{"id":711,"date":"2021-10-13T18:46:36","date_gmt":"2021-10-13T18:46:36","guid":{"rendered":"https:\/\/itgeeks.in\/home\/?p=711"},"modified":"2021-10-13T18:46:38","modified_gmt":"2021-10-13T18:46:38","slug":"2k6-cs-802-cryptography-and-network-security","status":"publish","type":"post","link":"https:\/\/itgeeks.in\/home\/?p=711","title":{"rendered":"2K6 CS 802 CRYPTOGRAPHY AND NETWORK SECURITY"},"content":{"rendered":"\n<p><strong>Module 1 (14Hrs)<\/strong><br>Divisibility &#8211; The division algorithms- gcd, lcm, primes- Fundamental theorem of arithmetic- Euler function, Congruence- Complete residue system- Reduced residue system- Euler theorem- Fermatt&#8217;s little theorem- Wilson&#8217;s theorem- The Chinese reminder theorem- Quadratic Residues &#8211; Legendre symbol<br><strong>Module II (12 Hrs)<\/strong><br>Security goals \u2013 Attacks \u2013 Services and Mechanisms \u2013 Techniques \u2013 Symmetric key encryption \u2013 Introduction \u2013 Substitution and Transposition ciphers \u2013 Stream and block ciphers \u2013Modern symmetric key ciphers-DES-Structure, Analysis ,Security-AES- Introduction, AES Ciphers .<br><strong>Module III (12 Hrs)<\/strong><br>Asymmetric key Cryptography \u2013 Introduction \u2013 RSA cryptosystem \u2013 Rabin cryptosystem \u2013 Elgamal Cryptosystem \u2013 Elliptic Curve Cryptosystem Message Integrity \u2013 Message Authentication \u2013 Hash Functions \u2013 SHA 512 \u2013 Digital Signature \u2013 Digital Signature Schemes \u2013Entity authentication , Introduction.<br><strong>Module IV (12 Hrs)<\/strong><br>E mail Security \u2013 PGP &amp; S\/MIME \u2013 Transport layer Security \u2013 SSL &amp; TLS \u2013 Network layer security \u2013 IP Sec<\/p>\n\n\n\n<p><strong>Text books<\/strong><br>1.<a href=\"https:\/\/itgeeks.in\/home\/?p=476\">\u00a0An Introduction to the theory of numbers. Ivan Niven, Herbert S Zuckerman, Hugh L Montgomery- Wiely Student Edition<\/a><br>2.\u00a0<a href=\"https:\/\/itgeeks.in\/home\/?p=712\">Cryptography and Network Security, Behrouz A. Forouzan, Tata McGraw-Hill<\/a><br><strong>Reference books<\/strong>\u00a01.<br>1 Elementary Theory of Numbers- C Y Hsuing &#8211; Allied publishers Tom M Apostol Introduction to analytic Number Theory &#8211; Springer International Student Edition<br>2.<a href=\"https:\/\/itgeeks.in\/home\/?p=476\">Niven I., Zuckerman H.S. and Montgomery H. L., An Introduction to the Theory of Numbers, John Wiley and Sons.<\/a><br>3<a href=\"https:\/\/itgeeks.in\/home\/?p=478\">.Stallings W., Cryptography and Network Security: Principles and Practice, Pearson Education Asia.<\/a><br>4.<a href=\"https:\/\/itgeeks.in\/home\/?p=480\">Mano W., Modern Cryptography: Theory &amp; Practice, Pearson Education. D. A. Burton<\/a>,<br>5.Ele<a href=\"https:\/\/itgeeks.in\/home\/?p=484\">mentary Number Theory, 6\/e, Tata McGraw Hill.  Delfs H. and Knebel H., Introduction to Cryptography: Principles and Applications, Springer.<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/itgeeks.in\/home\/?p=205\">S8 QUESTION PAPERS<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/itgeeks.in\/home\/?p=718\">Notes<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Module 1 (14Hrs)Divisibility &#8211; The division algorithms- gcd, lcm, primes- Fundamental theorem of arithmetic- Euler function, Congruence- Complete residue system-<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36,23,9,8],"tags":[7],"class_list":["post-711","post","type-post","status-publish","format-standard","hentry","category-ku-s8-cse","category-ku-syb-s8","category-ku-syllabus","category-syllabus","tag-kannur-university"],"_links":{"self":[{"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/posts\/711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=711"}],"version-history":[{"count":1,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/posts\/711\/revisions"}],"predecessor-version":[{"id":720,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=\/wp\/v2\/posts\/711\/revisions\/720"}],"wp:attachment":[{"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itgeeks.in\/home\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}