi Silberschatz and Peter Galvin, and Greg Gagne, Applied Operating System
Concepts, WSE WILEY, 7th Edition 2007
2. Gary Nutt, Operating Systems: A Modern Perspective, Pearson Education Asia 2nd
Edition 2004
3. Andrew S. Tanenbaum Albert S.Woodhull, Operating Systems Design and
Implementation, Second Edition, 2006
Module 3
Lists and Linked List: Lists in ADT, List implementation in Stack and Queue, Linked list,
Insert, delete operations, doubly linked list, implementation, ADT and applications, INFIX
and POSTFIX evaluations.
Module 4
Recursion and Heap: Closed form, recursive form, problem solving, Fibonacci series, Towers
of Hanoi, celebrity problem (with and without recursion, Efficiency of Recursion Algorithm,
eight Queens, Heap: Introduction, max heap, min heap, representation, complexity.
Module 5
Trees, Graphs and Hashing: Binary tree, traversal in a tree, level order traversal, ADT
dictionary, dictionary implementation, balanced binary search tree, binary search tree,
extended binary tree, insertion, deletion, AVL trees, Fibonacci tree, B-tree, red black tree.
Graph: Weighted graph, spanning tree, greedy method, Krushkals algorithm, implementation,
equivalence relation, parent chasing, traversal, DFS and BFS, Hashing: open address hashing,
double hashing, chaining, Different search and sort algorithms: Bubble, quick sort, merge
sort-divide and conquer method, Heap sort.
References
1. A.D Aho, J. E. Hopcroft and J. D. Ullman, Data Structures and Algorithms, Pearson
education Asia, 1983.
2. Y. Langsam, M. J. Augenstein and A. M. Tenenbaum, Data Structures using C,
Pearson Education Asia, 2004
3. T.H. Cormen, C.E.Leiserson, R.L.Riverst and C. Stien, Introductin to algorithms,
Second Edition. MIT Press and McGraw-Hill, 2001.
4. Adam Drozdek, Data Structures and Algorithms in Java, Published by Brooks/Cole,
2nd edition 2002
Querying Data from the database, Correlated Sub-queries, Joins, Hierarchical Queries,
PL/SQL A detailed study, Introduction, PL/SQL Architecture, Types of PL/SQL programs,
Operators in PL/SQL, Datatypes in PL/SQL, Bind Variables, Cursors A detailed study,
Functions, Stored Procedures, Triggers A detailed study
Module 4
Distributed Databases: Structure and design, Distributed query processing, Recovery, Commit
protocols, Concurrency controls, Deadlock handling, Shadow paging
Module 5
Levels of Database Security: Human level, network/user interface, database application
program, database system, operating system, and physical level. Authorization of databases:
authorization, application security, SQL authorization, Multiple Access Control Policies,
Oracle virtual private database, Techniques used by hackers to exploit database flaws and
vulnerabilities, Web security vulnerabilities, Passwords in scripts, insider/outsider attacks,
Identity Management in database systems.
References
1. Abraham Silberschatz; Henry F Korth, Database System Concepts, McGraw Hill
Publication, edition 6, 2010
2. Won Kim, Introduction to Object-Oriented Databases, MIT Press, 1990
3. Elmasri,Ramez; Navathe, Shamkant B, Fundamentals of Database Systems, Addison
Wesley; 5th edition (March 17, 2006)
4. Ron Ben Vatan, Implementing Database Security & Auditing, Digital Press; 1
edition (May 2, 2005)
5. Stefano Ceri; Giuseppe Pelagatti, Distributed Databases: Principles and Systems,
Universities Press, 2000
6. Jan L Harrington, Object Oriented Database Design Clearly Explained, Harcourt,
2000
7. C. P. Pfleeger, A. L. Pfleeger, D. N. Shah, Security in Computing, Pearson, 4th
Edition, 2006
Evaluating Asset safeguarding and Data Integrity, Evaluating System Effectiveness &
Efficiency, Managing the Information Systems and Audit
Module 5
Security policies, confidentiality policies, Assurance and Trust, building secure and trusted
systems, Assurance in SDLC, Ethical issues in Computer Security
References
1. Ron Weber, Information System Audit and Control, Prentice Hall (October 29, 1998)
2. Wante, Donald A, Peter PB, Auditing EDP Systems, Prentice Hall College Div; Fac
Sub edition (February 1990)
3. Gasser, Morrie, Building a Secure Computer System, Van Nostrand Reinhold (May
1988)
4. Bruno, Paul R, Skill Enhancement for EDP, Auerbach, 1996
5. Control Objectives for Information and Related Technological Framework: Rolling
Meadows, ISACA Foundation.
