CB3491 Cryptography and Cyber Security Notes
Download CB3491 Cryptography and Cyber Security Books, Lecture Notes, Part-A 2 marks with answers, Part-B 16 marks Questions, PDF Books. In this Notes Very Useful for Third Year Fifth Semester Students.
“CB3491 Cryptography and Cyber Security Books”
“CB3491 Cryptography and Cyber Security Lecture Notes”
“CB3491 Cryptography and Cyber Security Study Material”
“CB3491 Cryptography and Cyber Security Notes”
Subject Info:
Semester | Fifth Semester |
Department | CSE |
Year | Third Year |
Regulation | R 2021 |
Subject Code / Name | CB3491 Cryptography and Cyber Security |
Content | Local Authors Books, Lecture Notes |
Syllabus:
CB3491 Cryptography and Cyber Security
UNIT I INTRODUCTION TO SECURITY
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution techniques, Transposition techniques, Steganography – Foundations of modern cryptography: Perfect security – Information Theory – Product Cryptosystem – Cryptanalysis.
UNIT II SYMMETRIC CIPHERS
Number theory – Algebraic Structures – Modular Arithmetic – Euclid‘s algorithm – Congruence and matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS: SDES – Block Ciphers – DES, Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Pseudorandom Number Generators – RC4 – Key distribution.
UNIT III ASYMMETRIC CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -– Elliptic curve arithmetic – Elliptic curve cryptography.
UNIT IV INTEGRITY AND AUTHENTICATION ALGORITHMS
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function: HMAC, CMAC – SHA – Digital signature and authentication protocols – DSS – Schnorr Digital Signature Scheme – ElGamal cryptosystem – Entity Authentication: Biometrics, Passwords, Challenge Response protocols – Authentication applications – Kerberos MUTUAL TRUST: Key management and distribution – Symmetric key distribution using symmetric and asymmetric encryption – Distribution of public keys – X.509 Certificates.
UNIT V CYBER CRIMES AND CYBER SECURITY
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud Security – Web Security – Wireless Security
CB3491 Cryptography and Cyber Security Lecture Notes
CB3491 Lecture Notes Collection 01 – DOWNLOAD
CB3491 Lecture Notes Collection 02 – DOWNLOAD
CB3491 Lecture Notes Collection 03 – DOWNLOAD
CB3491 Lecture Notes Collection 04 – DOWNLOAD
CB3491 Lecture Notes Collection 05 – DOWNLOAD
CB3491 Cryptography and Cyber Security Important Questions
UNIT I INTRODUCTION TO SECURITY
- Perfect security Information Theory, Product Cryptosystem-Cryptanalysis ***
- The OSI Security Architecture Security Attacks Security Services and Mechanisms **
- A Model for Network Security Classical encryption techniques
UNIT II SYMMETRIC CIPHERS
- Evaluation criteria for AES-Pseudorandom Number Generators
- Block cipher design principles, mode of operation
- Euclid’s algorithm Congruence and matrices Group, Rings***
UNIT III ASYMMETRIC CRYPTOGRAPHY
- Euler’s totient function, Fermat’s and Euler’s Theorem. Chinese Remainder Theorem Exponentiation and logarithm (algorithm and sums also may be asked based on this expected part c too)****
- RSA cryptosystem, Key distribution – Key management Diffie Hellman key exchange
- Elliptic curve arithmetic – Elliptic curve cryptography. **
UNIT IV INTEGRITY AND AUTHENTICATION ALGORITHMS
- HMAC, CMAC-SHA**
- ElGamal cryptosystem Entity Authentication: Biometrics, Passwords, Challenge Response
- TRUST Key management and distribution Symmetric key distribution using symmetric and asymmetric encryption Distribution of public keys-X.509 Certificates***
UNIT V CYBER CRIMES AND CYBER SECURITY
- Network Access Control Wireless Security**
- Cyber Crime and Information Security classifications of Cyber Crimes Cracking, Keyloggers, SQL Injection ***
CB3491 Cryptography and Cyber Security Question Papers
CB3491 Cryptography and Cyber Security QP NOV 2023 – DOWNLOAD
CB3491 Cryptography and Cyber Security QP APR 2024 – DOWNLOAD