05-01-2017, 04:48 PM
SYLLABUS:-
UNIT- I:
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data.
UNIT- II:
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES, Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.
UNIT- III:
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm, Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.
UNIT- IV:
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.
UNIT- I:
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data.
UNIT- II:
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES, Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.
UNIT- III:
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm, Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.
UNIT- IV:
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.