961
Page views
58
Files
6
Videos
6
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
Security trends - Legal, Ethical and Professional Aspects of Security,
word
download   open file
Need for Security at Multiple levels, Security Policies
word
download   open file
Model of network security
word
download   open file
Security attacks, services and mechanisms
word
download   open file
– OSI security architecture – Classical encryption techniques: substitution techniques,
word
download   open file
transposition techniques, steganography)
word
download   open file
information theory
word
download   open file
product cryptosystem – cryptanalysis
word
download   open file
Foundations of modern cryptography: perfect security
UNIT 2:
word
download   open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures
word
download   open file
Modular arithmetic-]Euclid‘s algorithm- Congruence and matrices
word
download   open file
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES
word
download   open file
Strength of DES – Differential and linear cryptanalysis
word
download   open file
Advanced Encryption Standard - RC4 – Key distribution
word
download   open file
Evaluation criteria for AES
word
download   open file
Block cipher design principles
word
download   open file
Block cipher mode of operation
word
download   open file
Groups, Rings, Fields- Finite fields
UNIT 3:
word
download   open file
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
word
download   open file
Factorization – Euler‘s totient function
word
download   open file
Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem
word
download   open file
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
word
download   open file
ElGamal cryptosystem
word
download   open file
Diffie Hellman key exchange
word
download   open file
Elliptic curve arithmetic-Elliptic curve cryptography
word
download   open file
Key distribution – Key management
word
download   open file
Exponentiation and logarithm
UNIT 4:
word
download   open file
Authentication applications
word
download   open file
Kerberos, X.509
word
download   open file
Digital signature and authentication protocols – DSS
word
download   open file
MAC – Hash function
word
download   open file
Security of hash function and MAC – SHA
word
download   open file
Entity Authentication: Biometrics, Passwords
word
download   open file
Authentication requirement
word
download   open file
Authentication function
word
download   open file
Challenge Response protocols
UNIT 5:
word
download   open file
SYSTEM SECURITY: Intruders
word
download   open file
viruses
word
download   open file
Firewalls
word
download   open file
Web Security
word
download   open file
IP security
word
download   open file
S/MIME
word
download   open file
PGP
word
download   open file
Electronic Mail security
word
download   open file
Malicious software