Syllabus, 2nd Sem, 3rd Year, CSE

JNTUH B.Tech 3rd Year 2 sem Computer Science and Engineering R13 (3-2) Information Security R13 syllabus.

JNTUH B.Tech 3rd year (3-2) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year.

Objectives

  • Explain the objectives of information security
  • Explain the importance and application of each of confidentiality, integrity, authentication and availability
  • Understand various cryptographic algorithms.
  • Understand the basic categories of threats to computers and networks
  • Describe public-key cryptosystem.
  • Describe the enhancements made to IPv4 by IPSec
  • Understand Intrusions and intrusion detection
  • Discuss the fundamental ideas of public-key cryptography.
  • Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
  • Discuss Web security and Firewalls

UNIT -I

  • Attacks on Computers and Computer Security: Introduction, The need  for security, Security approaches, Principles of security, Types of Security  attacks, Security services, Security Mechanisms, A model for Network
    Security
  • Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks.

UNIT – II

  • Symmetric key Ciphers: Block Cipher principles & Algorithms(DES, AES, Blowfish), Differential and Linear Crypt analysis, Block cipher modes of operation, Stream ciphers, RC4,Location and placement of encryption
    function, Key distribution
  • Asymmetric key Ciphers: Principles of public key cryp to systems, Algorithms(RSA, Diffie-Hellman, ECC), Key Distribution.

UNIT – III

  • Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, CMAC, Digital signatures, knapsack algorithm
  • Authentication Applications: Kerberos, X.509 Authentication Service, Public – Key Infrastructure, Biometric Authentication.

TEXT BOOKS

  • Cryptography and Network Security : William Stallings, Pearson Education,4″‘ Edition
  • Cryptography and Network Security : Atul Kahate, Mc Graw Hill Edition

REFERENCE BOOKS

  • Cryptography and Network Security: C K Shyamala, N Harin i, Dr T R Padmanabhan, Wiley India, 1” Edition.
  • Cryptography and Network Security : Forouzan Mukhopadhyay, MC Graw Hill, 2″” Edition
  • Information Security, Principles and Practice: Mark Stamp, Wiley India.
  • Principles of Computer Security: WM.Arthur Conklin, Greg White, TMH
  • Introduction to Network Security: Neal Krawetz, CENGAGE Learning
  • Network Security and Cryptography: Bernard Menezes, CENGAGE Learning

Outcomes

  • Student will be able to understand basic cryptographic a algorithms, message and web authentication and security issues.
  • Ability to identify information system requirements for both of them such as client and server.
  • Ability to understand the current legal issues towards information security.

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.