Syllabus

JNTUH B.Tech 4th Year 1 sem Information Technology R13 (4-1) Information Security R13 syllabus.

JNTUH B.Tech 4th year (4-1) Information Security gives you detail information of Information Security R13 syllabus It will be help full to understand you complete curriculum of the year.

Objectives

  • Explain the objectives of information security
  • Explain the importance and application of each of confidentiality, integrity, authentication and availability
  • Understand various cryptographic algorithms.
  • Understand the basic categories of threats to computers and networks
  • Describe public-key cryptosystem.
  • Describe the enhancements made to lPv4 by IPSec
  • Understand Intrusions and intrusion detection
  • Discuss the fundamental ideas of public-key cryptography.
  • Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
  • Discuss Web security and Firewalls

UNIT—I

Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography, key range and key size, possible types of attacks.

UNIT—II

Symmetric key Ciphers: Block Cipher principles & Algorithms(DES, AES,Blowfish), Differential and Linear Cryptanalysis, Block cipher modes of operation, Stream ciphers, RC4,Location and placement of encryption function, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems1 Algorithms(RSA, Diffie-Hellman,ECC), Key Distribution

UNIT—III

Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message authentication codes, Hash Functions, Secure hash algorithm, Whirlpool, HMAC, CMAC, Digital signatures, knapsack algorithm Authentication Applications: Kerberos, X.509 Authentication Service, Public — Key Infrastructure, Biometric Authentication.

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TEXT BOOKS

  • Cryptography and Network Security : William Stallings, Pearson Education,4t” Edition.
  • Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 2nd Edition.

REFERENCE BOOKS

  • Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1’ Edition.
  • Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 2 Edition.
  • Information Security, Principles and Practice: Mark Stamp, Wiley India.
  • Principles of Computer Sceurity: WM.Arthur Conklin, Greg White, TMH.
  • Introduction to Network Security: Neal Krawetz, CENGAGE Learning.
  • Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.

Outcomes

Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.

  • Ability to identify information system requirements for both of them such as client and server.
  • Ability to understand the current legal issues towards information security.

For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.