2.
3.
Symmetric Ciphers
AES, Blowfish, Camellia, SEED, CAST-128, DES, IDEA, RC2, RC4, RC5, Triple
DES
Public-key cryptography
RSA, DSA, Diffie-Hellman key exchange, Elliptic curve
4.
Module 3
Random Oracles: Provable Security and asymmetric cryptography, hash functions
One-way functions: Weak and Strong one way functions
Module 4
Pseudo-random Generators (PRG): Blum-Micali-Yao Construction, Construction of more
powerful PRG, Relation between One-way functions and PRG, Pseudo-random Functions
(PRF)
Building a Pseudorandom Permutation: The Luby Rackoff Construction: Formal Definition,
Module 5
Message Authentication Codes (MACs): Formal Definition of Weak and Strong MACs,
Using a PRF as a MAC, Variable length MAC
Public Key Signature Schemes: Formal Definitions, Signing and Verification
References
1. Hans Delfs, Helmut Knebl, "Introduction to Cryptography, Principles and
Applications", Springer; 2nd edition (April 4, 2007)
2. Jonathan Katz, Yehuda Lindell, "Introduction to Modern Cryptography", Chapman
and Hall/CRC; 1 edition (August 31, 2007)
3. Wenbo Mao, "Modern Cryptography, Theory and Practice", Prentice Hall; 1 edition
(August 4, 2003)
4. Shaffi Goldwasser and Mihir Bellare, Lecture Notes on Cryptography, 2008.
5. O. Goldreich, Foundations of Cryptography, Part 1 and Part 2 , Cambridge University
Press; 1 edition (January 18, 2007)
2. ISMS2002 Cryptanalysis
Core/Elective: Elective, Semester: II/III, Credits: 3
Module 1
Problem of malleability using encryption with textbook RSA, ElGamal and the one-time pad
Some criteria for and different types of cyclic groups used in cryptography: (prime order
subgroups of the) multiplicative group of finite fields, elliptic curves.
Module 2
Linear Cryptanalysis (Matsui), Differential cryptanalysis (Biham), Hash function attacks
(Damgaard's MD4 attack, Wang's attack on MD4, MD5, SHA-1), Attack on SHA-0, Multicollision attacks (both by Joux), Time Memory trade-off (Hellman),
Module 3
Attacks against Discrete log problem (baby step giant step), Pollard's rho, index calculus,
Pohling-Hellman), Attacks against RSA, small exponent attacks (Shamir, Coppersmith),
Dixon's algorithm and the quadratic sieve for factoring integers, Pollard's p-1 method.
Module 4
Introduction to side channels, Fault attacks, Cache timing, Memory remanence; Simple Power
Analysis (SPA), Differential Power Analysis (DPA), Timing attacks; countermeasures against
side-channel attacks.
Module 5
Meet in the middle attack (against DES, Sasaki's attacks for preimage of hash functions),
Rebound attack (Rechberger, Peyrin et al), Algebraic attacks, Rectangle attack, Related key
attack, Biclique analysis, Security requirements for (password-authenticated) two-party key
establishment; Lowe's attack on the Needham-Schroeder public-key protocol
References
1. Samuel S. Wagstaff , Cryptanalysis of number theoretic ciphers, Chapman &
Hall/CRC, 2003
normal density based discriminant functions; Maximum likelihood, Gaussian case, curse of
dimensionality and principle component analysis.
Module 2
References
1. Paul Reid, Biometrics for Network Security, Pearson Education, 2004.
2. Saeed Khalid, Pejas Jerzy, Mosdorf Romuald, Biometrics, Computer Security
Systems and Artificial Intelligence Applications, 2006 XII, 348 p.
