Anna University Tiruchirappalli - 620 024
Regulations 2007 Sylllabus
M.E. COMPUTER SCIENCE AND ENGINEERING
UNIT I FUNDAMENTALS 9
Attacks – Services – Mechanisms – Conventional Encryption – Classical and Modern Techniques – Encryption Algorithms – Confidentiality.
UNIT II PUBLIC KEY ENCRYPTION 9
RSA – Elliptic Curve Cryptography – Number Theory Concepts.
UNIT III MESSAGE AUTHENTICATION 9
Hash Functions – Digest Functions – Digital Signatures – Authentication Protocols.
UNIT IV NETWORK SECURITY PRACTICE 9
Authentication– Applications – Electronic Mail Security – IP Security – Web Security.
UNIT V SYSTEM SECURITY 9
Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems.
Total: 45
TEXT BOOK
1. Stallings, “Cryptography & Network Security, Principles & Practice”, 3rd Edition, Prentice
Hall, 2002.
REFERENCES
1. Bruce, Schneier, “Applied Cryptography”, 2nd Edition, Toha Wiley & Sons, 1996.
2. Man Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger & Pfleeger, “Security in Computing”, 3rd Edition, Pearson Education, 2003.
Regulations 2007 Sylllabus
M.E. COMPUTER SCIENCE AND ENGINEERING
ELECTIVES CS5009 – NETWORK SECURITY
UNIT I FUNDAMENTALS 9
Attacks – Services – Mechanisms – Conventional Encryption – Classical and Modern Techniques – Encryption Algorithms – Confidentiality.
UNIT II PUBLIC KEY ENCRYPTION 9
RSA – Elliptic Curve Cryptography – Number Theory Concepts.
UNIT III MESSAGE AUTHENTICATION 9
Hash Functions – Digest Functions – Digital Signatures – Authentication Protocols.
UNIT IV NETWORK SECURITY PRACTICE 9
Authentication– Applications – Electronic Mail Security – IP Security – Web Security.
UNIT V SYSTEM SECURITY 9
Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems.
Total: 45
TEXT BOOK
1. Stallings, “Cryptography & Network Security, Principles & Practice”, 3rd Edition, Prentice
Hall, 2002.
REFERENCES
1. Bruce, Schneier, “Applied Cryptography”, 2nd Edition, Toha Wiley & Sons, 1996.
2. Man Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger & Pfleeger, “Security in Computing”, 3rd Edition, Pearson Education, 2003.
0 comments :
Post a Comment