Syllabus , NETWORK SECURITY AND CRYPTOGRAPHY, R13 Regulation, B.Tech , JNTUK,Syllabus, download,
Classical Encryption Techniques Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Cyber threats and their defense (Phishing Defensive measures, web based attacks, SQL injection & Defense techniques) TEXT BOOK 2), Buffer overflow & format string vulnerabilities, TCP session hijacking (ARP attacks, route table modification) UDP hijacking (man-in-the-middle attacks) (TEXT BOOK3).
Block Ciphers & Symmetric Key Cryptography Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-Structure, Transformation functions, Key Expansion, Blowfish, CAST- 128, IDEA, Block Cipher Modes of Operations.
Number Theory & Asymmetric Key Cryptography Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s Theorems, The Chinese Remainder theorem, Discrete logarithms. Public Key Cryptography: Principles, public key cryptography algorithms, RSA Algorithms, Diffie Hellman Key Exchange, Elgamal encryption & decryption, Elliptic Curve Cryptography.
Cryptographic Hash Functions & Digital Signatures Application of Cryptographic hash Functions, Requirements & Security, Secure Hash Algorithm, Message Authentication Functions, Requirements & Security, HMAC & CMAC. Digital Signatures, NIST Digital Signature Algorithm. Key management & distribution.
User Authentication, Transport Layer Security & Email Security User Authentication: Remote user authentication principles, Kerberos Transport Level Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Shell(SSH) Electronic Mail Security: Pretty Good Privacy (PGP) and S/MIME.
IP Security & Intrusion Detection Systems IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host based IDS/IPS. (TEXT BOOK 2)