# Cryptography and Network Security

 Course Code : ULZ0328 Author : uLektz University : General for All University Regulation : 2017 Categories : Computer Science Format : ePUB3 (DRM Protected) Type : eBook

FREE

Description :Cryptography and Network Security of ULZ0328 covers the latest syllabus prescribed by General for All University for regulation 2017. Author: uLektz, Published by uLektz Learning Solutions Private Limited.

Note : No printed book. Only ebook. Access eBook using uLektz apps for Android, iOS and Windows Desktop PC.

##### Topics
###### UNIT I : CLASSICAL ENCRYPTION TECHNIQUES

1.1 Introduction :Security Attacks-Services & Mechanisms

1.2 Symmetric Cipher Model, Substitution Techniques,Transportation Technique

1.3 Cyber Threats And Their Defense(Phishing Defensive Measures, Web Based Attacks, Sql Injection & Defense Techniques)

1.4 Buffer Overflow & Format String Vulnerabilities, tcp Session Hijacking(Arp Attacks, Route Table Modification) , udp Hijacking ( Man-In-The-Middle Attacks)

###### UNIT II: BLOCK CIPHERS & SYMMETRIC KEY CRYPTOGRAPHY

2.1 Traditional Block Cipher Structure- Block Cipher Design Principles, Block Cipher Modes Of Operation

2.2 Des

2.3 Aes-Structure-Transformation Functions

2.4 Blowfish

2.5 Key Expansion

2.6 Cast-128, Idea

###### UNIT III: NUMBER THEORY & ASYMMETRIC KEY CRYPTOGRAPHY

3.1 Number Theory

3.2 Prime And Relatively Prime Numbers

3.3 Modular Arithmetic, Fermat’s And Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms

3.4 Public Key Cryptography,Principles

3.5 Public Key Cryptography Algorithms :Rsa Algorithms,, Diffie Hellman Key Exchange, Elgamal Encryption & Decryption, Elliptic Curve Cryptography

###### UNIT IV : CRYPTOGRAPHIC HASH FUNCTIONS & DIGITAL SIGNATURES

4.1 Application Of Cryptographic Hash Functions,Requirements & Security, Secure Hash Algorithm

4.2 Message Authentication Functions-Requirements & Security

4.3 Hmac & Cmac

4.4 Digital Signatures,Nist Digital Signature Algorithm-Key Management & Distribution

###### UNIT V: USER AUTHENTICATION, TRANSPORT LAYER SECURITY & EMAIL SECURITY

5.1 User Authentication- Remote User Authentication Principles- Kerberos

5.2 Transport Level Security

5.3 Web Security Requirements, Secure Socket Layer (Ssl) And Transport Layer Security (Tls), Secure Shell(Ssh)

5.4 Electronic Mail Security,Pretty Good Privacy (Pgp) And s/Mime

###### UNIT VI: IP SECURITY & INTRUSION DETECTION SYSTEMS

6.1 Ip Security- Ip Security Overview-Ip Security Architecture

6.2 Authentication Header, Encapsulating Security Payload, Combining Security Associations And Key Management

6.3 Intrusion Detection-Overview, Approaches For Ids/Ips, Signature Based Ids, Host Based Ids/Ips