5th Sem, Computer Networking Diploma

35353: Cryptography and Network Security Comp Networking 5th Sem Syllabus for Diploma TNDTE M Scheme

Cryptography and Network Security detail TNDTE Diploma syllabus for Computer Networking (CN), M scheme is extracted from TNDTE official website and presented for diploma students. The course code (35353), and for exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below. The syllabus PDFs can be downloaded from official website.

For all other comp networking 5th sem syllabus for diploma m scheme tndte you can visit Comp Networking 5th Sem Syllabus for Diploma M Scheme TNDTE Subjects. The detail syllabus for cryptography and network security is as follows.

Rationale:

Computer security is one of the most important and relevant area of computing today. The requirement to address security in computer system design is an important design consideration in many of today’s system. It is essential to understand various threats to

secure computing and the basic security design principles and techniques developed to address these threat to confidentiality, integrity and availability. This course will introduce basic cryptography, fundamentals of computer/network security, risks faced by computers and networks ,security mechanisms, operating system security ,secure systems design principles, and information and information systems within organizations .It focuses on concepts and methods associated with planning managing and auditing security at all levels including networks.

Objectives:

On completion of the following units of syllabus contents, the students must be able to

  • Understand the risks faced by Computer Systems and the nature of common Information hazard.
  • Identify the potential threats to confidentiality, integrity and availability of Computer system
  • Understand the working of standard security mechanisms.
  • Use cryptography algorithms and protocols to achieve Computer Security.
  • Understand the threats and security mechanisms for Computer Networks.

Unit 1

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

Unit 2

Symmetric Key Algorithms And Aes

  1. Algorithm Types and Modes:
  2. Stream ciphers – Block ciphers – Electronic Code Book ( ECB) mode – Cipher Block chaining ( CBC) mode – Cipher feedback ( CFB) mode – Output feedback (OFB) mode – Advantages and Disadvantages of various modes – Internal Data Encryption Algorithm ( IDEA) and RCS.

  3. Advanced Encryption Standard :
  4. Introduction – Operation

Unit 3

Asymmetric Key Algorithms , Digital Signatures And Rsa

  1. Asymmetric Key Algorithms :
  2. Basic history of Asymmetric key cryptography – RSA Algorithm

  3. Digital Signature :
  4. Basic – Message Digests – Ideas of Message Digests -Requirements of a message Digest – MDS – Working principle – Secure Hash Algorithm ( SHA) – Message Authentication code ( MAC) – Digital Signature Techniques authenticity and integrity of a certificate

Unit 4

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

Unit 5

User Authentication And Kerberos

  1. Introduction :
  2. Authentication Basics – Passwords – Clear text passwords -Something derived from passwords – Message digests of password – pass word encryption – password selection strategies – Components of a good pass word.

  3. Authentication Tokens:
  4. Introduction – Authentication token types -Certificate based authentication – Usage of smart cards – Biometric authentication

  5. Kerberos:
  6. Introduction – Working principle – Key Distribution center ( KDC.

Text Books:

  1. Cryptography and Network security Atul Kahate YMH Second Edition
  2. Principles of computer security and Beyond Wm.Arthur Cokin Dwayne Williams Gregory B. White RogerL.Davis Chuck Cothren Mc Graw Hill Technology Eduction Intenational Edition 2005
  3. Cryptography and Network security William Stallings PHI 2002

Reference Books:

For complete syllabus and results, class timetable and more pls download iStudy Syllabus App. It’s a lightweight, easy to use, no images, no pdfs platform to make students life easier.

For detail syllabus of all other subjects of BE Comp Networking, M scheme do visit Comp Networking 5th Sem syllabus for M scheme.

Dont forget to download iStudy Syllabus App for latest syllabus and results, class timetable and more.

Leave a Reply

Your email address will not be published. Required fields are marked *

*