ufallstar.blogg.se

Cryptography and network security forouzan 2nd edition pdf
Cryptography and network security forouzan 2nd edition pdf








Fundamentals of Network Security by Eric Maiwald, Dreamtech press.

cryptography and network security forouzan 2nd edition pdf cryptography and network security forouzan 2nd edition pdf

Cryptography and Network Security: Principles and Practice,5 th edition, William Stallings, Pearson Education, Network Security and Cryptography, Bernard Menezes, Cengage Learning, Cryptography and Network,2 nd edition, Behrouz A.Fourouzan and Debdeep Mukhopadhyay,McGraw-Hill, 2010 REFERENCE BOOKS: 1. UNIT-VIII System Security: Intruders, Intrusion Detection, Password Management, Malicious Software Types, Viruses, Virus Countermeasures, Worms, Firewalls- Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted systems. UNIT-VII IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet Key Exchange, Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Electronic Payment. UNIT-VI Authentication Applications: Kerberos, Key Management and Distribution, X.509 Directory Authentication service, Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy, S/MIME. UNIT-V Cryptographic Hash Functions: Applications of Cryptographic Hash Functions, Secure Hash Algorithm, Message Authentication Codes Message Authentication Requirements and Functions, HMAC, Digital signatures, Digital Signature Schemes, Authentication Protocols, Digital Signature Standards. UNIT-IV Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key Exchange, Introduction to Elliptic Curve Cryptography.

cryptography and network security forouzan 2nd edition pdf

UNIT-II Secret Key Cryptography: Data Encryption Standard(DES), Strength of DES, Block Cipher Design Principles and Modes of Operations, Triple DES, International Data Encryption algorithm, Blowfish, CAST-128,AES UNIT-III Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat s and Euler s Theorems, the Chinese Remainder Theorem, Discrete Logarithms. 1 CRYPTOGRAPHY AND NETWORK SECURITY UNIT-I Introduction: Security Attacks, Security Services, Security Mechanisms, and a Model for Network Security, Non-Cryptographic Protocol Vulnerabilities-DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities- Phishing, Buffer Overflow, Format String Attacks, SQL Injection, Basics of Cryptography Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers.










Cryptography and network security forouzan 2nd edition pdf