Schedule

Venue for Lectures: Chandrasekhar Hall
Venue for Project work: First floor lounge, Guest House






1st week (May 15-19)

Monday
Tuesday
Wednesday
Thursday
Friday
9:30-11
Cr L1: R. Balasubramanian Cr L4: C. Pandu Rangan Cr L5: Meena Mahajan Cr L9: V. Arvind Cr L7: Meena Mahajan
11-11:30
TEA/COFFEE
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
11:30-1
Cr L2: C. Pandu Rangan SS L1: K. Gopinath SS L3: R. Ramanujam Cr L8: Venkatesh Raman Cr L9: V. Arvind
1-2
LUNCH
LUNCH LUNCH LUNCH LUNCH
2-3
Cr T1: V. Arvind Cr T2: V. Arvind SS T1: Kapil Paranjape Cr T3: V. Arvind SS L3: R. Ramanujam
3-3:30
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
3:30-5
Cr L3: C. Pandu Rangan SS L2: Kapil Paranjape Cr L6: Venkatesh Raman SS L4: Kapil Paranjape SS L5: Kapil Paranjape






2nd week (May 22-26)

Monday
Tuesday
Wednesday
Thursday
Friday
9:30-11
SS L6: Prakash Chandrasekaran SP L3: S. P. Suresh SS L9: Prakash Chandrasekaran SP L6: Deepak D'Souza SS L12: Prakash Chandrasekaran
11-11:30
TEA/COFFEE
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
11:30-1
SP L1: R. Ramanujam SS L7: Prakash Chandrasekaran SP L4: R. Ramanujam SS L10: Prakash Chandrasekaran SP L7: Deepak D'Souza
1-2
LUNCH
LUNCH LUNCH LUNCH LUNCH
2-3
SS T3: Kapil Paranjape SP T1: Kamal Lodaya SS T4: Prakash Chandrasekharan SP T2: Deepak D'Souza SS T5: Kapil Paranjape
3-3:30
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
3:30-5
SP L2: S. P. Suresh SS L8: S. P. Suresh SP L5: Kapil Paranjape SS L11: Kapil Paranjape SP L8: A. Baskar


















3rd week (May 29 - June 2)

Monday
Tuesday
Wednesday
Thursday
Friday
9:30-11
SL L1: G. Sivakumar SP L10: Bernard Menezes SP L11: Bernard Menezes Cr L11: C. R. Subramanian Cr L12: C. R. Subramanian
11-11:30
TEA/COFFEE
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
11:30-1
SP L9: Bernard Menezes SL L3: G. Sivakumar SL L4: Prasad Naldurg SL L5: Prasad Naldurg SP L12: Ranjani Parthasarathi
1-2
LUNCH
LUNCH LUNCH LUNCH LUNCH
2-3
SP T3: S. P. Suresh SP T4: S. P. Suresh SP T5: S. P. Suresh PL1: Priya Chandran PW: Project Work
3-3:30
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
3:30-5
SL L2: G. Sivakumar PW: Project Work PW: Project Work PL2: Vijay Laxmi PL3: B. Majhi; Kiran Thandira






4th week (Jun 5-9)

Monday
Tuesday
Wednesday
Thursday
Friday
9:30-11
SL L6: Srinivas Guntupalli SL L8: Saratchandra Babu / Jagatguru Mishra SL L9: Bimal Roy SL L11: Soma Mitra SL L12: R. Balasubramanian
11-11:30
TEA/COFFEE
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE
11:30-1
SL L7: K. Srinivas PP 1: Project Presentations PP 2: Project Presentations PP 4: Project Presentations Concluding Session
1-2
LUNCH
LUNCH LUNCH LUNCH LUNCH
2-3
PL4: Santhi Thilagam PW: Project Work SL L10: Bimal Roy PP 5: Project Presentations ***
3-3:30
TEA/COFFEE TEA/COFFEE TEA/COFFEE TEA/COFFEE ***
3:30-5
SS: N. D. Haridass SS: Kabru Demo PP 3: Project Presentations Discussion on Curriculum ***














