CS8792 Cyrptographgy and Network Security (CNS)

                                STuff Sector

Prepared by  
     S.Santhosh (Admin) 
Important questions 
share it a link alone

Don't waste my hardwork and valuable time
Don't share as screenshot kind request

based on views next exams questions are yet to be updated
most viewed dept will get update at first So Dont screenshot and share
CS8792 Cyrptographgy and Network Security (CNS)

PART -B
UNIT -1 
1. Classical Encryption techniques ,Various security mechanism
2. OSI security architecture, Foundations of modern cryptography
UNIT-2
1. DES ,AES algorithm full topic**
2. Modular arithmetic-Euclid‟s algorithm
3. RAre RC4
UNIT-3
1. Chinese Remainder Theorem **
2. Diffie Hellman Key exchange algorithm**
3. Elliptic curve cryptography
Rare
4. Fermat‘s and Euler‘s Theorem
UNIT-4
1. DSS and types
2. Hash function algorithm (features, properties)
3.Architecture  and certification mechanism in kerberos and X.509
3. Client server mutual authentication
UNIT-5
1. PGP**
2. IP security ,Web Security
3. S/MIME
4. Types of virus (rare)
**Important and problems

PART -A

Passive and active attack 
Euler's theorem
 Asymmetric cryptography bad for huge data
Fermat's theorem ,Euclid's algorithm
Block size ,key size , no of rounds 
 RSA algorithm related sums **
Significance of Hierarchy key control
Elliptic curve 
Security of Mac function
Harsh in cryptography
MAC/harsh function
Various types of authentication protocol
Fn of firewall
Threat /attacks 
Apps of x.509 certificate
Classes of intruders
Roles of firewall
 Service provided by PGP
Dif btwn TLS and SSL security
 Botnets
Limitations of SMTP

Don't share as screenshot -Stuff sector

**Very important questions are bolded and may be asked based on this topic

PART-C

1.Compulsory Questions {a case study where the student will have to read and analyse the subject }
mostly asked from unit 1, 5(OR) a situation given and you have to answer on your own

don't waste my hardwork and valuable time

As Engineer i think you know how to respect another
Share it as link alone . don't share it as screenshot or any text material if u found this anywhere kindly report me . #Admin   WhatsApp

Contact uS for more updates *These questions are expected for the exams This may or may not be asked for exams
    All the best.... from admin Santhosh

          Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements 
If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates                                                      ~$tuff$£ctor
SYllabuS

UNIT I INTRODUCTION 

Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclid‟s algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 –
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.

Santhosh (Admin)

TO THE ENGINEER FOR THE ENGINNEER BY AN ENGINEER Kindly join Us on social media's link at the top corner

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post