Module 4
Inference about more than two population central values, Kruskal-Wallis test, Fishers Least
significant difference, student Newman-Keuls procedure
Module 5
Categorical data, Inference about population proportions, Chi-square goodness of fit test
Linear regression and correlation estimating model parameters, regression parameters,
estimating lack of fit in linear regression, the inverse regression problem, correlation.
Reference:
1. Lyman Ott, R. Lyman Ott, Micheal Longnecker, An introduction to statistical
methods and data analysis, 6th Edn, Cengage Learning, 2008
2. R. R. Wilcox, Fundamentals of Modern Statistical Methods, Springer, New York
2001.
3. Sheldon M. Ross, Introduction To Probability And Statistics For Engineers And
Scientists (Paperback) , Academic Press (2012)
scientific computing,
Module 4
Grid Computing: Types of Computational Grids, Gid requirements of end users, application,
tool and grid developers, and system managers, Cloud Computing.
Module 5
Computing Platforms Operating Systems and Network Interfaces, Compilers, Languages
and Libraries for the Grid, Grid Scheduling, Resource Management, Resource Brokers,
Resource Reservations, Security, Accounting and Assurance
Reference:
1. J. M. Ortega, Introduction to Parallel and Vector Solution of Linear Systems,
Springer; 1 edition (April 30, 1988)
2. J. J. Dongarra, I. B. Duff, D. C. Sorensen and H. A. van der Vorst, Solving Linear
Systems on Vector and Shared Memory Computers, SIAM, 1991.
3. K. Hwang, Advanced Computer Architecture: Parallelism, Scalability,
Programmability, McGraw-Hill, 1993.
4. Foster, I., Designing and Building Parallel Programs. Addison-Wesley, 1995.
5. Hennessy, J.L. and Patterson, D.A., Computer Architecture A Quantitative Approach.
Morgan Kaufmann, 1996.
integral, table of Laplace transforms, partial fraction expansions, network transfer function, splane poles and zeros, Laplace transform of periodic functions, and application of Laplace
transformation in analyzing networks.
Module 3
z-transforms and Linear Time Invariant Systems: Introduction, definition of the z-transform,
properties of the z-transform, evaluation of the inverse z-transform, properties of a DSP
system, difference equation and its relationship with system function, impulse response and
frequency response Discrete and Fast Fourier Transforms: Discrete convolution, discrete time
Fourier transform (DTFT), fast Fourier transform (FFT), computing an inverse DFT by doing
a direct DFT, composite-radix FFT, fast convolution and correlation
Module 4
Finite Impulse Response (FIR) Filters: Introduction, magnitude response and phase response
of digital filters, frequency response of linear phase FIR filters, design techniques for FIR
filters and design of optimal linear phase FIR filters
Module 5
Infinite Impulse Response (IIR) Filters: Introduction, IIR filter design by approximation of
derivatives, IIR filter design by impulse invariant method, IIR filter design by bilinear
transformation, butterworth filters, Chebyshev filters, inverse Chebyshev filters, elliptic
filters, frequency transformation
Realization of Digital Linear Systems:
Introduction, basic realization block diagram and the signal-flow graph, basic structures for
IIR systems, basic structures for FIR systems
Reference:
1. S. Salivahanan, A. Vallvaraj and C. Gnanapriya, Digital Signal Processing, Tata
McGraw-Hill, New Delhi, 2000
2. Sanjit K. Mitra, Digital Signal Processing, 3/e, Tata McGraw-Hill, New Delhi, 2006
3. A.V. Oppenheim and R.W. Schaffer, Digital Signal Processing, Prentice hall, NJ,
1975
Module 4
Fuzzy Systems and Applications: Fuzzy sets, fuzzy reasoning, fuzzy inference systems, fuzzy
control, fuzzy clustering, applications of fuzzy systems, Neuro-Fuzzy Systems, genetic
algorithms in search and optimization
Module 5
Applications of AI and soft computing: Pattern recognitions, image processing, biological
sequence alignment and drug design, robotics and sensors, information retrieval systems,
share market analysis, natural language processing
Reference:
1. Nilson, N.J., Principles of AI, Narosa Publishing House, 1990.
2. J.S.R. Jang, C.T. Sun, E. Mizutani, Neuro-Fuzzy and Soft Computing: A
Computational Approach to Learning and Machine Intelligence, Prentice Hall, 1996.
