Professional Documents
Culture Documents
UNIT-I Introduction R1:Chapter 1: 1.1-1.4 UNIT-I (contd...) Traditional Symmetric-Key Ciphers R1:Chapter 3: 3.1-3.4 UNIT-II Introduction to Modern SymmetricKey Ciphers R1:Chapter 5: 5.1,5.2 UNIT-II (contd...) Data Encryption Standard(DES) R1:Chapter 6: 6.1-6.5 UNIT- II (contd...) Advanced Encryption Standard (AES) R1:Chapter 7: 7.1-7.4 UNIT- II (contd...) Asymmetric-Key Cryptography R1:Chapter 10: 10.1,10.2,10.5 UNIT-III Message Integrity and Message Authentication R1:Chapter 11: 11.1,11.3 UNIT- III (contd...) Cryptographic Hash Functions R1:Chapter 12: 12.1,12.2 UNIT- III (contd...) Digital Signature R1:Chapter 13: 13.1-13.5 UNIT-IV Web Security R2:Chapter 17: 17.1-17.3 UNIT-IV (contd...) Intruders R2:Chapter 18: 18.1-18.3 UNIT-V Malicious Software R2:Chapter 19: 19.1,19.2 UNIT-V (contd...) Firewalls R2:Chapter 20: 20.1,20.2 Faculty: Mr.MVA Topics to be covered Security Goals, Attacks, Services and Mechanisms Introduction, Substitution Cipher, Transposition Cipher, Stream and Block Ciphers Modern Block Ciphers, Modern Stream Ciphers Introduction, DES Structure, DES Analysis, Multiple DES, Security of DES Introduction, Transformations, Key Expansion, Ciphers Introduction, RSA Cryptosystem, Elliptic Curve Cryptosystems Message Integrity, Message Authentication Total Hours: 52 % of Portion covered Reference Cumulative Chapter 03.85 03.85
13.46
17.31
10-11 (2 Hrs) 12-14 (3 Hrs) 15-17 (3 Hrs) 18-20 (3 Hrs) 21-23 (3 Hrs) 24-26 (3 Hrs) 27-32 (6 Hrs)
03.85
21.15
05.77
26.92
05.77
32.69
05.77
38.46
05.77
44.23
Introduction, SHA-512 Comparison, Process, Services, Attacks on Digital Signature, RSA Digital Signature Scheme, Digital Signature Standard (DSS) Web Security Considerations, Secure Socket Layer (SSL) and Transport Layer Security (TSL), Secure Electronic Transaction (SET) Intruders, Intrusion Detection, Password Management Viruses and Related Threats, Virus Countermeasures Firewall Design Principles, Trusted Systems
05.77
50.00
11.54
61.54
13.46
75.00
07.69
82.69
07.69
90.38
09.62
100.00
Literature: Book Type Code R1 Reference Book R2 R3 Title & Author Cryptography and Network Security Behrouz A. Forouzan Cryptography and Network Security William Stallings Cryptography and Network Security Atul Kahate Publication Info Publisher TMH Pearson Education TMH
Edition -