Information Security

Course ID
B.Sc. CS (Hons.)
Paper Type
DSE - 3
Lecture & Practical

Unique Paper Code: Update Awaited

The course offers a broad overview of the fundamentals of information security covering topics such as error correction/detection, cryptography, steganography, malwares, This course also touches on the implications of security in Internet of Things (IoT).

Learning Outcomes:

At the end of the course, students should be able to:

  • Identify the major types of threats to information security.
  • Select appropriate error-detection and error-correction methods for an application.
  • Discuss the strengths and weaknesses of private and public key crypto systems.
  • Describe malwares and memory exploits.
  • Describe the role of cryptography in security
  • Discuss the need for security in IoT.

Course Contents

Unit 1
Unit 2
Unit 3
Unit 4
Unit 5

Unit 1

Introduction: Security Concepts, Challenges, Security architecture, Security attacks, security services, security mechanisms.

Unit 2

Error detecting/correction: Block Codes, Generator Matrix, Parity Check Matrix, Minimum distance of a Code, Error detection and correction, Standard Array and syndrome decoding, Hamming Codes.

Unit 3

Cryptography: Encryption, Decryption, Substitution and Transposition, Confusion and diffusion, Symmetric and Asymmetric encryption, Stream and Block ciphers, DES, cryptanalysis.
Public-key cryptography, Diffie-Hellman key exchange, man-in-the-middle attack Digital signature, Steganography, Watermarking.

Unit 4

Malicious software’s: Types of malwares (viruses, worms, trojan horse, rootkits, bots), Memory exploits – Buffer overflow, Integer overflow.

Unit 5

Security in Internet-of-Things: Security implications, Mobile device security – threats and strategies.


Lab List 1

  1. Implement the error correcting code.
  2. Implement the error detecting code.
  3. Implement caeser cipher substitution operation.
  4. Implement monoalphabetic and polyalphabetic cipher substitution operation.
  5. Implement playfair cipher substitution operation.
  6. Implement hill cipher substitution operation.
  7. Implement rail fence cipher transposition operation.
  8. Implement row transposition cipher transposition operation.
  9. Implement product cipher transposition operation.
  10. Illustrate the Ciphertext only and Known plaintext attacks.

Lab List 2

  1. Implement a stream cipher technique.

Additional Information

Text Books

Pfleeger, C.P., Pfleeger,S.L., & Margulies, J. (2015). Security in Computing. 5th edition. Prentice Hall.
Lin, S. & Costello, D. J. (2004). Error Control Coding: Fundamentals and applications. 2nd edition. Pearson Education.
Stallings, W. (2018). Cryptography and network security. 7th edition. Pearson Education.

Additional Resources

Berlekamp, E. R. (1986). Algebraic Coding Theory. McGraw Hill Book Company
Stallings, W. (2018) Network security, essentials. 6th edition. Pearson Education.
Whitman M.E., & Mattord H.J. (2017). Principle of Information Security. 6th edition. Cengage Learning.

Teaching Learning Process

Use of ICT tools in conjunction with traditional class room teaching methods
Interactive sessions
Class discussions

Assessment Methods

Written tests, assignments, quizzes, presentations as announced by the instructor in the class


Security mechanisms, private and public key cryptography, malware detection, security in IoT.

Disclaimer: Details on this page are subject to change as per University of Delhi guidelines. For latest update in this regard please refer to the University of Delhi website here.