20, అక్టోబర్ 2022, గురువారం

Mr.D.RAMANJANEYULU@ramu , FACULTY, JIT,JU, offering course B.TECH FINAL YEAR CSE , COMPUTER SECURITY , computer security, network security and cryptography, information security, information assurance and security,cyber security all are under same umberalla.







































































































is it possible to understand in the first 3pages what i wrote?

definitely no, only source (who wrote), destination (whom it wrote for) these two parties only will get understand

only 2 persons will get the information and use, rest of the world will see but no use for them, they can’t benefit by any means

this is the essence what the all the courses offers 

the above 3 pages contains unit-1 for B.Tech, my hand written script various cryptography technics 
4th year 1st semester, testimonial is the 4th screen, authoritatively  , foreign university 


COMPUTER SECURITY(JU.JIT) ,

NETWORK SECURITY AND CRYPTOGRAPHY,B.TECH(CSE),

 INFORMATION SECURITY B.TECH(IT),

INFORMATION ASSURANCE AND SECURITY(JU.JIT),

CYBER SECURITY (LATEST B.TECH COURSES)

THE ABOVE 5 SUBJECTS, ALL ARE UNDER SAME UMBERALLA.

  • SYLLABUS: for B.TECH(CSE)  total 5 units
  • UNITI(Introduction to Cryptography and Block Ciphers)
  • Unit II (Confidentiality and Modular Arithmetic)
  • Unit III (Public key cryptography and Authentication requirements)
  • Unit IV (Integrity checks and Authentication algorithms)
  • Unit V (IP Security and Key Management)
my one of the  reference text book is WILLIAM STALLINGS. MIT.



