UNIT-I
Classical Encryption Techniques:
Symantec Cipher model, substitution Techniques, tranposition techniques,
rotor machines, steganography.Block Ciphers and the Data Encyption standards:
Simplified DES, block cipher principles, the data encryption standard, the
strength of DES, differential and linear cryptanalysis, block cipher design
principles, block cipher modes of
operation.Advanced Encryption Standard: Evaluation Criteria for AES, the AES
cipher.Contemporary symmetric ciphers: Triple DES, blowfish.
Confidentiality using symmetric
encryption: Placement of Encryption function, traffic confidentiality,
key distribution, and random number generation.
UNIT-II
Public key Encryption and Hash
functions : Prime numbers, Fermat’s and Euler’s Theorems, testing
for primality, the chinese remainder theorem, discrete logarithms.
Public key cryptography and RSA:
Principles of Public key cryptosystems, the RSA algorithm.
Key Management other public key
cryptosystems: Key management, diffie-Hallman key exchange,elliptic curve
arithmetic, and elliptic curve cryptography.
UNIT-III
Message authentication and Hash
function : Authentication Requirements, Authentication functions,message
authentication codes, hash functions, security of hash function and MACs.
Hash Algorithms: MD5 message digest
algorithm, secure Hash algorithm, ripemd-160, HMAC.
Digital Signature and Authentication
protocols: Digital signatures, Authentication protocols, and
digital signature standard.
Authentication Applications:
Kerberos, X.509 Authentication service.
UNIT-IV
Electronic Mail Security: Pretty
Good privacy, S/MIME.
IP Security: IP Security overview,
IP security architecture, authentication header, encapsulating
security payload, combining security associations, key management.
Web Security: Web security
considerations, Secure sockets layer and transport layer security,
secure electronic transaction.
UNIT-V
Part four system security:
Intruders, intrusion detection, and password management.
Malicious software: Viruses and
related threats, virus countermeasures.
Firewalls: Firewall Design
Principles, Trusted systems.
BOOKS:
1. William Stallings “Cryptography
and Network Security”, 3 ed, Pearson Education.
2. W.Stallings “ Network security
Essential “ Applications & Standards”, Pearson ed.
3. Kanfren “Network Secirity :
Private Communications in a public world 2/e
4. Eric Maiwald “ Network Secirity :
A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
5. Roberta Bragg “ Mark Rhodes,
Ousley & Keith Strassberg Network Secirity : The Complete
Reference “ Tata McGraw Hill.
6. Eric Maiwald “Fundamentals of
Network Security” Wiley India.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
No comments:
Post a Comment