{"id":5784,"date":"2018-01-24T08:38:55","date_gmt":"2018-01-24T08:38:55","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=5784"},"modified":"2020-06-16T12:39:57","modified_gmt":"2020-06-16T12:39:57","slug":"cns-syllabus-cryptography-network-security-jntuh-b-tech-2016-17-r16","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/cns-syllabus-cryptography-network-security-jntuh-b-tech-2016-17-r16\/","title":{"rendered":"CNS Syllabus (Cryptography and Network Security) JNTUH B.Tech 2016-17 (R16)"},"content":{"rendered":"<p>CNS Syllabus (Cryptography and Network Security) for JNTUH B.Tech III year II sem is covered here. This gives the details about credits, number of hours, and other details along with reference books for the course.<\/p>\n<h3>CNS Syllabus JNTUH 2016-17 (R16)<\/h3>\n<p>B.Tech. III Year II Sem. \u00a0 L\/T\/P\/C<br \/>\nCourse Code:CS603PC \u00a0 \u00a0 \u00a0 \u00a04\/0\/0\/4<\/p>\n<p><strong>Course Objectives:<\/strong><\/p>\n<ul>\n<li>Explain the objectives of information security<\/li>\n<li>Explain the importance and application of each of confidentiality, integrity,\u00a0authentication and availability<\/li>\n<li>Understand various cryptographic algorithms.<\/li>\n<li>Understand the basic categories of threats to computers and networks<\/li>\n<li>Describe public-key cryptosystem.<\/li>\n<li>Describe the enhancements made to IPv4 by IPSec<\/li>\n<li>Understand Intrusions and intrusion detection<\/li>\n<li>Discuss the fundamental ideas of public-key cryptography.<\/li>\n<li>Generate and distribute a PGP key pair and use the PGP package to send an encrypted\u00a0e-mail message.<\/li>\n<li>Discuss Web security and Firewalls<\/li>\n<\/ul>\n<p><strong>Course Outcomes:<\/strong><\/p>\n<ul>\n<li>Student will be able to understand basic cryptographic algorithms, message and web\u00a0authentication and security issues.<\/li>\n<li>Ability to identify information system requirements for both of them such as client\u00a0and server.<\/li>\n<li>Ability to understand the current legal issues towards information security.<\/li>\n<\/ul>\n<p><strong>UNIT \u2013 I: \u00a0Security Concepts:<\/strong> Introduction, The need for security, Security approaches, Principles of\u00a0security, Types of Security attacks, Security services, Security Mechanisms, A model for\u00a0Network Security\u00a0Cryptography Concepts and Techniques: Introduction, plain text and cipher text,\u00a0substitution techniques, transposition techniques, encryption and decryption, symmetric and\u00a0asymmetric key cryptography, steganography, key range and key size, possible types of\u00a0attacks.<\/p>\n<p><strong>UNIT \u2013 II:\u00a0Symmetric key Ciphers:<\/strong> Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block\u00a0cipher operation, Stream ciphers, RC4.\u00a0Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal\u00a0Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.<\/p>\n<p><strong>UNIT \u2013 III: \u00a0Cryptographic Hash Functions:<\/strong> Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital\u00a0signatures, Elgamal Digital Signature Scheme.\u00a0Key Management and Distribution: Symmetric Key Distribution Using Symmetric &amp;\u00a0Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication\u00a0Service, Public \u2013 Key Infrastructure<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p><strong>TEXT BOOKS:<\/strong><\/p>\n<ul>\n<li>Cryptography and Network Security \u2013 Principles and Practice: William Stallings,\u00a0Pearson Education, 6th Edition<\/li>\n<li>Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd\u00a0Edition<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOKS:<\/strong><\/p>\n<ul>\n<li>Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan,\u00a0Wiley India, 1st Edition.<\/li>\n<li>Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd\u00a0Edition<\/li>\n<li>Information Security, Principles, and Practice: Mark Stamp, Wiley India.<\/li>\n<li>Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH<\/li>\n<li>Introduction to Network Security: Neal Krawetz, CENGAGE Learning<\/li>\n<li>Network Security and Cryptography: Bernard Menezes, CENGAGE Learning<\/li>\n<\/ul>\n<p>For all other B.Tech 3rd Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-third-year-second-sem-computer-science-engineering-course-structure-2016-2017-r16-batch\/\">JNTUH B.Tech Computer Science and Engineering 3rd\u00a0Year 2nd Sem Course Structure for (R16) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on Facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free to drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CNS Syllabus (Cryptography and Network Security) for JNTUH B.Tech III year II sem is covered here. This gives the details about credits, number of hours, and other details along with [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-5784","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=5784"}],"version-history":[{"count":6,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5784\/revisions"}],"predecessor-version":[{"id":22184,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5784\/revisions\/22184"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=5784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=5784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=5784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}