We have move to Online Virtual Tutor (www.onlinevirtualtutor.com)

Ads

EC2035 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS

To Download 7th sem ->EC2035 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS CLICK HERE
UNIT I INTRODUCTION
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION
Authentication requirements – Authentication functions – Message Authentication Codes
– Hash Functions – Security of Hash Functions and MACs – MD5 message Digest
51
algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems.

TEXT BOOKS
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
2. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007
REFERENCES
1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003
3. Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with
coding theory” , Pearson Education, 2007.
4. Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education ,2007
5. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning,2006.
6. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
*Note :- All the Content Provided on VIRTUAL-TUTOR are just the reference for Educational Purpose.