sc JNTUH B.TECH R18 4-1 Syllabus For Cryptography and network security PDF 2022 – Cynohub

# JNTUH B.TECH R18 4-1 Syllabus For Cryptography and network security PDF 2022

### Get Complete Lecture Notes for Cryptography and network security on Cynohub APP

You will be able to find information about Cryptography and network security along with its Course Objectives and Course outcomes and also a list of textbook and reference books in this blog.You will get to learn a lot of new stuff and resolve a lot of questions you may have regarding Cryptography and network security after reading this blog. Cryptography and network security has 5 units altogether and you will be able to find notes for every unit on the CynoHub app. Cryptography and network security can be learnt easily as long as you have a well planned study schedule and practice all the previous question papers, which are also available on the CynoHub app.

All of the Topic and subtopics related to Cryptography and network security are mentioned below in detail. If you are having a hard time understanding Cryptography and network security or any other Engineering Subject of any semester or year then please watch the video lectures on the official CynoHub app as it has detailed explanations of each and every topic making your engineering experience easy and fun.

### Cryptography and network security Unit One

#### UNIT – I

Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

### Cryptography and network security Unit Two

#### UNIT – II

Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

### Cryptography and network security Unit Three

#### UNIT – III

Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure

### Cryptography and network security Unit Four

#### UNIT – IV

Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security

### Cryptography and network security Unit Five

#### UNIT – V

E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.

### Cryptography and network security Course Objectives

Explain the objectives of information security
Explain the importance and application of each of confidentiality, integrity, authentication and availability
Understand various cryptographic algorithms.
Understand the basic categories of threats to computers and networks
Describe public-key cryptosystem.
Describe the enhancements made to IPv4 by IPSec
Understand Intrusions and intrusion detection
Discuss the fundamental ideas of public-key cryptography.
Generate and distribute a PGP key pair and use the PGP package to send an encrypted e- mail message.
Discuss Web security and Firewalls

### Cryptography and network security Course Outcomes

Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.
Ability to identify information system requirements for both of them such as client and server.
Ability to understand the current legal issues towards information security.

### Cryptography and network security Text Books

Cryptography and Network Security – Principles and Practice: William Stallings, Pearson Education, 6th Edition
Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition

### Cryptography and network security Reference Books

Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
Information Security, Principles, and Practice: Mark Stamp, Wiley India.
Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
Introduction to Network Security: Neal Krawetz, CENGAGE Learning
Network Security and Cryptography: Bernard Menezes, CENGAGE Learning