Cryptography and Cyber Security for BE Anna University R21CBCS (V - CSE - CB3491)

Cryptography and Cyber Security for BE Anna University R21CBCS (V - CSE - CB3491)  (Paperback, V.S. BAGAD, I.A. DHOTRE)

Price: Not Available
Currently Unavailable
Authors
Read More
Highlights
  • Binding: Paperback
  • Publisher: TECHNICAL PUBLICATIONS, PUNE
  • Genre: EDUCATIONAL
  • ISBN: 9789355854001, 9355854001
  • Edition: FIRST, 2023
  • Pages: 284
Description
Syllabus Cryptography and Cyber Security - (CB3491) UNIT I INTRODUCTION TO SECURITY Computer Security Concepts - The OSI Security Architecture - Security Attacks - Security Services and Mechanisms - A Model for Network Security - Classical encryption techniques : Substitution techniques, Transposition techniques, Steganography - Foundations of modern cryptography : Perfect security - Information Theory - Product Cryptosystem - Cryptanalysis. (Chapter - 1) UNIT II SYMMETRIC CIPHERS Number theory - Algebraic Structures - Modular Arithmetic - Euclid‘s algorithm - Congruence and matrices - Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS : SDES - Block Ciphers - DES, Strength of DES - Differential and linear cryptanalysis - Block cipher design principles - Block cipher mode of operation - Evaluation criteria for AES - Pseudorandom Number Generators - RC4 - Key distribution. (Chapter - 2) UNIT III ASYMMETRIC CRYPTOGRAPHY MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes - Primality Testing - Factorization - Euler’s totient function, Fermat’s and Euler’s Theorem - Chinese Remainder Theorem - Exponentiation and logarithm. ASYMMETRIC KEY CIPHERS : RSA cryptosystem - Key distribution - Key management - Diffie Hellman key exchange - Elliptic curve arithmetic - Elliptic curve cryptography. (Chapter - 3) UNIT IV INTEGRITY AND AUTHENTICATION ALGORITHMS Authentication requirement - Authentication function - MAC - Hash function - Security of hash function : HMAC, CMAC - SHA - Digital signature and authentication protocols - DSS - Schnorr Digital Signature Scheme - ElGamal cryptosystem - Entity Authentication : Biometrics, Passwords, Challenge Response protocols - Authentication applications - Kerberos. MUTUAL TRUST : Key management and distribution - Symmetric key distribution using symmetric and asymmetric encryption - Distribution of public keys - X.509 Certificates. (Chapter - 4) UNIT V CYBER CRIMES AND CYBER SECURITY Cyber Crime and Information Security - classifications of Cyber Crimes - Tools and Methods - Password Cracking, Keyloggers, Spywares, SQL Injection - Network Access Control - Cloud Security - Web Security - Wireless Security. (Chapter - 5)
Read More
Specifications
Book Details
Publication Year
  • 2023
Book Type
  • TEXT BOOK
Number of Pages
  • 284
University Books Details
Stream
  • ENGINEERING
Degree/Diploma
  • DEGREE
Specialization
  • CSE
Term
  • SEM V
Additional Features
Age Group
  • 18 TO 60 YEARS
Ratings & Reviews
4.2
18 Ratings &
0 Reviews
  • 5
  • 4
  • 3
  • 2
  • 1
  • 12
  • 3
  • 0
  • 1
  • 2
Have you used this product? Be the first to review!
Be the first to ask about this product
Safe and Secure Payments.Easy returns.100% Authentic products.
You might be interested in
Medical And Nursing Books
Min. 50% Off
Shop Now
Popular Psychology Books
Min. 50% Off
Shop Now
Finance And Accounting Books
Min. 50% Off
Shop Now
General Fiction Books
Min. 50% Off
Shop Now
Back to top