
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:
UNITNTEST 1 QUESTIOJN BANK,
UNIT TEST1 QUESTION BANK 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Roles of Firewalls, Firewall related terminology and Types of Firewalls 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Authentication requirement and Authentication function ,
Authentication applications and Kerberos ,
X.509 Authentication services 
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:
UNIT1 PART A,
UNIT1 PART B 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
1. Services, Mechanisms and attacks, OSI security architecture,
Network security model and Classical Encryption techniques, Symmetric cipher model,
Substitution techniques,
Transposition techniques and Steganography,
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic,
Finite fields, Polynomial Arithmetic,,
Euclid’s algorithm,
Prime numbers , Fermat’s and Euler’s theorem, Testing for primality ,
The Chinese remainder theorem, Discrete logarithms 
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:
Services, Mechanisms and attacksthe OSI security architecture,
Network security modelClassical Encryption techniques (Symmetric cipher model),
Substitution techniques ,
substitution techniques ,
Transposition Techniques and Stenography ,
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, FieldsModular arithmetic ,
Euclid’s algorithm,
Finite Fields and Polynomial Arithmetic,
Prime numbersFermat’s and Euler’s theorem Testing for primality,
Chinese Remainder TheoremDicrete Algorithm,
Block cipher principlesblock cipher modes of operation ,
Data Encryption Standard,
Advanced Encryption Standard (AES) ,
TRIPLE DES and BLOWFISH,
Principles of Public Key Cryptosystem ,
RSA Algorithm  Key management,
iffie Hellman Key exchange,
Elliptic Curve Arithmetic and Cryptography 
Assignment
Assignment topic is RSA Algorithm Applications and due date is 31082019.

Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Substitution techniques,
Transposition techniques and Steganography,
Euclid’s algorithm,
Block cipher principles and block cipher modes of operation 
Resource Link
Dear Students the Resource Link has been uploaded for the following topics:
cryptography and network security 
Youtube Video
Dear Students the Youtube Video has been uploaded for the following topics:
cryptography and network securityIntroduction 
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:
IAE 1 QUESTION BANK 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Block cipher principles and block cipher modes of operation,
Data Encryption Standard,
Advanced Encryption Standard (AES) Structure, Transformation Function,
Advanced Encryption Standard (AES) Key Expansion, Example, Implementation,
Triple DES and Blowfish,
RC5 algorithm. ,
Principles of public key cryptosystems,
The RSA algorithm and Key management ,
Diffie Hellman Key exchange,
Elliptic curve arithmetic and Elliptic curve cryptography 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Authentication requirement and Authentication function ,
MAC and Hash function ,
Security of hash function and MAC,
MD5 and SHA ,
HMAC and CMAC ,
Digital signature and authentication protocols ,
DSS ,
EIgamal and Schnorr 
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:
IAE2 
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:
Email Security: Security Services for Emailattacks possible through Email  establishing keys privacy ,
Authentication of the sourceMessage IntegrityNon Repudiation,
Pretty Good PrivacyS/MIME,
IPSecurity: Overview of IPSec  IP and IPv6,
Authentication HeaderEncapsulation Security Payload (ESP),
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding,
Web Security: SSL/TLS Basic Protocolcomputing the keys client authentication,
PKI as deployed by SSLAttacks fixed in v3 Exportability Encoding,
Secure Electronic Transaction (SET),
Authentication Requirement and Function,
MAC – Hash function,
Security of hash function and MAC,
MD5  SHA ,
HMAC – CMAC,
DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOL,
DSS ,
EI Gamal – Schnorr. 
Lecture Notes
Dear Students the Lecture Notes has been uploaded for the following topics:
Authentication applications and Kerberos ,
X.509 Authentication services,
Roles of Firewalls, Firewall related terminology and Types of Firewalls ,
Firewall designs and SET for ECommerce Transactions,
Intruder and Intrusion detection system ,
Virus and related threats, Countermeasures,
Practical implementation of cryptography and security 
Question Bank
Dear Students the Question Bank has been uploaded for the following topics:
IAE3 
Puzzles
Dear Students the Puzzles has been uploaded for the following topics:
Authentication applications – Kerberos,
X.509 Authentication Service,
Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology Types of Firewalls ,
Firewall designs – SET for ECommerce Transactions,
Intruder and Intruder Detection System,
Virus and related Threats Countermeasures ,
: Firewalls design principlesTrusted systems,
Practical implementation of cryptography and security