Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : Dr.Jebakumari Immanuel.D
phone  : NIL
E-mail  : jebakumarimmanuel@gmail.com
514
Page views
38
Files
0
Videos
0
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
Introduction to cryptography
word
download   open file
Security trends. Legal, Ethical and Professional Aspects of Security
word
download   open file
Need for Security at Multiple levels, Security Policies - Model of network security
word
download   open file
Security attacks, services and mechanisms – OSI security architecture
word
download   open file
Classical encryptions techniques: substitution techniques-01
word
download   open file
Classical encryptions techniques: substitution techniques-02
word
download   open file
Transposition Techniques and Steganography
word
download   open file
Foundations of Modern Cryptography-Cryptanalysis
word
download   open file
Perfect security – Information theory – Product cryptosystem Industry/Tech : Fin Tech & AI / ML Data Analytics
UNIT 2:
word
download   open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures- Groups, Rings, Fields
word
download   open file
Modular arithmetic-Euclid’s algorithm
word
download   open file
Congruence and matrices
word
download   open file
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES
word
download   open file
Differential and linear cryptanalysis
word
download   open file
Block cipher design principles – Block cipher mode of operation
word
download   open file
Evaluation criteria for AES – Advanced Encryption Standard-01
word
download   open file
Evaluation criteria for AES – Advanced Encryption Standard-02
word
download   open file
RC4 – Key distribution
UNIT 3:
word
download   open file
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
word
download   open file
Factorization
word
download   open file
Euler’s totient function, Fermat’s and Euler’s Theorem
word
download   open file
Chinese Remainder Theorem
word
download   open file
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
word
download   open file
Key distribution – Key management
word
download   open file
Diffie Hellman key exchange
UNIT 4:
word
download   open file
Authentication requirement – Authentication function
word
download   open file
MAC – Hash function
word
download   open file
Security of hash function and MAC
word
download   open file
SHA
word
download   open file
Digital signature and authentication protocols
word
download   open file
Digital Signature Standard (DSS)
word
download   open file
Entity Authentication: Biometrics, Passwords
word
download   open file
Challenge Response protocols
UNIT 5:
word
download   open file
Security: Architecture, Authentication header
word
download   open file
Encapsulating security payloads, combining security associations, key management
word
download   open file
Web Security: Secure socket layer
word
download   open file
System Security: Intruders
word
download   open file
firewall design principals