Syllabus Cryptography and Network Security CNS,old Question papers, Answers, important Question CRYPTOGRAPHY AND NETWORK SECURITY R13 Regulation B.Tech JNTUK-kakinada Syllabus download

Syllabus ,Cryptography and Network Security CNS,old Question papers, Answers, important Question CRYPTOGRAPHY AND NETWORK SECURITY, R13 Regulation, B.Tech , JNTUK,Syllabus, download,

Cryptography and Network Security Syllabus R13 Regulation unit wise

Unit-I

Classical Encryption Techniques

  • Introduction
  • Security attacks
  • services & mechanisms
  • Symmetric Cipher Model
  • Substitution Techniques
  • Transportation Techniques
  • Cyber threats and their defense( Phishing Defensive measures, web based attacks, SQLinjection & Defense techniques)
  • Buffer overflow & format string vulnerabilities
  • TCP session hijacking(ARP attacks, route table modification)
  • UDP hijacking ( man-in-the-middle attacks)

Unit-II

Block Ciphers & Symmetric Key Cryptography

  • Traditional Block Cipher Structure
  • DES
  • Block Cipher Design Principles
  • AES-Structure
  • Transformation functions
  • Key Expansion
  • Blowfish
  • CAST-128
  • IDEA
  • Block Cipher Modes of Operations

Unit-III

Number Theory & Asymmetric Key Cryptography

  • Number Theory:
  • Prime and Relatively Prime Numbers
  • Modular Arithmetic
  • Fermat’s and Euler’s Theorems
  • The Chinese Remainder theorem
  • Discrete logarithms
  • Public Key Cryptography:
  • Principles
  • public key cryptography algorithms
  • RSA Algorithms
  • Diffie Hellman Key Exchange
  • Elgamal encryption & decryption
  • Elliptic Curve Cryptography

Unit-IV

Cryptographic Hash Functions & Digital Signatures

  • Application of Cryptographic hash Functions
  • Requirements & Security
  • Secure Hash Algorithm
  • Message Authentication Functions
  • Requirements & Security
  • HMAC & CMAC
  • Digital Signatures
  • NIST Digital Signature Algorithm
  • Key management & distribution

Unit-V

User Authentication, Transport Layer Security & Email Security

  • User Authentication:
  • Remote user authentication principles
  • Kerberos
  • Transport Level Security:
  • Web Security Requirement
  • Secure Socket Layer (SSL) and Transport Layer Security(TLS)
  • Secure Shell(SSH)
  • Electronic Mail Security:
  • Pretty Good Privacy (PGP) and S/MIME

Unit-VI

IP Security & Intrusion Detection Systems

  • IP Security:
  • IP Security Overview
  • IP Security Architecture
  • Authentication Header
  • Encapsulating Security Payload
  • Combining Security Associations and Key Management
  • Intrusion detection:
  • Overview
  • Approaches for IDS/IPS
  • Signature based IDS
  • Host based IDS/IPS

Reference Books

  1. 1.Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford
  2. 2. Network Security & Cryptography, Bernard Menezes, Cengage,2010

For other Subject Syllabus Click here

IF you don't find something you are searching for contact us

Other Subjects in Different Regulations
OPEN ELECTIVE R10
COMPUTER ARCHITECTURE R10
Cryptography and Network Security R16
Software Architecture & Deisgn Patterns R16
Web Technologies R16
Managerial Economics and Financial Analysis R16
Software Architecures & Design Patterns Lab R16
Web Technologies Lab R16
Big Data Analysis R16
CLOUD COMPUTING R16
Software Project Management R16
CRYPTOGRAPHY AND NETWORK SECURITY R10
UML & DESIGN PATTERNS R10
DATA WARE HOUSING AND DATA MINING R10
MOBILE COMPUTING R10
MATLAB R10
WEB SERVICES R10
OPEN SOURCE SOFTWARE R10
CYBER LAWS R10
COMPUTER FORENSICS R10
CLOUD COMPUTING R10
SOFTWARE PROJECT MANAGEMENT R10
MACHINE LEARNING R10
DISTRIBUTED DATABASES R10
UML & DESIGN PATTERNS LAB R10
MOBILE APPLICATION DEVELOPMENT LAB R10
BIG DATA ANALYTICS R10