Cryptography and Network Security: UNIT-1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CRY P TOGRA P HY A N D N E TWORK

S E CU RI TY

UNIT-1

Introduction to security attacks, services and mechanisms, Introduction to cryptology


Conventional Encryption: Conventional encryption model, classical encryption techniques-substitution
ciphers and transposition ciphers, cryptanalysis, steganography, block and stream ciphers.
Modern block ciphers :Block cipher principles, Shannon theory of confusion and diffusion, fiestal
structure, S-DES, DES, strength of DES, Differential and Linear cryptanalysis, Block cipher modes of
operations, Double DES, Tripple DES, encryption
And decryption using IDEA, strength of IDEA, confidentiality using conventional encryption ,traffic
confidentiality, key distribution, random number generation.

UNIT-II

Introduction to group, ring and field, prime and relatively prime numbers ,modular arithmetic, Fermat’s
and Euler’s theorom, primality testing, Euclid’algorithm, Chinese remainder theorom, discrete
logarithms.
Principles of public key cryptosystems, RSA algorithms, Security of RSA, key management, Diffie-
Hellman key exchange algorithm, Elgamal Encryption.

UNIT-III

Message authentication &Hash functions: Authentication requirements, authentication functions,


message authentication codes ,hash functions, birthday attacks, security of hash functions & MACS, MD5
message digest algorithm, Secure Hash Algorithm(SHA)
Digital signatures: Digital signatures, authentication protocol, Digital Signature Standard(DSS),proof of
digital signature algorithm.

UNIT-IV

Authentication applications :Kerberos &X.509,directory authentication service, E-Mail security-Pretty


Good Privacy(PGP), S/MIME.

UNIT-V

System Security :Intruders, Viruses and related threats, Firewall design principles, trusted systems

R e f e r e nc e s :
1.William Stallings ,”Cryptograghy & Network security :Principles and Practices”, PH,New Jersy.
2.Bruce Schiener., ”Applied cryptograghy”.
DI S TRI B U TE D S Y S TE M S

Unit – I

Characterization of Distributed System : Introduction, Examples of distributed systems, Resource


sharing and the Web challenges.
System Models : Architectural models, Fundamental models.
Theoretical Foundation for Distributed System : Limitation of Distributed system, absence of global
clock, shared memory, logical clocks, lamports & vectors logical clock, casual ordering of messages,
global state, termination detection.

Unit – II

Distributed Deadlock Detection : System model, resource Vs communication deadlocks, deadlock


prevention, avoidance, detection and resolution, centralized deadlock detection, distributed dead lock
detection, path pushing algorithms, edge chasing algorithms.
Agreement Protocol : Introduction, System models, classification of Agreement problem, Byzantine
agreement problem, consensus problem, Interactive consistency problem, solution of Byzantine
agreement problem, application of agreement problem, Atomic commit in Distributed Database system.

Unit – III

Distributed Objects and Remote Invocation : Communication between distributed objects, remote
procedure call, Events and notification, java RMI case study.
Security: Overview of security techniques, cryptographic algorithms, digital signatures, Cryptography
pragmatics, case studies: needham Schroeder, Kerberos, SSL & Millicent.
Distributed File Systems : File service architecture, sun network file system, the Andrew File System
Recent advances.

Unit – IV :

Transactions and Concurrency Control : Transactions, Nested ransactions, Locks, Optimistic


concurrency control, Timestamp ordering, comparison of methods for concurrency control.
Distributed Transactions : Flat and nested distributed transactions, Atomic commit protocols,
concurrency control in distributed transactions, Distributed deadlocks, Transaction recovery.
Replication:
System model and group communication, Fault – tolerant services, highly available services, Transactions
with replicated data.

