Subject Details
Dept     : IT
Sem      : 6
Regul    : 19
Faculty : Ms. A Catherine Esther Karunya
phone  : NIL
E-mail  : catherine.a.aiml@snsct.org
297
Page views
45
Files
0
Videos
1
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
Computer Security Concepts
word
download   open file
The OSI Security Architecture
word
download   open file
3 Security Attacks - A Model for Network Security
word
download   open file
4 Symmetric Cipher Model
word
download   open file
Substitution Techniques - Transposition Techniques
word
download   open file
Block Cipher Principles - Data Encryption Standard (DES)- Example
word
download   open file
Multiple Encryption and Triple DES
word
download   open file
Stream Ciphers - RC4
UNIT 2:
word
download   open file
Principles of Pseudorandom Number Generation
word
download   open file
Pseudorandom Number Generators -Divisibility and the Division Algorithm
word
download   open file
The Euclidean Algorithm - Modular Arithmetic
word
download   open file
Public Key crptosystems
word
download   open file
The RSA Algorithm
word
download   open file
Diffie Hellman Key Exchange
word
download   open file
Public Key crptosystems
word
download   open file
ElGamal Cryptosystem
word
download   open file
The Chinese Remainder Theorem - Principles of Public Key Cryptosystem
UNIT 3:
word
download   open file
Cryptographic Hash Functions
word
download   open file
Two Simple Hash Functions Requirements and Security
word
download   open file
Two Simple Hash Functions Requirements and Security
word
download   open file
Hash Functions Based on Cipher Block Chaining
word
download   open file
Secure Hash Algorithm (SHA) - Message Authentication Codes
word
download   open file
Message Authentication Requirements - Message Authentication Code
word
download   open file
Security of MACs - MACs Based on Hash Functions (HMAC)
word
download   open file
Digital Signatures - ElGamal Digital Signature Scheme
word
download   open file
Digital Signatures - ElGamal Digital Signature Scheme
word
download   open file
Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)
word
download   open file
Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)
UNIT 4:
word
download   open file
Symmetric Key Distribution Using Asymmetric Encryption
word
download   open file
Distribution of Public Keys - X.509 Certificates
word
download   open file
Key Management And Distribution
word
download   open file
Email Security Pretty Good Privacy (PGP) - S/MIME
word
download   open file
Email Security Pretty Good Privacy (PGP) - S/MIME
UNIT 5:
word
download   open file
Web Security Issues - Secure Sockets Layer (SSL)
word
download   open file
Transport Layer Security (TLS)
word
download   open file
IP Security Overview - Policy
word
download   open file
Encapsulating Security Payload
word
download   open file
Intruders-Intrusion Detection - Malicious Software
word
download   open file
Viruses – Worms – Kerberos
word
download   open file
Viruses – Worms – Kerberos
word
download   open file
Viruses – Worms – Kerberos
word
download   open file
Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations