Subject Details
Dept     : CSE
Sem      : 7
Regul    : 2013
Faculty : Dr.Jebakumari Immanuel.D
phone  : NIL
E-mail  : jebakumarimmanuel@gmail.com
672
Page views
98
Files
1
Videos
1
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
1. Services, Mechanisms and attacks, OSI security architecture
word
download   open file
Network security model and Classical Encryption techniques, Symmetric cipher model
word
download   open file
Substitution techniques
word
download   open file
Substitution techniques
word
download   open file
Transposition techniques and Steganography
word
download   open file
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic
word
download   open file
Finite fields, Polynomial Arithmetic,
word
download   open file
Euclid’s algorithm
word
download   open file
Prime numbers , Fermat’s and Euler’s theorem, Testing for primality
word
download   open file
The Chinese remainder theorem, Discrete logarithms
UNIT 2:
word
download   open file
Block cipher principles and block cipher modes of operation
word
download   open file
Data Encryption Standard
word
download   open file
Advanced Encryption Standard (AES)- Structure, Transformation Function
word
download   open file
Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation
word
download   open file
Triple DES and Blowfish
word
download   open file
RC5 algorithm.
word
download   open file
Principles of public key cryptosystems
word
download   open file
The RSA algorithm and Key management
word
download   open file
Diffie Hellman Key exchange
word
download   open file
Elliptic curve arithmetic and Elliptic curve cryptography
UNIT 3:
word
download   open file
Authentication requirement and Authentication function
word
download   open file
MAC and Hash function
word
download   open file
Security of hash function and MAC
word
download   open file
MD5 and SHA
word
download   open file
HMAC and CMAC
word
download   open file
Digital signature and authentication protocols
word
download   open file
DSS
word
download   open file
EIgamal and Schnorr
word
download   open file
Authentication requirement and Authentication function
UNIT 4:
word
download   open file
Roles of Firewalls, Firewall related terminology and Types of Firewalls
word
download   open file
X.509 Authentication services
word
download   open file
Authentication applications and Kerberos
word
download   open file
Firewall designs and SET for E-Commerce Transactions
word
download   open file
Intruder and Intrusion detection system
word
download   open file
Virus and related threats, Countermeasures
word
download   open file
Practical implementation of cryptography and security
UNIT 5:
word
download   open file
E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys, privacy
word
download   open file
Authentication of the source, Message Integrity and Non-repudiation
word
download   open file
Pretty Good Privacy and S/MIME
word
download   open file
IPSecurity: Overview of IPSec, IP and IPv6
word
download   open file
Authentication Header and Encapsulation Security Payload(ESP)
word
download   open file
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
word
download   open file
Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication
word
download   open file
PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding
word
download   open file
Secure Electronic Transaction (SET).