-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:UNITNTEST 1 QUESTIOJN BANK, UNIT TEST-1 QUESTION BANK
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Roles of Firewalls, Firewall related terminology and Types of Firewalls
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication requirement and Authentication function , Authentication applications and Kerberos , X.509 Authentication services
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:UNIT1- PART A, UNIT1- PART B
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:1. Services, Mechanisms and attacks, OSI security architecture, Network security model and Classical Encryption techniques, Symmetric cipher model, Substitution techniques, Transposition techniques and Steganography, FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic, Finite fields, Polynomial Arithmetic,, Euclid’s algorithm, Prime numbers , Fermat’s and Euler’s theorem, Testing for primality , The Chinese remainder theorem, Discrete logarithms
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:Services, Mechanisms and attacks-the OSI security architecture, Network security model-Classical Encryption techniques (Symmetric cipher model), Substitution techniques , substitution techniques , Transposition Techniques and Stenography , FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic , Euclid’s algorithm, Finite Fields and Polynomial Arithmetic, Prime numbers-Fermat’s and Euler’s theorem- Testing for primality, Chinese Remainder Theorem-Dicrete Algorithm, Block cipher principles-block cipher modes of operation , Data Encryption Standard, Advanced Encryption Standard (AES) , TRIPLE DES and BLOWFISH, Principles of Public Key Cryptosystem , RSA Algorithm - Key management, iffie Hellman Key exchange, Elliptic Curve Arithmetic and Cryptography
-
Assignment
Assignment topic is RSA Algorithm Applications and due date is 31-08-2019.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Substitution techniques, Transposition techniques and Steganography, Euclid’s algorithm, Block cipher principles and block cipher modes of operation
-
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:cryptography and network security
-
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:cryptography and network security-Introduction
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys, privacy, Authentication of the source, Message Integrity and Non-repudiation, Pretty Good Privacy and S/MIME, IPSecurity: Overview of IPSec, IP and IPv6, Authentication Header and Encapsulation Security Payload(ESP), Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). , Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication, PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding, Secure Electronic Transaction (SET).
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IAE 1 QUESTION BANK
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Block cipher principles and block cipher modes of operation, Data Encryption Standard, Advanced Encryption Standard (AES)- Structure, Transformation Function, Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation, Triple DES and Blowfish, RC5 algorithm. , Principles of public key cryptosystems, The RSA algorithm and Key management , Diffie Hellman Key exchange, Elliptic curve arithmetic and Elliptic curve cryptography
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication requirement and Authentication function , MAC and Hash function , Security of hash function and MAC, MD5 and SHA , HMAC and CMAC , Digital signature and authentication protocols , DSS , EIgamal and Schnorr
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IAE2
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy , Authentication of the source-Message Integrity-Non- Repudiation, Pretty Good Privacy-S/MIME, IPSecurity: Overview of IPSec - IP and IPv6, Authentication Header-Encapsulation Security Payload (ESP), Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding, Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication, PKI as deployed by SSLAttacks fixed in v3- Exportability- Encoding, Secure Electronic Transaction (SET), Authentication Requirement and Function, MAC – Hash function, Security of hash function and MAC, MD5 - SHA , HMAC – CMAC, DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOL, DSS , EI Gamal – Schnorr.
-
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:Authentication applications and Kerberos , X.509 Authentication services, Roles of Firewalls, Firewall related terminology and Types of Firewalls , Firewall designs and SET for E-Commerce Transactions, Intruder and Intrusion detection system , Virus and related threats, Countermeasures, Practical implementation of cryptography and security
-
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:IAE3
-
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:Authentication applications – Kerberos, X.509 Authentication Service, Internet Firewalls for Trusted System: Roles of Firewalls- Firewall related terminology- Types of Firewalls , Firewall designs – SET for E-Commerce Transactions, Intruder and Intruder Detection System, Virus and related Threats- Countermeasures , : Firewalls design principles-Trusted systems, Practical implementation of cryptography and security