7210352548

7210352548



CLASS: B. Sc (111 formation techno log v)_[_Semester - V

Paper I; SUBJECT: NetWork Security

Pcriods per wcck 1 Period is50minutes

Lccturc

5

TW/T utorial/Practical

3

llours

Marks

Evaluation System

Thcory Exaniination

2

60

TW/T utorial/Practical

40

Unit-I

Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Vigenere Cipher, The Mili Cipher, The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of the Vigenere Cipher. Cryptanalysis of the LFSR-based Stream Cipher.

Shannon’s Theory, Perfect Secrecy, Entropy. Huffman Encodings and Entropy, Properties of Entropy, Spurious Keys and Unicity Distance

The Data Encryption Standard, Description of DES, An Example of DES Encryption. The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES.

Introduction to Public-key Cryptography, Morę Number Theory, The F.uclidean Algorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA. Probabilistic Primality Testing. Attacks On RSA, The Decryption Exponent, Partial Information Conceming Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method, Dixon‘s Algorithm and the Quadratic Sieve. Factoring Algorithms in Practice

Unit-II

Signaturc Schemcs : Introduction. The EIGamal Signature Scherne, The Digital Signalure Standard, One-time Signatures, Undeniablc Signatures, Fail-stop Signatures Hash Functions

Signatures and Hash Functions, Collision-free Hash Functions The Birthday Attack, A Discrete Log Hash Function, Extending Hash Functions, Hash Functions from Cryptosystems, The MD4 Hash Function. Timestamping. Key Distribution and Key Agreement

Introduction, Key Predistribution , Blonrs Scherne, Diffie-Hellman Key Predistribution. Kerberos, Diffie-Hellman Key Fxchangc, The Station-to-station Protocol, MTI Key Agreement Protocols, Key Agreement Using Self-certifying Keys.

Unit-III

Security Trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms. A Model for NetWork Security

Unit-IV

Authentication Applications: Kerberos, X.509 Authentication Service, Public-Key Infrastructure, Recommended Reading and Web Sites, Key Terms, Review Questions, and Problerns, A Kerberos Encryption Techniques, Electronic Mail Security, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, and Problerns, A Data Compression Using /.ip, Radix-64 Conversion, PGP Random Number Generation

Unit-V

IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Key



Wyszukiwarka

Podobne podstrony:
Punjabi University, PadałaB.Sc. (Botany) Part-III (SEMESTER V) PAPER IX: PLANT PHYSIOLOGY Max. Marks
PRESENTATIONS Sebald, Brigita. 2012. "Social NetWork Sites and the Formation of Musical Taste,”
Przedmioty specjalnościowe - Technologia maszyn Semestr 5 Obrabiarki Semestr Rodzaj
Przedmioty specjalnościowe - Technologia maszyn Semestr 6 Materiał a środowisko Semestr Rodzaj
111.1. Mikrotunelowanie Technologia mikrotunelowania polega na drążeniu poziomego, o wymaganym spadk
2020-12-01Plan zajęć - MiBM_SI lll_Sd/s. technologiczno-materiałowa, semestr zimowy, rok
SC 111 Najemnicy w świecie śródziemnomorskim Cena 3,95 złPodróż przez tysiąclecia JHWWR i A itiL-ó
Punjabi University, PadałaSYLLABllS B.Sc. (Bo(any) Part-III (Semester-V and VI) (Session 2019-20, 20
Technologia Informacyjna semestr I, studia stacjonarne I stopnia Elektronika i Telekomunikacja 
arkusz2 1 TECHNOLOGIA CHEMICZNA - SEMESTR IVARKUSZ IIKONDUKTOMETRIA Roztwory elektrolitów przewodzą
arkusz3 1 TECHNOLOGIA CHEMICZNA - SEMESTR IV ARKUSZ III POTENCJOM ETRIA Półogniwo to układ złoż
arkusz4 1 TECHNOLOGIA CHEMICZNA - SEMESTR IV ARKUSZ IVKINETYKA CHEMICZNA Szybkość reakcji chemicznej
Paper / Subject Codę: 42602 / Cloud Computing 13-May-19    1T01217 - B.E.(INFORMATION
7 (537) Rastrowe formaty plików PNG - *.png (ang. Portablc NetWork Graphics) - jest to oficjalny nas
Paper / Subject Codę: 71613 / Accmintancy : Paper II * Advanced Cosi Accounting. Oil Rs KM) per week
Paper / Subject Codę: 71613 / Account ano : Paper II - Advanced Cosi Accounting. Q5. Sudhir Entcrpns
Paper / Subject Codę: 71613 / Accountancy : Paper II - Advanced Cosi Accounting. 4. Nonnal Loss is e
Paper / Subject Codę: 71613 / Accountancy : Paper II - Advanced Cosi Accounting. I) 250Units of A an
Revised syllabus of M.Sc. Information Technology Semester III and IV (Based on Credit and grading

więcej podobnych podstron