Dipesh S   05-01-2017, 04:48 PM
#1
SYLLABUS:-

UNIT- I: 
Basic Cryptographic Techniques, Computational Complexity, Finite Fields, Number Theory, DES and AES, Public Key Cryptosystems, Traffic Confidentiality ,Cryptanalysis, Intractable (Hard) Problems, Hash Functions, OSI Security Architecture Privacy of Data. 

UNIT- II: 
Linear Cryptanalysis, Differential Cryptanalysis, DES, Triple DES, Message Authentication and Digital Signatures, Attacks on Protocols, Elliptic Curve Architecture and Cryptography, Public Key Cryptography and RSA, , Evaluation criteria for AES,  Key Management, Authentication requirements Digital forensics including digital evidence handling: Media forensics, Cyber forensics, Software forensics, Mobile forensics.

UNIT- III: 
Buffer Flow attack, Distributed Denial of service attack, Weak authentication, Design of Substitution Boxes (SBoxes), Hash Functions , Security of Hash Functions, Secure Hash Algorithm,  Authentication applications, Kerberos, IP security, Pretty Good Privacy (PGP), Web Security Light weight cryptography for mobile devices, Side channel attacks.

UNIT- IV: 
System security, Security Standards, Intruders, and Viruses, Firewalls, Malicious software, Intrusion Detection System, Intrusion Prevention System, Trusted Systems, Virus Counter measures, Authentication Strategies.
turemaf   09-15-2018, 01:40 PM
#2
bbbb Angry Angry Angry Angry Angry Angry Angry Angry Angry Angry
  
Users browsing this thread: 1 Guest(s)
Powered By MyBB, © 2002-2025 MyBB Group.
Made with by Curves UI.