Subject Details
Dept     : CSE
Sem      : 7
Regul    : 2013
Faculty : Dr.Jebakumari Immanuel.D
phone  : NIL
E-mail  : jebakumarimmanuel@gmail.com
674
Page views
98
Files
1
Videos
1
R.Links

Icon
Puzzles

UNIT 1:
word
download   open file
Services, Mechanisms and attacks-the OSI security architecture
word
download   open file
Network security model-Classical Encryption techniques (Symmetric cipher model)
word
download   open file
Substitution techniques
word
download   open file
substitution techniques
word
download   open file
Transposition Techniques and Stenography
word
download   open file
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic
word
download   open file
Euclid’s algorithm
word
download   open file
Finite Fields and Polynomial Arithmetic
word
download   open file
Prime numbers-Fermat’s and Euler’s theorem- Testing for primality
word
download   open file
Chinese Remainder Theorem-Dicrete Algorithm
UNIT 2:
word
download   open file
Block cipher principles-block cipher modes of operation
word
download   open file
Data Encryption Standard
word
download   open file
Advanced Encryption Standard (AES)
word
download   open file
Advanced Encryption Standard (AES)
word
download   open file
TRIPLE DES and BLOWFISH
word
download   open file
TRIPLE DES and BLOWFISH
word
download   open file
Principles of Public Key Cryptosystem
word
download   open file
RSA Algorithm - Key management
word
download   open file
iffie Hellman Key exchange
word
download   open file
Elliptic Curve Arithmetic and Cryptography
UNIT 3:
word
download   open file
Authentication Requirement and Function
word
download   open file
MAC – Hash function
word
download   open file
Security of hash function and MAC
word
download   open file
MD5 - SHA
word
download   open file
HMAC – CMAC
word
download   open file
DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOL
word
download   open file
DSS
word
download   open file
EI Gamal – Schnorr.
UNIT 4:
word
download   open file
Authentication applications – Kerberos
word
download   open file
X.509 Authentication Service
word
download   open file
Internet Firewalls for Trusted System: Roles of Firewalls- Firewall related terminology- Types of Firewalls
word
download   open file
Firewall designs – SET for E-Commerce Transactions
word
download   open file
Intruder and Intruder Detection System
word
download   open file
Virus and related Threats- Countermeasures
word
download   open file
: Firewalls design principles-Trusted systems
word
download   open file
Practical implementation of cryptography and security
UNIT 5:
word
download   open file
E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy
word
download   open file
Authentication of the source-Message Integrity-Non- Repudiation
word
download   open file
Pretty Good Privacy-S/MIME
word
download   open file
IPSecurity: Overview of IPSec - IP and IPv6
word
download   open file
Authentication Header-Encapsulation Security Payload (ESP)
word
download   open file
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding
word
download   open file
Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication
word
download   open file
PKI as deployed by SSLAttacks fixed in v3- Exportability- Encoding
word
download   open file
Secure Electronic Transaction (SET)