CONCEPTS FRAMED FROM THE BELOW 20 CHAPTERS DEPENDING ON CRITERIEA
  • Chapter 1. Introduction
  • 1.1. Security Trends
  • 1.2. The OSI Security Architecture
  • 1.3. Security Attacks
  • 1.4. Security Services
  • 1.5. Security Mechanisms
  • 1.6. A Model for Network Security
  • 1.7. Recommended Reading and Web Sites
  • 1.8. Key Terms, Review Questions, and Problems
  • Part 1. Symmetric Ciphers
  • Chapter 2. Classical Encryption Techniques
  • 2.1. Symmetric Cipher Model
  • 2.2. Substitution Techniques
  • 2.3. Transposition Techniques
  • 2.4. Rotor Machines
  • 2.5. Steganography
  • 2.6. Recommended Reading and Web Sites
  • 2.7. Key Terms, Review Questions, and Problems
  • Chapter 3. Block Ciphers and the Data Encryption Standard
  • 3.1. Block Cipher Principles
  • 3.2. The Data Encryption Standard
  • 3.3. The Strength of DES
  • 3.4. Differential and Linear Cryptanalysis
  • 3.5. Block Cipher Design Principles
  • 3.6. Recommended Reading
  • 3.7. Key Terms, Review Questions, and Problems
  • Chapter 4. Finite Fields
  • 4.1. Groups, Rings, and Fields
  • 4.2. Modular Arithmetic
  • 4.3. The Euclidean Algorithm
  • 4.4. Finite Fields of the Form GF(p)
  • 4.5. Polynomial Arithmetic
  • 4.6. Finite Fields of the Form GF(2")
  • 4.7. Recommended Reading and Web Sites
  • 4.8. Key Terms, Review Questions, and Problems
  • Chapter 5. Advanced Encryption Standard
  • 5.1. Evaluation Criteria for AES
  • 5.2. The AES Cipher
  • 5.3. Recommended Reading and Web Sites
  • 5.4. Key Terms, Review Questions, and Problems
  • Appendix 5A. Polynomials with Coefficients in GF(2[superscript 8])
  • Appendix 5B. Simplified AES
  • Chapter 6. More on Symmetric Ciphers
  • 6.1. Multiple Encryption and Triple DES
  • 6.2. Block Cipher Modes of Operation
  • 6.3. Stream Ciphers and RC4
  • 6.4. Recommended Reading and Web Site
  • 6.5. Key Terms, Review Questions, and Problems
  • Chapter 7. Confidentiality Using Symmetric Encryption
  • 7.1. Placement of Encryption Function
  • 7.2. Traffic Confidentiality
  • 7.3. Key Distribution
  • 7.4. Random Number Generation
  • 7.5. Recommended Reading and Web Sites
  • 7.6. Key Terms, Review Questions, and Problems
  • Part 2. Public-Key Encryption and Hash Functions
  • Chapter 8. Introduction to Number Theory
  • 8.1. Prime Numbers
  • 8.2. Fermat's and Euler's Theorems
  • 8.3. Testing for Primality
  • 8.4. The Chinese Remainder Theorem
  • 8.5. Discrete Logarithms
  • 8.6. Recommended Reading and Web Site
  • 8.7. Key Terms, Review Questions, and Problems
  • Chapter 9. Public-Key Cryptography and RSA
  • 9.1. Principles of Public-Key Cryptosystems
  • 9.2. The RSA Algorithm
  • 9.3. Recommended Reading and Web Site
  • 9.4. Key Terms, Review Questions, and Problems
  • Appendix 9A. Proof of the RSA Algorithm
  • Appendix 9B. The Complexity of Algorithms
  • Chapter 10. Key Management; Other Public-Key Cryptosystems
  • 10.1. Key Management
  • 10.2. Diffie-Hellman Key Exchange
  • 10.3. Elliptic Curve Arithmetic
  • 10.4. Elliptic Curve Cryptography
  • 10.5. Recommended Reading and Web Site
  • 10.6. Key Terms, Review Questions, and Problems
  • Chapter 11. Message Authentication and Hash Functions
  • 11.1. Authentication Requirements
  • 11.2. Authentication Functions
  • 11.3. Message Authentication Codes
  • 11.4. Hash Functions
  • 11.5. Security of Hash Functions and MACs
  • 11.6. Recommended Reading
  • 11.7. Key Terms, Review Questions, and Problems
  • Appendix 11A. Mathematical Basis of the Birthday Attack
  • Chapter 12. Hash and MAC Algorithms
  • 12.1. Secure Hash Algorithm
  • 12.2. Whirlpool
  • 12.3. HMAC
  • 12.4. CMAC
  • 12.5. Recommended Reading and Web Sites
  • 12.6. Key Terms, Review Questions, and Problems
  • Chapter 13. Digital Signatures and Authentication Protocols
  • 13.1. Digital Signatures
  • 13.2. Authentication Protocols
  • 13.3. Digital Signature Standard
  • 13.4. Recommended Reading and Web Sites
  • 13.5. Key Terms, Review Questions, and Problems
  • Part 3. Network Security Applications
  • Chapter 14. Authentication Applications
  • 14.1. Kerberos
  • 14.2. X.509 Authentication Service
  • 14.3. Public-Key Infrastructure
  • 14.4. Recommended Reading and Web Sites
  • 14.5. Key Terms, Review Questions, and Problems
  • Appendix 14A. Kerberos Encryption Techniques
  • Chapter 15. Electronic Mail Security
  • 15.1. Pretty Good Privacy
  • 15.2. S/MIME
  • 15.3. Recommended Web Sites
  • 15.4. Key Terms, Review Questions, and Problems
  • Appendix 15A. Data Compression Using ZIP
  • Appendix 15B. Radix-64 Conversion
  • Appendix 15C. PGP Random Number Generation
  • Chapter 16. IP Security
  • 16.1. IP Security Overview
  • 16.2. IP Security Architecture
  • 16.3. Authentication Header
  • 16.4. Encapsulating Security Payload
  • 16.5. Combining Security Associations
  • 16.6. Key Management
  • 16.7. Recommended Reading and Web Site
  • 16.8. Key Terms, Review Questions, and Problems
  • Appendix 16A. Internetworking and Internet Protocols
  • Chapter 17. Web Security
  • 17.1. Web Security Considerations
  • 17.2. Secure Socket Layer and Transport Layer Security
  • 17.3. Secure Electronic Transaction
  • 17.4. Recommended Reading and Web Sites
  • 17.5. Key Terms, Review Questions, and Problems
  • Part 4. System Security
  • Chapter 18. Intruders
  • 18.1. Intruders
  • 18.2. Intrusion Detection
  • 18.3. Password Management
  • 18.4. Recommended Reading and Web Sites
  • 18.5. Key Terms, Review Questions, and Problems
  • Appendix 18A. The Base-Rate Fallacy
  • Chapter 19. Malicious Software
  • 19.1. Viruses and Related Threats
  • 19.2. Virus Countermeasures
  • 19.3. Distributed Denial of Service Attacks
  • 19.4. Recommended Reading and Web Sites
  • 19.5. Key Terms, Review Questions, and Problems
  • Chapter 20. Firewalls
  • 20.1. Firewall Design Principles
  • 20.2. Trusted Systems
  • 20.3. Common Criteria for Information Technology Security Evaluation
  • 20.3. Recommended Reading and Web Sites
  • 20.4. Key Terms, Review Questions, and Problems









 

కామెంట్‌లు లేవు:

కామెంట్‌ను పోస్ట్ చేయండి