Failure will never overtake me if my determination to succeed is strong enough.
--Your friends at LectureNotes

Cryptography And Network Security

by Shriram Nishad
Type: NoteInstitute: AKTU Course: B.Tech Specialization: Computer Science EngineeringOffline Downloads: 12Views: 292Uploaded: 23 days agoAdd to Favourite

Touch here to read

Cryptography And Network Security by Shriram Nishad

Shriram Nishad
Shriram Nishad

/ 171

Share it with your friends

Suggested Materials

Leave your Comments


Shriram Nishad
Shriram Nishad
CRYPTOGRAPHY AND NETWORK SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology Department of Computer Science and Engineering & Information Technology Veer Surendra Sai University of Technology (Formerly UCE, Burla) Burla, Sambalpur, Odisha Lecture Note Prepared by: Prof. D. Chandrasekhar Rao Dr. Amiya Kumar Rath Dr. M. R. Kabat
DISCLAIMER This document does not claim any originality and cannot be used as a substitute for prescribed textbooks. The information presented here is merely a collection by the committee members for their respective teaching assignments. Various sources as mentioned at the end of the document as well as freely available material from internet were consulted for preparing this document. The ownership of the information lies with the respective authors or institutions.
BCS- CRYPTOGRAPHY AND NETWORK SECURITY (3-0-1) Credit-4 Module I ( 12 LECTURES) Introduction to the Concepts of Security: The need for security, Security Approaches, Principles of Security, Types of Attacks. Cryptographic Techniques: Plain Text and Cipher Text, Substitution Techniques, Transposition Techniques, Encryption and Decryption, Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and Key Size, Possible Types of Attacks. Module II ( 8 LECTURES) Computer-based Symmetric Key Cryptographic Algorithms: Algorithm Types and Modes, An overview of Symmetric Key Cryptography, DES, International Data Encryption Algorithm (IDEA), RC5, Blowfish, AES, Differential and Linear Cryptanalysis. Module III ( 8 LECTURES) Computer-based Asymmetric Key Cryptography: Brief History of Asymmetric Key Cryptography, An overview of Asymmetric Key Cryptography, The RSA Algorithm, Symmetric and Asymmetric Key Cryptography Together, Digital Signatures, Knapsack Algorithm, Some other Algorithms. Module IV ( 12 LECTURES) Public Key Infrastructure: Digital Certificates, Private Key Management, The PKIX Model, Public Key Cryptography Standards, XML, PKI and Security. Internet Security Protocols: Basic Concepts, Secure Socket Layer, SHTTP, Time Stamping Protocol, Secure Electronic Transaction, SSL versus SET, 3-D Secure Protocol, Electronic Money, E-mail Security, Wireless Application Protocol (WAP) Security, Security in GSM. Text Books: 1. Cryptography and Network Security – by Atul Kahate – TMH. 2. Data Communications and Networking- by Behourz A Forouzan Reference Book: 1. Cyber Security Operations Handbook – by J.W. Rittiaghouse and William M.Hancok – Elseviers.

Lecture Notes