The site would be on maintenance from 8th Jul 2019 2.00pm to 8:00pm. You may experience some issue during this time.

Book Details

Cryptography and Network Security

Cryptography and Network Security

Published by uLektz

Course Code : CS6701
Author : uLektz
University : Anna University, Tamil Nadu
Regulation : 2013
Categories : Computer Science
Format : ico_bookePUB3 (DRM Protected)
Type : eBook

FREE

Buy Now

Description :Cryptography and Network Security of CS6701 covers the latest syllabus prescribed by Anna University, Tamil Nadu for regulation 2013. Author: uLektz, Published by uLektz Learning Solutions Private Limited.

Note : No printed book. Only ebook. Access eBook using uLektz apps for Android, iOS and Windows Desktop PC.

Topics
UNIT I INTRODUCTION & NUMBER THEORY

1.1 Services, Mechanisms and attacks

1.2 The OSI security architecture

1.3 Network security model

1.4 Classical Encryption techniques

1.5 Symmetric cipher model, Substitution techniques, Transposition techniques , Steganography

1.6 FINITE FIELDS AND NUMBER THEORY - Groups, Rings, Fields

1.7 Modular arithmetic

1.8 Euclid’s algorithm

1.9 Finite fields

1.10 Polynomial Arithmetic

1.11 Prime numbers

1.12 Fermat’s and Euler’s theorem

1.13 Testing for primality

1.14 The Chinese remainder theorem

1.15 Discrete logarithms

UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY

2.1 Data Encryption Standard

2.2 Block cipher principles - Block cipher modes of operation

2.3 Aes-Structure-Transformation Functions

2.4 Triple DES

2.5 Blowfish-RC5 algorithm

2.6 Public key cryptography - Principles of public key cryptosystems

2.7 The RSA algorithm

2.8 Key management

2.9 Diffie Hellman Key exchange

2.10 Elliptic curve arithmetic

2.11 Elliptic curve cryptography

UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES

3.1 Authentication requirement

3.2 Authentication function

3.3 MAC

3.4 Hash function

3.5 Security of hash function and MAC

3.6 MD5

3.7 SHA

3.8 HMAC

3.9 CMAC

3.10 Digital signature and authentication protocols

3.11 DSS

3.12 EI Gamal

3.13 Schnorr

UNIT IV SECURITY PRACTICE & SYSTEM SECURITY

4.1 Authentication applications and Kerberos

4.2 X.509 Authentication services

4.3 Internet Firewalls for Trusted System - Roles of Firewalls, Firewall related terminology, Types of Firewalls, Firewall designs

4.4 SET for E-Commerce Transactions.

4.5 Intruder - Intrusion detection system

4.6 Virus and related threats

4.7 Countermeasures

4.8 Firewalls design principles

4.9 Trusted systems - Practical implementation of cryptography and security

UNIT V E-MAIL, IP & WEB SECURITY

5.1 E-mail Security - Security Services for E-mail, Attacks possible through E-mail, Establishing keys privacy, Authentication of the source, Message Integrity, Non-repudiation, Pretty Good Privacy-S/MIME.

5.2 IPSecurity - Overview of IPSec

5.3 IP and IPv6

5.4 Authentication Header

5.5 Encapsulation Security Payload (ESP)

5.6 Internet Key Exchange - Phases of IKE, ISAKMP/IKE Encoding

5.7 Web Security - SSL/TLS Basic Protocol, Computing the keys, Client authentication

5.8 PKI as deployed by SSL Attacks fixed in v3

5.9 Exportability

5.10 Encoding

5.11 Secure Electronic Transaction (SET)

loading