3. Rich, E., and Knight, K., Artificial Intelligence, Tata McGraw Hill, 2nd Edition,
1992.
4. M. Friedman and A. Kandal, Introduction to Pattern Recognition Statistical,
Structural, Neural and Fuzzy Logic Approaches, World Scientific, 2005.
5. Timothy J. Ross, Fuzzy Logic with Engineering Applications, McGraw Hill, 1997.
2.
3.
4.
5.
6.
HTTP and CGI, Web Server: Introduction to the web model of computing: distribution,
protocols, user interface ad HTML, HTTP Protocol, Implementation of a simple HTTP Server
(Hello server), CGI in Python, GET and POST methods, Apache Web Server (case study),
Web.py (case study), PLT Web server
Module 2
Web Programming in Python, Scheme and Java: Templating, URL mapping, CGI
programming in Scheme, Introduction to Continuations, Continuation-based stateful web
programming in Scheme, Web applications in Java (servlets), Web applications in JSP, Using
Java Beans with JSP's
Module 3
Database connectivity and Data Abstractions Database connectivity: Python, Java, Scheme,
SQL Alchemy in Python, Hibernate in Java, Database abstraction layer in Scheme
Module 4
Communicating Web applications and RIA Screen Scraping, API for communication: REST,
web services, SOAP, DOM and XML parsing: Tidy, Xquery, RIA: CSS, Javascript, AJAX,
Mashups
Module 5
Performance, Scalability and Security Load testing: Profiling, Tools: siege web stress testing
tool, httperf, Performance tuning and Scalability, Content Caching, Client page-load
performance tuning, Replication, Load balancing, Protocols: Password Hashing, Symmetric
and asymmetric keys (PKI), Security threats: (SQL injection, Invalid inputs, buffer overflows,
cross-site scripting, thread safety, hidden fields), How to build secure applications
References
1.
2.
3.
4.
5.
Module 1
Principles and practices of Management: Organizations and the need for Management, Role
of Management theory and Management techniques, Systems approach to Management and
the Management functions, Challenges of Management.
Module 2
Organizational Behavior: Values, attitudes and the foundations of individual behavior,
Motivation: From concepts to applications, Group Behavior and working in teams, Basic
approaches to Leadership, Foundations of organization structure, Organizational culture
Business Environment: Theoretical framework of Business Environment, Significance and
the elements of economic, political and socio-cultural environment, Relevance of
international and technological environment
Module 3
Human Resource Management: Human resources planning, Group dynamics and behavior,
Job satisfaction and change management, Recruitment, Selection, Training and Development,
Job design, Job Appraisal, Job rotation and promotion policies, Marketing Management,
Nature and functions of marketing, Services Marketing, Customer Relationship Management,
Financial Management: Nature and scope of Financial Management, Overview of Financial
Statements: Balance sheets, Income Statements and Statements of cash flows.
Module 4
Strategic Management: Overview of Strategic Management, Strategic Management Process,
Formulating the strategy: Company Mission, Internal and the External analysis of the
environment, Strategic Analysis and choice: Criteria for evaluating strategic alternatives,
Strategic analysis at corporate level-BCG Matrix, SWOT Analysis, Porters Model, Project
Management: Concepts of Project Management: Categories, Project Life Cycle Phases, Tools
and techniques, Establishing and organizing systems and procedures for project
implementation, Project direction, co-ordination and control, Project Management
Performance
Module 5
Information Systems Management: Mangers view of Information Systems, Strategic uses of
Information Technology, Types and levels of Information Systems, Information Systems
Planning, System analysis and design, Business Process Re-engineering and Information
Technology, Overview of SCM, KM, ERP, E-Governance models
References
1. Harold Koontz, Heinz Weihrich, Essentials of Management, 6/e: An International
Perspective, Tata McGraw-Hill, 2004
2. Philip Kotler and K.L. Kotler, Marketing Management, 12th edition, Prentice Hall,
2006.
