Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : Dr.Jebakumari Immanuel.D
phone  : NIL
E-mail  : jebakumarimmanuel@gmail.com
510
Page views
22
Files
1
Videos
0
R.Links

Icon
Lecture Notes

UNIT 1:
word
download   open file
Security trends - Legal, Ethical and Professional Aspects of Security
word
download   open file
Need for Security at Multiple levels, Security Policies -Model of network security
word
download   open file
Security attacks, services and mechanisms -OSI security architecture
word
download   open file
Classical encryption techniques: substitution techniques-01
word
download   open file
Classical encryption techniques: substitution techniques-02
word
download   open file
Transposition techniques, steganography
word
download   open file
Foundations of modern cryptography
word
download   open file
perfect security – information theory - product cryptosystem
UNIT 2:
word
download   open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
word
download   open file
Euclid‟s algorithm- Congruence and matrices
word
download   open file
Groups, Rings, Fields- Finite fields
word
download   open file
SYMMETRIC KEY CIPHERS: SDES
word
download   open file
Evaluation criteria for AES – Advanced Encryption Standard
word
download   open file
RC4 – Key distribution.
word
download   open file
Differential and linear cryptanalysis
word
download   open file
Block cipher design principles – Block cipher mode of operation
UNIT 3:
word
download   open file
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
word
download   open file
Factorization – Euler’s totient function
word
download   open file
Fermat’s and Euler’s Theorem
word
download   open file
Chinese Remainder Theorem – Exponentiation and logarithm
word
download   open file
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
word
download   open file
Diffie Hellman key exchange