Prepared by
S.Santhosh (Admin)
Important questions
share it a link alone
Don't waste my hardwork and valuable time
Don't share as screenshot kind request
most viewed dept will get update at first So Dont screenshot and share
PART -BUNIT -1 1. Classical Encryption techniques ,Various security mechanism2. OSI security architecture, Foundations of modern cryptographyUNIT-21. DES ,AES algorithm full topic**2. Modular arithmetic-Euclid‟s algorithm3. RAre RC4UNIT-31. Chinese Remainder Theorem **2. Diffie Hellman Key exchange algorithm**3. Elliptic curve cryptographyRare
4. Fermat‘s and Euler‘s TheoremUNIT-41. DSS and types2. Hash function algorithm (features, properties)3.Architecture and certification mechanism in kerberos and X.509
3. Client server mutual authentication
UNIT-51. PGP**
2. IP security ,Web Security
3. S/MIME
4. Types of virus (rare)
**Important and problems
4. Fermat‘s and Euler‘s Theorem
3. Client server mutual authentication
2. IP security ,Web Security
3. S/MIME
4. Types of virus (rare)
**Important and problems
PART -A
Passive and active attack
Euler's theorem
Asymmetric cryptography bad for huge data
Fermat's theorem ,Euclid's algorithm
Block size ,key size , no of rounds
RSA algorithm related sums **
Significance of Hierarchy key control
Elliptic curve
Security of Mac function
Harsh in cryptography
MAC/harsh function
Various types of authentication protocol
Fn of firewall
Threat /attacks
Apps of x.509 certificate
Classes of intruders
Roles of firewall
Service provided by PGP
Dif btwn TLS and SSL security
Botnets
Limitations of SMTP
Euler's theorem
Asymmetric cryptography bad for huge data
Fermat's theorem ,Euclid's algorithm
Block size ,key size , no of rounds
RSA algorithm related sums **
Significance of Hierarchy key control
Elliptic curve
Security of Mac function
Harsh in cryptography
MAC/harsh function
Various types of authentication protocol
Fn of firewall
Threat /attacks
Apps of x.509 certificate
Classes of intruders
Roles of firewall
Service provided by PGP
Dif btwn TLS and SSL security
Botnets
Limitations of SMTP
Don't share as screenshot -Stuff sector
**Very important questions are bolded and may be asked based on this topic
PART-C
1.Compulsory Questions {a case study where the student will have to read and analyse the subject }mostly asked from unit 1, 5(OR) a situation given and you have to answer on your own
Don't share as screenshot -Stuff sector
**Very important questions are bolded and may be asked based on this topic
don't waste my hardwork and valuable time
Contact uS for more updates
*These questions are expected for the exams This may or may not be asked for exams All the best.... from admin Santhosh
Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates ~$tuff$£ctorSYllabuSUNIT I INTRODUCTION
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclid‟s algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 –
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.
UNIT I INTRODUCTION
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclid‟s algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 –
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.