JNTUH B.Tech R18 Cryptography and Network Security Study Material / Notes
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Hand Written Notes - Set 3
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 4
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 5
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Short Question and Answers
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Long Question and Answers
Download Here
JNTUH B.Tech R18 Cryptography and Network Security Short and Long Important Questions and Objective Bits - Unit Wise
Download Here
JNTUH B.Tech R22, R18 Cryptography and Network Security Syllabus :
UNIT - I :
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
UNIT - II :
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
UNIT - III :
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512),
Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure
UNIT - IV :
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT - V :
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
Unit Number | Study Material / Notes - Set 1 | Study Material / Notes - Set 2 |
---|---|---|
Unit 1 | Download Here | Security Concepts Cryptography Concepts and Techniques |
Unit 2 | Download Here | Symmetric key Ciphers Asymmetric key Ciphers |
Unit 3 | Download Here | Cryptographic Hash Functions / Message authentication codes Key Management and Distribution |
Unit 4 | Download Here | Transport-level Security Wireless Network Security |
Unit 5 | Download Here | E-Mail Security Case Studies on Cryptography and security |
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Hand Written Notes - Set 3
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 4
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Notes - Set 5
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Short Question and Answers
Download Here
JNTUH B.Tech R22, R18 - Cryptography and Network Security - Unit Wise Long Question and Answers
Download Here
JNTUH B.Tech R18 Cryptography and Network Security Short and Long Important Questions and Objective Bits - Unit Wise
Download Here
JNTUH B.Tech R22, R18 Cryptography and Network Security Syllabus :
UNIT - I :
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
UNIT - II :
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
UNIT - III :
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512),
Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure
UNIT - IV :
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT - V :
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
Attachments
Last edited: