Friday 5 July 2013

MCA-505 Elective-III : EIII (e) Network Security:

UNIT-I
Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, tranposition techniques, rotor machines, steganography.Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design
principles, block cipher modes of operation.Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher.Contemporary symmetric ciphers: Triple DES, blowfish.
Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.
UNIT-II
Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange,elliptic curve arithmetic, and elliptic curve cryptography.
UNIT-III
Message authentication and Hash function : Authentication Requirements, Authentication functions,message authentication codes, hash functions, security of hash function and MACs.
Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
Authentication Applications: Kerberos, X.509 Authentication service.
UNIT-IV
Electronic Mail Security: Pretty Good privacy, S/MIME.
IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.
UNIT-V
Part four system security: Intruders, intrusion detection, and password management.
Malicious software: Viruses and related threats, virus countermeasures.
Firewalls: Firewall Design Principles, Trusted systems.

BOOKS:
1. William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
2. W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
3. Kanfren “Network Secirity : Private Communications in a public world 2/e
4. Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
5. Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg Network Secirity : The Complete
Reference “ Tata McGraw Hill.

6. Eric Maiwald “Fundamentals of Network Security” Wiley India.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


No comments:

Post a Comment