Download Model question papers & previous years question papers

Posted Date: 19 Mar 2011      Posted By:: CH.Basaveswara Rao    Member Level: Silver    Points: 5 (Rs. 1)

2009 Acharya Nagarjuna University B.Tech Computer Science and Engineering Network security syllabus Question paper



Course: B.Tech Computer Science and Engineering   University/board: Acharya Nagarjuna University





NETWORK SECURITY CREDITS : 4
UNIT I:
Overview: Services, Mechanisms & Attacks, The OSI security architecture, A model for Network Security.
Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor
Machines, Steganography.
Block Ciphers & The data encryption Standard: DES, Differential and Linear Cryptanalysis, Block Cipher Modes of
Operations.
Advanced Encryption Standard: Evaluation Criteria, AES Cipher.(11)
UNIT II:
Contemporary Symmetric Ciphers: Triples DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers.
Introduction to Number Theory: Fermat's and Euler's Theorems.
Public Key Cryptography and RSA: Principles of Public Key Crypto Systems. RSA Algorithm (11)
UNIT III:
Key Management: Deffie-Hellman Key Exchange, Elliptic Curve Arithmetic and Cryptography.
Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message
Authentication Codes, Hash Functions.
Hash Algorithms: MD5 Message Digest Algorithm, Secure Hash Algorithm. (11)
UNIT IV:
Digital Signatures & Authentication: Digital Signatures , Authentication Protocols, Digital Signature
Standards.
Authentication Applications: Kerberos, X.509 Authentication Service.
Electronic Mail Security: Pretty Good Privacy, S/MIME.
(11)
UNIT V:
IP Security, Web Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations, Key Management, Secure Sockets Layer & Transport Layer Security.
Firewalls: Firewall Design Principles, Trusted Systems. (11)
Text Book:
William Stallings, "Cryptography and Network Security", 3rd Edition, LPE.
Reference Books:
1) Kahate, "Cryptography and Network Security", PHI.
2) Charlie Kaufman, Radia Perlman, Mike Speciner, "Network Security" , 2nd Edition, LPE.





Return to question paper search

Next Question Paper: Inernet programming-2008

Previous Question Paper: Embedded systems syllabus

Related Question Papers:


  • Microprocessor


  • Software engineering


  • Automata theory and formal languages


  • Unix programming


  • Software engineering


  • Categories


    Submit Previous Years University Question Papers and make money from adsense revenue sharing program

    Are you preparing for a university examination? Download model question papers and practise before you write the exam.

    Awards & Gifts
    Active Members
    TodayLast 7 Daysmore...

    Online Members

    baba
    More...
    ISC Technologies, Kochi - India. Copyright © All Rights Reserved.