Subject Details
Dept     : CSE
Sem      : 7
Regul    : 2013
Faculty : Mr.Jebakumar Immanuel.D
phone  : 9999999999
E-mail  : jebakumarimmanuel@gmail.com
221
Page views
89
Files
1
Videos
1
R.Links

Icon
Announcements

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    UNITNTEST 1 QUESTIOJN BANK,
    UNIT TEST-1 QUESTION BANK

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Roles of Firewalls, Firewall related terminology and Types of Firewalls

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Authentication requirement and Authentication function ,
    Authentication applications and Kerberos ,
    X.509 Authentication services

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    UNIT1- PART A,
    UNIT1- PART B

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    1. Services, Mechanisms and attacks, OSI security architecture,
    Network security model and Classical Encryption techniques, Symmetric cipher model,
    Substitution techniques,
    Transposition techniques and Steganography,
    FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic,
    Finite fields, Polynomial Arithmetic,,
    Euclid’s algorithm,
    Prime numbers , Fermat’s and Euler’s theorem, Testing for primality ,
    The Chinese remainder theorem, Discrete logarithms

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:
    Services, Mechanisms and attacks-the OSI security architecture,
    Network security model-Classical Encryption techniques (Symmetric cipher model),
    Substitution techniques ,
    substitution techniques ,
    Transposition Techniques and Stenography ,
    FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic ,
    Euclid’s algorithm,
    Finite Fields and Polynomial Arithmetic,
    Prime numbers-Fermat’s and Euler’s theorem- Testing for primality,
    Chinese Remainder Theorem-Dicrete Algorithm,
    Block cipher principles-block cipher modes of operation ,
    Data Encryption Standard,
    Advanced Encryption Standard (AES) ,
    TRIPLE DES and BLOWFISH,
    Principles of Public Key Cryptosystem ,
    RSA Algorithm - Key management,
    iffie Hellman Key exchange,
    Elliptic Curve Arithmetic and Cryptography

  • Assignment

    Assignment topic is RSA Algorithm Applications and due date is 31-08-2019.

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Substitution techniques,
    Transposition techniques and Steganography,
    Euclid’s algorithm,
    Block cipher principles and block cipher modes of operation

  • Resource Link

    Dear Students the Resource Link has been uploaded for the following topics:
    cryptography and network security

  • Youtube Video

    Dear Students the Youtube Video has been uploaded for the following topics:
    cryptography and network security-Introduction

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    IAE 1 QUESTION BANK

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Block cipher principles and block cipher modes of operation,
    Data Encryption Standard,
    Advanced Encryption Standard (AES)- Structure, Transformation Function,
    Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation,
    Triple DES and Blowfish,
    RC5 algorithm. ,
    Principles of public key cryptosystems,
    The RSA algorithm and Key management ,
    Diffie Hellman Key exchange,
    Elliptic curve arithmetic and Elliptic curve cryptography

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Authentication requirement and Authentication function ,
    MAC and Hash function ,
    Security of hash function and MAC,
    MD5 and SHA ,
    HMAC and CMAC ,
    Digital signature and authentication protocols ,
    DSS ,
    EIgamal and Schnorr

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    IAE2

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:
    E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy ,
    Authentication of the source-Message Integrity-Non- Repudiation,
    Pretty Good Privacy-S/MIME,
    IPSecurity: Overview of IPSec - IP and IPv6,
    Authentication Header-Encapsulation Security Payload (ESP),
    Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding,
    Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication,
    PKI as deployed by SSLAttacks fixed in v3- Exportability- Encoding,
    Secure Electronic Transaction (SET),
    Authentication Requirement and Function,
    MAC – Hash function,
    Security of hash function and MAC,
    MD5 - SHA ,
    HMAC – CMAC,
    DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOL,
    DSS ,
    EI Gamal – Schnorr.

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Authentication applications and Kerberos ,
    X.509 Authentication services,
    Roles of Firewalls, Firewall related terminology and Types of Firewalls ,
    Firewall designs and SET for E-Commerce Transactions,
    Intruder and Intrusion detection system ,
    Virus and related threats, Countermeasures,
    Practical implementation of cryptography and security

  • Question Bank

    Dear Students the Question Bank has been uploaded for the following topics:
    IAE3

  • Puzzles

    Dear Students the Puzzles has been uploaded for the following topics:
    Authentication applications – Kerberos,
    X.509 Authentication Service,
    Internet Firewalls for Trusted System: Roles of Firewalls- Firewall related terminology- Types of Firewalls ,
    Firewall designs – SET for E-Commerce Transactions,
    Intruder and Intruder Detection System,
    Virus and related Threats- Countermeasures ,
    : Firewalls design principles-Trusted systems,
    Practical implementation of cryptography and security