WELCOME TO TECHNICAL PUBLICATIONS
You have no items in your shopping cart.
Close
Filters
Search

Decode Network Security & Cryptography for JNTU-H 16 Course (IV - II - ECE - EC851PE)

SKU: 9789389750850
V. S. Bagad, I. A. Dhotre ISBN 9789389750850 Buy E-book Buy Kindle Edition Buy Printed Book
₹ 210.00
+ -

UNIT - I Security Services, Mechanisms and Attacks, A Model for Internetwork security, Classical Techniques : Conventional Encryption model, Steganography, Classical Encryption Techniques. Modern Techniques : Simplified DES, Block Cipher Principles, Data Encryption standard, Strength of DES, Block Cipher Design Principles. (Chapter - 1) UNIT - II Encryption : Triple DES, International Data Encryption algorithm, Blowfish, RC5, Characteristics of Advanced Symmetric block Ciphers. Placement of Encryption function, Traffic confidentiality, Key distribution, Random Number Generation. (Chapter - 2) UNIT - III Public Key Cryptography : Principles, RSA Algorithm, Key Management, Diffie-Hellman Key exchange, Elliptic Curve Cryptograpy. Number Theory : Prime and Relatively prime numbers, Modular arithmetic, Fermat’s and Euler’s theorems, Testing for primality, Euclid’s Algorithm, the Chinese remainder theorem, Discrete logarithms. (Chapter - 3) UNIT - IV Message Authentication and Hash Functions : Authentication requirements and functions, Message Authentication, Hash functions, Security of Hash functions and MACs. Hash and Mac Algorithms : MD-5, Message digest Algorithm, Secure Hash Algorithm. Digital signatures and Authentication protocols : Digital signatures, Authentication Protocols, Digital signature standards. Authentication Applications : Kerberos, Electronic Mail Security: Pretty Good Privacy, SIME/MIME. (Chapter - 4) UNIT - V IP Security : Overview, Architecture, Authentication, Encapsulating Security Payload, Key Management. Web Security : Web Security requirements, Secure sockets layer and Transport layer security, Secure Electronic Transaction. Intruders, Viruses and Worms : Intruders, Viruses and Related threats. Fire Walls : Fire wall Design Principles, Trusted systems. (Chapter - 5)

UNIT - I Security Services, Mechanisms and Attacks, A Model for Internetwork security, Classical Techniques : Conventional Encryption model, Steganography, Classical Encryption Techniques. Modern Techniques : Simplified DES, Block Cipher Principles, Data Encryption standard, Strength of DES, Block Cipher Design Principles. (Chapter - 1) UNIT - II Encryption : Triple DES, International Data Encryption algorithm, Blowfish, RC5, Characteristics of Advanced Symmetric block Ciphers. Placement of Encryption function, Traffic confidentiality, Key distribution, Random Number Generation. (Chapter - 2) UNIT - III Public Key Cryptography : Principles, RSA Algorithm, Key Management, Diffie-Hellman Key exchange, Elliptic Curve Cryptograpy. Number Theory : Prime and Relatively prime numbers, Modular arithmetic, Fermat’s and Euler’s theorems, Testing for primality, Euclid’s Algorithm, the Chinese remainder theorem, Discrete logarithms. (Chapter - 3) UNIT - IV Message Authentication and Hash Functions : Authentication requirements and functions, Message Authentication, Hash functions, Security of Hash functions and MACs. Hash and Mac Algorithms : MD-5, Message digest Algorithm, Secure Hash Algorithm. Digital signatures and Authentication protocols : Digital signatures, Authentication Protocols, Digital signature standards. Authentication Applications : Kerberos, Electronic Mail Security: Pretty Good Privacy, SIME/MIME. (Chapter - 4) UNIT - V IP Security : Overview, Architecture, Authentication, Encapsulating Security Payload, Key Management. Web Security : Web Security requirements, Secure sockets layer and Transport layer security, Secure Electronic Transaction. Intruders, Viruses and Worms : Intruders, Viruses and Related threats. Fire Walls : Fire wall Design Principles, Trusted systems. (Chapter - 5)

Write your own review
  • Only registered users can write reviews
  • Bad
  • Excellent