Unit V :
Distributed Algorithms : Introduction to communication protocols, Balanced sliding window protocol,
Routing algorithms, Destination based routing, Deadlock free Packet switching, Introduction to Wave &
Traversal algorithms, Election algorithm.
CORBA Case Study : CORBA RMI, CORBA Services
E -COM M E RCE

UNIT 1

What is E-Commerce, Forces behind E-Commerce, E-Commerce Industry Framework, Brief History of
E-commerce. Inter organization of E- COMM, Intra organizational E-Comm. and Consumer to Business
Electronic comm.., Architectural framework.
NETWORK INFASTRUCTURE FOR E-COMM
Network Infrastructure for E-COMM, Market forces behind I-way, component of I way, access
equipment , Global information Distribution Network , Broad band telecommunication.

UNIT 2

MOBILE COMMERCE

Introduction to mobile Commerce, Mobile Computing Application, Wireless Application Protocols, Wap
technology, Mobile Information Security.
WEB SECURITY
Introduction to Web security, Firewalls & Transaction Security ,Client Server Network, Emerging Client
server security threats, Firewalls & Network Security.

UNIT 3

ENCRYPTION
World wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public key
encryption, Virtual Private Network, Implementation management issues.

UNIT 4

ELECTRONIC PAYMENTS
Overview of Electronics payment, Digital Token based electronics payment system, smart cards, credit
card/debit card based ERP, Emerging financial instruments, Home banking, online Banking.

UNIT 5

NET COMMERCE
EDI, EDI application in business, Legal requirement in E-comm., Introduction to supply chain
management, CRM, issues in customer relation management.

R e f e r e nc e s :

1 RAVI KALAKOTA, ANDREW WHINSTON “ FRONTIER OF ELECTRONIC


COMM” ADDISION WESLEY
2 SOKOL”FROM EDI TO E-COMM: A BUSINESS INITIATIVE” TMH
3 DIWAN SHARMA “E-COMMERCE” EXCEL
4 ASSET INTERNATIONAL “NET COMMERCE” TMH
E RP S YS TE M

Unit1:-

ERP Overview ,Benefit, Business Process Reengineering, Data ware Housing, Data mining, LAP, Supply
chain management

Unit 2:-

ERP-A manufacturing Perspective, ERP Module ,ERP Market, ERP implementation life cycle, Option of
various paradigms, Identification of suitable platform , Role of SDLC/SSAD ,Object oriented architecture

Unit 3:-

ERP implementation, Hidden coast, Vendor, Consultant, Employee, Human resource

Unit 4:-

ERP & e-commerce, Future Directives in ERP and internet, Critical Factors guiding selection and
evaluation, Strategies for successful implementation, Impediments and initiatives to achieve success ,and
failure factors, Integrating ERP into organizational culture.

Unit 5:-

Using ERP tool: either SAP or ORACLE format to case study.

R e f e r e nc e s :
1.A.Lexis Leon, ”Enterprise Resource Planning” TMH.
2.Brady, Manu, Wegner “Enterprise Resource Planning”, TMH
3.Jacobs “Why –ERP? A Premier on SAP Implementation”, McGraw Hill
H UM AN COM P UT E R I N T E R A CT I ON

UNIT –I

User centered design of system & interfaces, anatomy and rational of WIMP (Window, Icon, Menus &
Pointing Devices) interfaces.

UNIT –II

Dialogue design, Presentation design, user documentation, evaluation / usability testing of user interface.

UNIT –III
Ergonomics and Cognitive issues, hypertext and the World Wide Web.

UNIT –IV

User centered design, human factors in user – centered design, development & evaluation, Interactive
design – rapid prototyping.

UNIT – V

Designing for usability –effectiveness, learnability, flexibility, attitude and usability goals, criteria for
acceptability.

R e f e r e nc e s :
. Sudifte AG , “Human Computer Interface Design” , 2nd ed, Macmillan, 19995.

. Sheiderman B Designing the user interface, “Strategies for Effective Human –


Commputer Interaction”, 2nd ed. Addison Wesley, 1992.

You might also like