INFORMATION SECURITY NOTES | IS Student Notes | JNTU

INFORMATION SECURITY NOTES | IS Student Notes | JNTU

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY (JNTU)

(IS) INFORMATION SECURITY  - STUDENT NOTES

PDF/DOC FREE DOWNLOAD

 

Unit-I Computer Security concepts: 
Download: Google Drive LInk(Written Notes): Download 

Unit-II Introduction to Number theory: 
Download: Google Drive LInk(Written Notes): Download

Unit-III Cryptographic Hash functions:
Download: Google Drive LInk(Written Notes): Download

Unit-IV Key Management and distribution:
Download: Google Drive LInk(Written Notes): Download

Unit-V Security at the Transport Layer(SSL and TLS):
Download: Google Drive LInk: Comming Soon

 
(IS) INFORMATION SECURITY(Single PDF) All Topics:
Download: Google Drive LInk: Download



INFORMATION SECURITY SYLLABUS

Unit-I Computer Security concepts, The OSI Security Architecture, Security attacks, Security services and Security mechanisms, A model for Network Security Classical encryption techniques- symmetric cipher model, substitution ciphers, transposition ciphers, Steganography. Modern Block Ciphers: Block ciphers principles, Data encryption standard (DES), Strength of DES, linear and differential cryptanalysis, block cipher modes of operations, AES, RC4.

Unit-II Introduction to Number theory – Integer Arithmetic, Modular Arithmetic, Matrices, Linear Congruence, Algebraic Structures, GF(2n) Fields, Primes, Primality Testing, Factorization, Chinese Remainder Theorem, Quadratic Congruence, Exponentiation and Logarithm. Public-key cryptography - Principles of public-key cryptography, RSA Algorithm, Diffie- Hellman Key Exchange, ElGamal cryptographic system, Elliptic Curve Arithmetic, Elliptic curve cryptography

Unit-III Cryptographic Hash functions: Applications of Cryptographic Hash functions, Requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA) Message Authentication Codes: Message authentication Requirements, Message authentication functions, Requirements for Message authentication codes, security of MACs, HMAC, MACs based on Block Ciphers, Authenticated Encryption Digital Signatures-RSA with SHA & DSS

Unit-IV Key Management and distribution: Symmetric key distribution using Symmetric Encryption, Symmetric key distribution using Asymmetric, Distribution of Public keys, X.509 Certificates, Public key Infrastructure. User Authentication: Remote user Authentication Principles, Remote user Authentication using Symmetric Encryption, Kerberos, Remote user Authentication using Asymmetric Encryption, Federated Identity Management, Electronic mail security: Pretty Good Privacy (PGP), S/MIME.

Unit-V Security at the Transport Layer(SSL and TLS): SSL Architecture, Four Protocols, SSL Message Formats, Transport Layer Security, HTTPS, SSH Security at the Network layer (IPSec): Two modes, Two Security Protocols,  Security Association, Security Policy, Internet Key Exchange. System Security: Description of the system, users, Trust and Trusted Systems, Buffer Overflow and Malicious Software, Malicious Programs, worms, viruses, Intrusion Detection System(IDS), Firewalls.

Text books:
1. ―Cryptography and Network Security‖, Behrouz A. Frouzan and Debdeep Mukhopadhyay, Mc Graw Hill Education, 2nd edition, 2013.
2.―Cryptography and Network Security: Principals and Practice‖, William Stallings, Pearson Education, Fifth Edition, 2013.

References:
1. ―Network Security and Cryptography‖, Bernard Menezes, Cengage Learning.
2. ―Cryptography and Security‖, C.K. Shymala, N. Harini and Dr. T.R. Padmanabhan, Wiley-India.
3. ―Applied Cryptography, Bruce Schiener, 2nd edition, John Wiley & Sons.
4. ―Cryptography and Network Security‖, Atul Kahate, TMH.
5. ‗Introduction to Cryptography‖, Buchmann, Springer.
6. ‗Number Theory in the Spirit of Ramanujan‖, Bruce C.Berndt, University Press
7. ―Introduction to Analytic Number Theory‖, Tom M.Apostol, University Press

@Credits: Syllabus Taken From JNTU 
Previous Post
Next Post
Related Posts

0 comments: