2023 2024 Student Forum > Management Forum > Main Forum

 
  #2  
6th June 2018, 10:58 AM
Unregistered
Guest
 
Re: Cryptography and Network Security Syllabus Anna University

My brother is in 8th Semester of B.E ECE Course of Anna University Chennai. He needs syllabus of ‘Cryptography and Network Security subject. So do you know how he can download syllabus of ‘Cryptography and Network Security Subject of 8th Semester of B.E ECE Course of Anna University?
  #3  
6th June 2018, 10:59 AM
Super Moderator
 
Join Date: Aug 2012
Re: Cryptography and Network Security Syllabus Anna University

As you are looking for syllabus of Cryptography and Network Security Subject of 8th Semester of B.E ECE Course of Anna University, so I am providing complete syllabus:

Anna University B.E ECE 8th Semester ‘Cryptography and Network Security Syllabus:

UNIT I INTRODUCTION & NUMBER THEORY
Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic Prime numbers-Fermats and Euler‟s theorem-Testing for primality -The Chinese remainder theorem- Discrete logarithms.

UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY
Data Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management - Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement Authentication function MAC Hash function Security of hash function and MAC MD5 - SHA - HMAC CMAC - Digital signature and authentication protocols DSS EI Gamal Schnorr.

UNIT IV SECURITY PRACTICE & SYSTEM SECURITY
Authentication applications Kerberos X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. Intruder Intrusion detection system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementation of cryptography and security.

UNIT V E-MAIL, IP & WEB SECURITY
E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good Privacy-S/MIME. IP Security: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed by SSL Attacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).


Quick Reply
Your Username: Click here to log in

Message:
Options




All times are GMT +5. The time now is 02:01 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2

1 2 3 4