RGTU/RGPV MCA Network Security Syllabus MCA 5th -Fifth sem Network Security Syllabus MCA-505 Elective-III : EIII (e)

siteowner 10:56 AM
RGTU/RGPV MCA-505 Elective-III : EIII (e) Network Security Syllabus
MCA 5th Sem Network Security Syllabus
MCA 5th - Fourth Semester Syllabus

MCA-505 Elective-III : EIII (e) Network Security Course Contents:

UNIT-I
  • Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, tranposition techniques, rotor machines, steganography.
  • Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design principles, block cipher modes of operation.
  • Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher.
  • Contemporary symmetric ciphers: Triple DES, blowfish.
  • Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.
UNIT-II
  • Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
  • Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
  • Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange, elliptic curve arithmetic, and elliptic curve cryptography.
UNIT-III
  • Message authentication and Hash function : Authentication Requirements, Authentication functions, message authentication codes, hash functions, security of hash function and MACs.
  • Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
  • Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
  • Authentication Applications: Kerberos, X.509 Authentication service.
UNIT-IV
  • Electronic Mail Security: Pretty Good privacy, S/MIME.
  • IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
  • Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.
UNIT-V
  • Part four system security: Intruders, intrusion detection, and password management.
  • Malicious software: Viruses and related threats, virus countermeasures.
  • Firewalls: Firewall Design Principles, Trusted systems.
BOOKS
1. William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
2. W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
3. Kanfren “Network Secirity : Private Communications in a public world 2/e
4. Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
5. Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg Network Secirity : The Complete Reference “ Tata McGraw Hill.
6. Eric Maiwald “Fundamentals of Network Security” Wiley India.

Artikel Terkait

Previous
Next Post »