Subject Details
Dept     : CSE
Sem      : 5
Regul    : 2019
Faculty : M.Suguna
phone  : NIL
E-mail  : suguna.m.cse@snsce.ac.in
774
Page views
56
Files
6
Videos
7
R.Links

Icon
Lecture Notes

UNIT 1:
pdf
download    open file
FULL UNIT NOTES
pdf
download    open file
transposition techniques,
pdf
download    open file
Classical encryption techniques: substitution techniques
pdf
download    open file
Security trends - Legal, Ethical and Professional Aspects of Security
pdf
download    open file
Need for Security at Multiple levels, Security Policies - Model of network security
pdf
download    open file
Security attacks, services and mechanisms
pdf
download    open file
OSI security architecture
pdf
download    open file
Classical encryption techniques: substitution techniques
pdf
download    open file
transposition techniques,
pdf
download    open file
steganography
pdf
download    open file
Foundations of modern cryptography: perfect security – information theory
UNIT 2:
pdf
download    open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
pdf
download    open file
FULL UNIT NOTES
pdf
download    open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
pdf
download    open file
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
pdf
download    open file
Euclid‟s algorithm- Congruence and matrices
pdf
download    open file
Euclid‟s algorithm- Congruence and matrices
pdf
download    open file
Groups, Rings, Fields- Finite fields
pdf
download    open file
Block cipher Principles of DES – Strength of DES
pdf
download    open file
Differential and linear cryptanalysis
pdf
download    open file
Block cipher design principles – Block cipher mode of operation
pdf
download    open file
RC4 – Key distribution.
UNIT 3:
pdf
download    open file
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
pdf
download    open file
Factorization – Euler’s totient function
pdf
download    open file
Fermat’s and Euler’s Theorem - Chinese Remainder Theorem
pdf
download    open file
Exponentiation and logarithm
pdf
download    open file
Diffie Hellman key exchange
pdf
download    open file
Factorization – Euler’s totient function
pdf
download    open file
prime factorization
UNIT 4:
pdf
download    open file
Authentication requirement – Authentication function
pdf
download    open file
MAC – Hash function – Security of hash function and MAC
pdf
download    open file
SHA
pdf
download    open file
Digital signature and authentication protocols – DSS
pdf
download    open file
Kerberos
pdf
download    open file
X.509
pdf
download    open file
Challenge Response protocols
pdf
download    open file
FULL UNIT NOTES
pdf
download    open file
Authentication applications
pdf
download    open file
FULL UNIT NOTES
UNIT 5:
pdf
download    open file
Security: Architecture, Authentication header
pdf
download    open file
Encapsulating security payloads, combining security associations,
pdf
download    open file
key management. Web Security: Secure socket layer
pdf
download    open file
transport layer security
pdf
download    open file
secure electronic transaction (SET)
pdf
download    open file
System Security: Intruders, Viruses and related threads
pdf
download    open file
firewall design principals
pdf
download    open file
trusted systems
pdf
download    open file
trusted systems