Gujarat Technological University: Information Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

GUJARAT TECHNOLOGICAL UNIVERSITY

B. E. SEMESTER: VI

Information Technology
Subject Name: Information Security
Sr. No 1. Course Content Conventional Encryption: Conventional Encryption Model, Steganography, Classical Encryption Techniques Conventional Encryption Techniques: Simplified Des, Block Cipher Principles, Data Encryption Standards, Differential And Linear Cryptography Principles, Block Cipher Design Principles, Modes Of Operations, Algorithms Like Triple Des, International Data Encryption Algorithm, Blowfish, Rc5, Cast-128, Rc2, Characteristics Of Advanced Symmetrical Block Cipher, Issues Of Conventional Encryption Like Traffic Distribution, Random Number Generation, Key Distribution Public Key Cryptography:Principles Of Public-Key Cryptography, RSA Algorithm, Key Management, Elliptic Curve Cryptography, Diffie-Hellman Key Exchange Number Theory:Prime And Relative Prime Numbers, Modular Arithmetic, Eulers Theorem, Euclids Algorithm, Discrete Logarithm Tics Message Authentication And Hash Functions:Authentication Requirement, Functions, Message Authentication Code, Hash Functions, Security Of Hash Functions And Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm, Ripemd-160, Hmac Introduction To E-Commerce: Introduction To E-Commerce, Transactions Requirement Of Security On E-Commerce Total Hrs. 04

2.

14

3.

08

4.

04

5.

06

6.

On

E-Commerce,

04

7.

Network Security: Digital Signatures, Authentication Protocols, Digital Signature Standards, Application Authentication Techniques Like Kerberos, X.509 Directory Authentication Services, Active Directory Service Of Windows NT/Windows 2000 IP Security E-Mail Security: IP Security Overview, Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Association, Key Management, Pretty Good Privacy, S/Mime And Types Web Security: Web Security Requirement, SSL And Transport Layer Security, Secure Electronic Transactions, Firewall Design Principles, Trusted Systems

10

8.

08

9.

06

Text Book: 1. Cryptography And Network Principles And Practice Fourth Edition, William
Stallings, Pearson

References Books:
1 2 3 4 Cryptography & Network Security, Forouzan, Mukhopadhyay, McGrawHill Cryptography and Network Security (2nd Ed.), Atul Kahate, TMH Information Systems Security, Godbole, Wiley-India Information Security Principles and Practice, Deven Shah, Wiley-India

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy