Book Details

Cryptography and Network Security

Cryptography and Network Security

Published by uLektz

Course Code : ULZHS0121
Author : uLektz
University : General for All University
Regulation : 2013
Categories : Arts and Science
Format : ico_bookePUB3 (DRM Protected)
Type :

eBook

FREE

Buy Now

Description :Cryptography and Network Security of ULZHS0121 covers the latest syllabus prescribed by General for All University for regulation 2013. Author: uLektz, Published by uLektz Learning Solutions Private Limited.

Note : No printed book. Only ebook. Access eBook using uLektz apps for Android, iOS and Windows Desktop PC.

Topics
UNIT I : CLASSICAL ENCRYPTION TECHNIQUES

1.1 Introduction :Security Attacks-Services & Mechanisms

1.2 Symmetric Cipher Model, Substitution Techniques,Transportation Technique

1.3 Cyber Threats And Their Defense(Phishing Defensive Measures, Web Based Attacks, Sql Injection & Defense Techniques)

1.4 Buffer Overflow & Format String Vulnerabilities, tcp Session Hijacking(Arp Attacks, Route Table Modification) , udp Hijacking ( Man-In-The-Middle Attacks)

UNIT II: BLOCK CIPHERS & SYMMETRIC KEY CRYPTOGRAPHY

2.1 Traditional Block Cipher Structure- Block Cipher Design Principles, Block Cipher Modes Of Operation

2.2 Des

2.3 Aes-Structure-Transformation Functions

2.4 Blowfish

2.5 Key Expansion

2.6 Cast-128, Idea

UNIT III: NUMBER THEORY & ASYMMETRIC KEY CRYPTOGRAPHY

3.1 Number Theory

3.2 Prime And Relatively Prime Numbers

3.3 Modular Arithmetic, Fermat’s And Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms

3.4 Public Key Cryptography,Principles

3.5 Public Key Cryptography Algorithms :Rsa Algorithms,, Diffie Hellman Key Exchange, Elgamal Encryption & Decryption, Elliptic Curve Cryptography

UNIT IV : CRYPTOGRAPHIC HASH FUNCTIONS & DIGITAL SIGNATURES

4.1 Application Of Cryptographic Hash Functions,Requirements & Security, Secure Hash Algorithm

4.2 Message Authentication Functions-Requirements & Security

4.3 Hmac & Cmac

4.4 Digital Signatures,Nist Digital Signature Algorithm-Key Management & Distribution

UNIT V: USER AUTHENTICATION, TRANSPORT LAYER SECURITY & EMAIL SECURITY

5.1 User Authentication- Remote User Authentication Principles- Kerberos

5.2 Transport Level Security

5.3 Web Security Requirements, Secure Socket Layer (Ssl) And Transport Layer Security (Tls), Secure Shell(Ssh)

5.4 Electronic Mail Security,Pretty Good Privacy (Pgp) And s/Mime

UNIT VI: IP SECURITY & INTRUSION DETECTION SYSTEMS

6.1 Ip Security- Ip Security Overview-Ip Security Architecture

6.2 Authentication Header, Encapsulating Security Payload, Combining Security Associations And Key Management

6.3 Intrusion Detection-Overview, Approaches For Ids/Ips, Signature Based Ids, Host Based Ids/Ips

loading