studentsuvidha

Full Version: Cryptography and Network Security IPU IT notes and question paper free download
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
SYLLABUS:-

UNIT- I: 
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data. 

UNIT- II: 
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES,  Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.

UNIT- III: 
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm,  Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.

UNIT- IV: 
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.
bbbb Angry Angry Angry Angry Angry Angry Angry Angry Angry Angry