Download Model question papers & previous years question papers

Posted Date: 19 Mar 2011      Posted By:: CH.Basaveswara Rao    Member Level: Silver  Points: 5 (Rs. 1)

2009 Acharya Nagarjuna University B.Tech Computer Science and Engineering Network security syllabus Question paper



Course: B.Tech Computer Science and Engineering   University/board: Acharya Nagarjuna University





NETWORK SECURITY CREDITS : 4
UNIT I:
Overview: Services, Mechanisms & Attacks, The OSI security architecture, A model for Network Security.
Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor
Machines, Steganography.
Block Ciphers & The data encryption Standard: DES, Differential and Linear Cryptanalysis, Block Cipher Modes of
Operations.
Advanced Encryption Standard: Evaluation Criteria, AES Cipher.(11)
UNIT II:
Contemporary Symmetric Ciphers: Triples DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers.
Introduction to Number Theory: Fermat's and Euler's Theorems.
Public Key Cryptography and RSA: Principles of Public Key Crypto Systems. RSA Algorithm (11)
UNIT III:
Key Management: Deffie-Hellman Key Exchange, Elliptic Curve Arithmetic and Cryptography.
Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message
Authentication Codes, Hash Functions.
Hash Algorithms: MD5 Message Digest Algorithm, Secure Hash Algorithm. (11)
UNIT IV:
Digital Signatures & Authentication: Digital Signatures , Authentication Protocols, Digital Signature
Standards.
Authentication Applications: Kerberos, X.509 Authentication Service.
Electronic Mail Security: Pretty Good Privacy, S/MIME.
(11)
UNIT V:
IP Security, Web Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations, Key Management, Secure Sockets Layer & Transport Layer Security.
Firewalls: Firewall Design Principles, Trusted Systems. (11)
Text Book:
William Stallings, "Cryptography and Network Security", 3rd Edition, LPE.
Reference Books:
1) Kahate, "Cryptography and Network Security", PHI.
2) Charlie Kaufman, Radia Perlman, Mike Speciner, "Network Security" , 2nd Edition, LPE.





Return to question paper search

Next Question Paper: Inernet programming-2008

Previous Question Paper: Embedded systems syllabus

Related Question Papers:


  • Microprocessor


  • Software engineering


  • Automata theory and formal languages


  • Unix programming


  • Software engineering


  • Categories


    Submit Previous Years University Question Papers and make money from adsense revenue sharing program

    Are you preparing for a university examination? Download model question papers and practise before you write the exam.


    Complete the action items below to enter to win an iPad Mini from India Study Channel! in India Study Channel - Locker on LockerDome
    Awards & Gifts
    Active Members
    TodayLast 7 Daysmore...

     
    ISC Technologies, Kochi - India. © All Rights Reserved.

    
    
    
    

    Click the "Follow" button above to follow Tony John