Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : Dr.Jebakumari Immanuel.D
phone  : NIL
E-mail  : jebakumarimmanuel@gmail.com
513
Page views
38
Files
0
Videos
0
R.Links

Icon
Announcements

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Authentication requirement – Authentication function,
    MAC – Hash function,
    Security of hash function and MAC,
    SHA,
    Digital signature and authentication protocols,
    Digital Signature Standard (DSS),
    Entity Authentication: Biometrics, Passwords,
    Challenge Response protocols,
    Security: Architecture, Authentication header,
    Encapsulating security payloads, combining security associations, key management,
    Web Security: Secure socket layer ,
    System Security: Intruders,
    firewall design principals

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures- Groups, Rings, Fields,
    Modular arithmetic-Euclid’s algorithm,
    Congruence and matrices,
    SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES,
    Differential and linear cryptanalysis,
    Block cipher design principles – Block cipher mode of operation,
    Evaluation criteria for AES – Advanced Encryption Standard-01,
    Evaluation criteria for AES – Advanced Encryption Standard-02,
    RC4 – Key distribution,
    MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing,
    Factorization,
    Euler’s totient function, Fermat’s and Euler’s Theorem,
    Chinese Remainder Theorem,
    ASYMMETRIC KEY CIPHERS: RSA cryptosystem,
    Key distribution – Key management,
    Diffie Hellman key exchange

  • Lecture Notes

    Dear Students the Lecture Notes has been uploaded for the following topics:
    Introduction to cryptography,
    Security trends. Legal, Ethical and Professional Aspects of Security,
    Need for Security at Multiple levels, Security Policies - Model of network security,
    Security attacks, services and mechanisms – OSI security architecture,
    Classical encryptions techniques: substitution techniques-01,
    Classical encryptions techniques: substitution techniques-02,
    Transposition Techniques and Steganography,
    Foundations of Modern Cryptography-Cryptanalysis,
    Perfect security – Information theory – Product cryptosystem Industry/Tech : Fin Tech & AI / ML Data Analytics