{"id":27503,"date":"2020-07-06T05:59:51","date_gmt":"2020-07-06T05:59:51","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cryptography-and-network-security-cc-7th-sem-syllabus-for-be-2017-regulation-anna-univ\/"},"modified":"2020-07-06T05:59:51","modified_gmt":"2020-07-06T05:59:51","slug":"cryptography-and-network-security-cc-7th-sem-syllabus-for-be-2017-regulation-anna-univ","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cryptography-and-network-security-cc-7th-sem-syllabus-for-be-2017-regulation-anna-univ\/","title":{"rendered":"Cryptography and Network Security C&amp;C 7th Sem Syllabus for BE 2017 Regulation Anna Univ"},"content":{"rendered":"<p>Cryptography and Network Security detail syllabus for Computer &amp; Communication Engineering (C&amp;C), 2017 regulation is taken from <a href=\"https:\/\/www.annauniv.edu\/\" style=\"color:inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for students of Anna University. The details of the course are: course code (CS8792), Category (PC), Contact Periods\/week (3), Teaching hours\/week (3), Practical Hours\/week (0). The total course credits are given in combined syllabus.<\/p>\n<p>For all other c&amp;c 7th sem syllabus for be 2017 regulation anna univ you can visit <a href=\"..\/cc-7th-sem-syllabus-for-be-2017-regulation-anna-univ\">C&amp;C 7th Sem syllabus for BE 2017 regulation Anna Univ Subjects<\/a>. The detail syllabus for cryptography and network security is as follows.&#8221;<\/p>\n<p><h4>Course Objective:<\/h4>\n<ul>\n<li>To understand Cryptography Theories, Algorithms and Systems.<\/li>\n<li>To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks.<\/li>\n<\/ul>\n<p><h4>Unit I<\/h4>\n<p>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a>. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>Unit II<\/h4>\n<p><strong>Symmetric Cryptography<\/strong><br \/>\nMATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures &#8211; Modular arithmetic-Euclid&#8221;s algorithm- Congruence and matrices &#8211; Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES &#8211; Block cipher Principles of DES &#8211; Strength of DES &#8211; Differential and linear cryptanalysis &#8211; Block cipher design principles &#8211; Block cipher mode of operation &#8211; Evaluation criteria for AES &#8211; Advanced Encryption Standard &#8211; rC4 -Key distribution.\n<\/p>\n<p><h4>Unit III<\/h4>\n<p><strong>Public Key Cryptography<\/strong><br \/>\nMATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes &#8211; Primality Testing -Factorization &#8211; Eulers totient function, Fermats and Eulers Theorem &#8211; Chinese Remainder Theorem &#8211; Exponentiation and logarithm &#8211; ASYMMETRIC KEY CIPHERS: RSA cryptosystem &#8211; Key distribution &#8211; Key management &#8211; Diffie Hellman key exchange -ElGamal cryptosystem &#8211; Elliptic curve arithmetic-Elliptic curve cryptography.\n<\/p>\n<p><h4>Unit IV<\/h4>\n<p>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a>. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>Unit V<\/h4>\n<p><strong>Security Practice and System Security<\/strong><br \/>\nElectronic Mail security &#8211; PGP, S\/MIME &#8211; IP security &#8211; Web Security &#8211; SYSTEM SECURITY: Intruders &#8211; Malicious software &#8211; viruses &#8211; Firewalls.<br \/>\nTOTAL 45 PERIODS\n<\/p>\n<p><h4>Course Outcome:<\/h4>\n<p>At the end of the course, the student should be able to:<\/p>\n<ul>\n<li>Understand the fundamentals of networks security, security architecture, threats and vulnerabilities<\/li>\n<li>Apply the different cryptographic operations of symmetric cryptographic algorithms<\/li>\n<li>Apply the different cryptographic operations of public key cryptography<\/li>\n<li>Apply the various Authentication schemes to simulate different applications.<\/li>\n<li>Understand various Security practices and System security standards<\/li>\n<\/ul>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.<\/li>\n<\/ol>\n<p><h4>References:<\/h4>\n<ol>\n<li>C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd<\/li>\n<li>BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.<\/li>\n<li>Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2<\/li>\n<\/li>\n<\/ol>\n<p>For detail syllabus of all other subjects of BE C&amp;C, 2017 regulation do visit <a href=\"..\/category\/cc+7th-sem\">C&amp;C 7th Sem syllabus for 2017 Regulation<\/a>.<\/p>\n<p>Dont forget to <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a> for latest syllabus and results, class timetable and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Network Security detail syllabus for Computer &amp; Communication Engineering (C&amp;C), 2017 regulation is taken from Anna University official website and presented for students of Anna University. The details [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[50,68],"tags":[],"class_list":["post-27503","post","type-post","status-publish","format-standard","hentry","category-7th-sem","category-cc"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/27503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=27503"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/27503\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=27503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=27503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=27503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}