3. James. A.OBrien, Management Information Systems (5th edition), McGraw Hill,
2006
4. John.M.Nicholas, Project Management for Business and Technology (2nd edition)
Butterworth-Heinemann; 2 editions, 2004
5. Stephen P Robbins, Organizational Behavior (13th Edition), Prentice Hall, 2008
to Information Retrieval: Web Mining, Search Engines and Search Algorithms, Web
Applications of Languages. Web semantics, Natural Language Tool Kit (NLTK), Wordnet
References
1. Speech and Language Processing, Jurafsky, D. and J. H. Martin, Pearson Prentice
Hall.,
2 edition (May 26, 2008).
2. Foundations of Statistical Natural Language Processing, Martin Manning, C. D. and
H. Schtze, The MIT Press. 1999.
3. Natural Language Understanding, Allen J, The Benajmins/Cummings Publishing
Company Inc. 1994.
4. Natural Language Processing A Paninian Perspective, Akshar Bharati, Chaitanya
Vineet, Sangal Rajeev, Prentice Hall India. 1999.
5. Martin Rajman and Vincenzo Pallota, Speech and Language Engineering, Efpl Press,
2007
Reference
Cloud computing defined, framework for cloud computing, relevant technologies in cloud
computing, service models, cloud deployment model, key drivers to adopting the cloud, the
impact of cloud computing on users, Examples of cloud service providers, Security
management in the cloud availability management, access control, security vulnerability,
patch and configuration management, key privacy concerns in the cloud, legal and regulatory
implications.
References
1. C. S. R. Prabhu, Grid and Cluster Computing, ISBN: 8120334280, Publisher:
Prentice-hall Of India Pvt Ltd, 2008.
2. Anirban Chakrabarti, Grid Computing Security, ISBN: 978-3-540-44492-3, Springer
Berlin Heidelberg, April 2007.
3. Erdal Cayirci, Chunming Rong, Security in Wireless Ad Hoc and Sensor Networks,
ISBN: 978-0-470-02748-6, WILEY, March 2009.
4. Yang Xiao, Security in Sensor Networks, Auerbach Publications, August 2006.
5. Vu, Quang Hieu, Lupu, Mihai, Ooi, Beng Chin, Peer-to-Peer Computing Principles
and Applications, ISBN: 978-3-642-03513-5, Springer, 2010.
6. John F. Buford, Heather yu, Eng Keong lua, P2P Networking and Applications,
Morgan Kaufmann Publishers, November 2008.
7. Tim Mather, Subra kumaraswamy, hahed latif, Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance, O'reilly Media, September 2009.
Reference
1. Dorian Pyle, Data Preparation for Data Mining (The Morgan Kaufmann Series in Data
Management Systems), 1999, Morgan Kaufmann; 1 edition
2. Ian H. Witten, Eibe Frank, Mark A. Hall , Data Mining: Practical Machine Learning Tools
and
Techniques, Third Edition (The Morgan Kaufmann Series in Data Management Systems),
Morgan Kaufmann; 3 edition (January 20, 2011)
5.
6.
3. A Practical Guide to the IBM Autonomic Computing Toolkit, IBM Press, ISBN-13:
978-0738498058, 2004
4. Nancy Forbes, Imitation of Life - How Biology is inspiring computing, MIT Press,
2004
5. Joseph L. Hellerstein, Yixin Diao, Sujay Parekh, Dawn M. Tilbury, Feedback
Control of Computing Systems, John Wiley & Sons, Inc., ISBN: 9780471266372,
2004
6. Seng Loke, Context-Aware Pervasive Systems: Architectures for a New Breed of
Applications, Taylor and Francis, 2007.
7. Waltnegus Dargie, Context-Aware Computing and Self-managing Systems, CRC
Press, Taylor and Francis, 2009.
8. Proceedings of the 2005 through 2011 IEEE Conference on Autonomic Computing
(ICAC)
9. Papers from the ACM Transactions on Autonomous and Adaptive Systems (TAAS)
10. Proceedings of the IEEE Autonomous and Autonomic Systems (ICAS) Conference
Module 2
DL/ECKAS-DH1 and DL/ECKAS-DH2 (Discrete Logarithm/Elliptic Curve Key
Agreement Scheme, Diffie-Hellman version)
DL/ECKAS-MQV (Discrete Logarithm/Elliptic Curve Key Agreement Scheme,
Menezes-Qu-Vanstone version)
Module 3
Module 4
Module 5
References
1.
2.
3.
4.