JNTUH B.Tech R18, R22 - Cryptography and Network Security - Study Material and Important Questions

Rahul

Moderator
JNTUH B.Tech R18 Cryptography and Network Security Study Material / Notes

JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Hand Written Notes - Set 3
Download Here

JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 4
Download Here

JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 5
Download Here

JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Short Question and Answers
Download Here

JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Long Question and Answers
Download Here

JNTUH B.Tech R18 Cryptography and Network Security Short and Long Important Questions and Objective Bits - Unit Wise
Download Here

JNTUH B.Tech R22, R18 Cryptography and Network Security Syllabus :

UNIT - I :
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security

Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

UNIT - II :
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.

Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

UNIT - III :
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512),

Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.

Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure

UNIT - IV :
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH)

Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security

UNIT - V :
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange

Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
 

Attachments

Last edited:
Check at electric hybrid and vehicle notes at
 
Back
Top