Courses

  • Cryptography

    L1 R. Balasubramanian An overview of Cryptology
    L2-L4 C. Pandurangan Perfect security, provable security of PKCS, topics in RSA, El Gamal,
    Micali Goldwasser systems and the proofs related to them.
    L5, L7 Meena Mahajan Block ciphers
    L6, L8 Venkatesh Raman Cryptographic hash functions
    L9-L10 V. Arvind Digital signatures
    L11-L12 C. R. Subramanian Private-key encryption
    T1-T5 Tutorials





  • Systems and Application Security

    L1 K. Gopinath Why application security is hard
    L2 Kapil Paranjape Authentication
    L3 R. Ramanujam Access control policies
    L4 Kapil Paranjape Mail security, PGP
    L5 Kapil Paranjape Data(base) security
    L6 Prakash Chandrasekaran File system security
    L7 Prakash Chandrasekaran Program security
    L8 Prakash Chandrasekaran Memory security
    L9 Kapil Paranjape Session security, SSH
    L10 Prakash Chandrasekaran Web security
    L11 Prakash Chandrasekaran Web applications security
    L12 Kapil Paranjape Sandboxing
    T1-T5 Tutorials





  • Security Protocols

    L1 R. Ramanujam Security properties, attacks
    L2 S. P. Suresh Design of a security protocol
    L3-L4 S. P. Suresh Examples of security protocols
    L5 R. Ramanujam Contract signing protocols
    L6-L7 Deepak D'Souza Formal models of protocols and detecting leaks
    L8 A. Baskar Electronic voting protocols
    L9-11 Bernard Menezes IPSec, worms and viruses, micropayments, smart card security
    L12 Ranjani Parthasarathi Security of wired / wireless networks
    T1-T5 Tutorials





  • Special Lectures

    L1 G. Sivakumar Key Management in Group Communication Systems
    L2 G. Sivakumar Security Architecture of IIT Bombay's Network
    L3 G. Sivakumar Group Communication (ctd.) and IIT-B firewa11 (ctd.)
    L4 Prasad Naldurg Router security
    L5 Prasad Naldurg Denial of service and side-channel attacks
    L6 Srinivas Guntupalli Intrusion Detection Systems
    L7 K. Srinivas Quadratic Sieve
    L8 Saratchandra Babu / Jagatguru Mishra End System Security Framework
    L9-L10 Bimal Roy Stream ciphers
    L11 Soma Mitra Steganography and steganalysis
    L12 R. Balasubramanian Checking primality
    SS N. D. Haridass An introduction to Kabru

  • Project work

  • Participants' Lectures

    L1 Priya Chandran Processor based security
    L2 Vijay Laxmi Biometrics based security
    L3.1 B. Majhi Password based authentication
    L3.2 Kiran Kumar Thandira Software engineering issues
    L4 Santhi Thilagam Visual cryptography

  • Project presentations

    PP1.1 Anup Bhatkar Checking primality
    PP1.2 Subhabati Devi, Kamlesh Dutta Analysis of block ciphers
    PP2.1 Madhuri Pimple, Vijay Laxmi E-voting based on homomorphic encryption
    PP2.2 Deepak Kshirsagar, Pranay Rahi, Ch Sudhakar E-voting based on blind signature
    PP2.3 Hari Om, Anurag G Rao, Venkaiah Wireless security
    PP3 Nava Khargharia, Jagatguru Mishra, S. M. Rizvi Information security management system for IMSc
    PP4.1 Anupam Chanda, Mukesh Zaveri SSH tunnelling
    PP4.2 Marut Chaudhary, Jaydeep Howlader, Siv Chand Koripella, Kiran Thandira Radius and Diameter authentication mechanisms
    PP4.3 Santhi Thilagam, Sridhar, Zayaraj Anomaly based intrusion detection
    PP5.1 Sandeep Harit, Vinayak Jagtap, Puneet Jindal Public key infrastructure: a Certifying Authority for IMSc
    PP5.2 Prabhat Kumar, B. Majhi, Ravi Shinde, Nagraj Vernekar E-mail insecurity
    PP5.3 Priya Chandran Verification of bounded security protocols

  • Open discussion on security course curriculum

  • Feedback and concluding remarks