{"id":7420,"date":"2019-12-14T16:54:45","date_gmt":"2019-12-14T16:54:45","guid":{"rendered":"https:\/\/www.inspirenignite.com\/vtu\/cryptography-and-network-security-telecom-7th-sem-syllabus-for-vtu-be-2017-scheme\/"},"modified":"2019-12-14T16:54:45","modified_gmt":"2019-12-14T16:54:45","slug":"cryptography-and-network-security-telecom-7th-sem-syllabus-for-vtu-be-2017-scheme","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/vtu\/cryptography-and-network-security-telecom-7th-sem-syllabus-for-vtu-be-2017-scheme\/","title":{"rendered":"Cryptography and Network Security Telecom 7th Sem Syllabus for VTU BE 2017 Scheme"},"content":{"rendered":"<p>Cryptography and Network Security detail syllabus for Telecommunication Engineering (Telecom), 2017 scheme is taken from <a href=\"https:\/\/vtu.ac.in\/b-e-scheme-syllabus\/\" target=\"_blank\" rel=\"noopener\">VTU<\/a> official website and presented for VTU students. The course code (17TE71), and for exam duration, Teaching Hr\/week, Practical Hr\/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below.<\/p>\n<p>For all other telecom 7th sem syllabus for be 2017 scheme vtu you can visit <a href=\"..\/telecom-7th-sem-syllabus-for-be-2017-scheme-vtu\">Telecom 7th Sem syllabus for BE 2017 Scheme VTU Subjects<\/a>. The detail syllabus for cryptography and network security is as follows.<\/p>\n<p><h4>Course Objectives:<\/h4>\n<p> The objectives of the course is to enable students to:<\/p>\n<ul>\n<li>Understand the basics of symmetric key and public key cryptography.<\/li>\n<li>Know basic mathematical concepts and pseudorandom number generators required for cryptography.<\/li>\n<li>Understand the concepts of authentication and data integrity<\/li>\n<li>Acquire knowledge about Email, IP and Web security.<\/li>\n<\/ul>\n<p><h4>Module 1<br \/>\nFor complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a>. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>Module 2<br \/>\n<\/h4>\n<p>SYMMETRIC CIPHERS: Traditional Block Cipher structure, Data encryption standard (DES), The AES Cipher. (Text 1: Chapter 2: Section1, 2, Chapter 4: Section 2, 3, 4) ASYMMETRIC CIPHERS: Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie &#8211; Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve Cryptography (Text 1: Chapter 8, Chapter 9: Section 1, 3, 4)\n<\/p>\n<p><h4>Module 3<br \/>\n<\/h4>\n<p>One-Way Hash Functions: Background, Snefru, N-Hash, MD4, MD5, Secure Hash Algorithm [SHA],One way hash functions using symmetric block algorithms, Using public key algorithms, Choosing a one-way hash functions, Message Authentication Codes. Digital Signature Algorithm, Discrete Logarithm Signature Scheme (Text 2: Chapter 18: Section 18.1 to 18.5, 18.7, 18.11 to 18.14 and Chapter 20: Section 20.1, 20.4)\n<\/p>\n<p><h4>Module 4 <\/h4>\n<p>For complete syllabus and results, class timetable and more pls <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a>. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.<\/p>\n<p><h4>Module 5 <\/h4>\n<p>E-mail Security: Pretty Good Privacy-S\/MIME (Text 1: Chapter 17: Section 1, 2)<br \/>\nIP Security: IP Security Overview, IP Security Policy, Encapsulation Security Payload (ESP), Combining security Associations Internet Key Exchange. Cryptographic Suites (Text 1: Chapter 18)\n<\/p>\n<p><h4>Course Outcomes:<\/h4>\n<p> At the end of the course, the students will be able to:<\/p>\n<ul>\n<li>Use basic cryptographic algorithms to encrypt the data.<\/li>\n<li>Generate some pseudorandom numbers required for cryptographic applications.<\/li>\n<li>Understand concept of data authentication and integrity.<\/li>\n<li>Explain network security protocols.<\/li>\n<\/ul>\n<p><h4>Text Books:<br \/>\n<\/h4>\n<ol>\n<li>William Stallings , Cryptography and Network Security Principles and Practice, Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93-3251877-3<\/li>\n<li>Bruce Schneier, Applied Cryptography Protocols, Algorithms, and Source code in C, Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.<\/li>\n<li>Cryptography and Network Security, AtulKahate, TMH, 2003<\/li>\n<\/li>\n<\/ol>\n<p>For detail syllabus of all other subjects of BE Telecom, 2017 scheme do visit <a href=\"..\/category\/telecom+7th-sem\">Telecom 7th Sem syllabus for 2017 scheme<\/a>.<\/p>\n<p>Dont forget to <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">download iStudy<\/a> for latest syllabus and results, class timetable and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Network Security detail syllabus for Telecommunication Engineering (Telecom), 2017 scheme is taken from VTU official website and presented for VTU students. The course code (17TE71), and for exam [&hellip;]<\/p>\n","protected":false},"author":2298,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[20,47],"tags":[],"class_list":["post-7420","post","type-post","status-publish","format-standard","hentry","category-7th-sem","category-telecom"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/7420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/users\/2298"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/comments?post=7420"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/posts\/7420\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/media?parent=7420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/categories?post=7420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/vtu\/wp-json\/wp\/v2\/tags?post=7420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}