Syllabus NETWORK SECURITY AND CRYPTOGRAPHY R13 Regulation B.Tech JNTUK-kakinada Syllabus download

Syllabus , NETWORK SECURITY AND CRYPTOGRAPHY, R13 Regulation, B.Tech , JNTUK,Syllabus, download,

NETWORK SECURITY & CRYPTOGRAPHY Syllabus R13 Regulation RT4104E

Unit - I

Classical Encryption Techniques Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Cyber threats and their defense (Phishing Defensive measures, web based attacks, SQL injection & Defense techniques) TEXT BOOK 2), Buffer overflow & format string vulnerabilities, TCP session hijacking (ARP attacks, route table modification) UDP hijacking (man-in-the-middle attacks) (TEXT BOOK3).

Unit - II

Block Ciphers & Symmetric Key Cryptography Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-Structure, Transformation functions, Key Expansion, Blowfish, CAST- 128, IDEA, Block Cipher Modes of Operations.

Unit - III

Number Theory & Asymmetric Key Cryptography Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s Theorems, The Chinese Remainder theorem, Discrete logarithms. Public Key Cryptography: Principles, public key cryptography algorithms, RSA Algorithms, Diffie Hellman Key Exchange, Elgamal encryption & decryption, Elliptic Curve Cryptography.

Unit - IV

Cryptographic Hash Functions & Digital Signatures Application of Cryptographic hash Functions, Requirements & Security, Secure Hash Algorithm, Message Authentication Functions, Requirements & Security, HMAC & CMAC. Digital Signatures, NIST Digital Signature Algorithm. Key management & distribution.

Unit - V

User Authentication, Transport Layer Security & Email Security User Authentication: Remote user authentication principles, Kerberos Transport Level Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Shell(SSH) Electronic Mail Security: Pretty Good Privacy (PGP) and S/MIME.

Unit - VI

IP Security & Intrusion Detection Systems IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host based IDS/IPS. (TEXT BOOK 2)

Text Books

  1. Cryptography & Network Security: Principles and Practices, William Stallings, PEA, Sixth edition.
  2. Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David Irwin, CRC press.
  3. Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.

Reference Books

  1. Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford.
  2. Network Security & Cryptography, Bernard Menezes, Cengage, 2010.

For other Subject Syllabus Click here

IF you don't find something you are searching for contact us

Other Subjects in Different Regulations
OPEN ELECTIVE R10
Radar Systems R16
Digital Image Processing R16
Computer Networks R16
Optical Communications R16
Micro Wave Engineering & Optical Lab R16
Digital Signal Processing Lab R16
ELECTRONIC SWITCHING SYSTEMS R16
System Design through Verilog R16
Embedded Systems R16
Industrial Robotics R10
OPTICAL COMMUNICATIONS R10
EMBEDDED SYSTEMS R10
DIGITAL IMAGE PROCESSING R10
RADAR SYSTEMS R10
TELECOMMUNICATION SWITCHING SYSTEMS R10
ANALOG IC DESIGN R10
OBJECT ORIENTED PROGRAMMING R10
BIO_MEDICAL ENGINEERING R10
IMAGE PROCESSING R10
PRINCIPLES OF SIGNALS SYSTEMS AND COMMUNICATIONS R10
DIGITAL SIGNAL PROCESSING LAB R10
MICROWAVE AND OPTICAL COMMUNICATIONS LAB R10
Cyber Laws R10