Stuff Sector
Prepared by
Santhosh (Admin)
Important questions
share it a link aloneDon't share as screenshot kind request common to Electronics and Instrumentation Engineering/Instrumentation Control Engineering)Unit:1
1. Perfect security Information Theory ,Prodact Cryptosystem-Cryptanalysis ***
2.The OSI Security Architecture Security Attacks Security Services and Mechanisms **
3. A Model for Network Security Classical encryption techniques
Unit:2
1.
Evaluation criteria for AES-Pseudorandom Number Generators2. Block cipher design principles,mode of operation
3. Euclid's algorithm Congraence and matrices Group, Rings***
Unit:3
1. Euler's totient function, Fermat's and Euler's Theorem
Chinese Remainder Theorem Exponentiation and logarithm (algorithm and sums also may be asked based on this ..expected part c too)****
2. RSA cryptosystem,Key distribution-Key management Diffie Hellman kuy exchange
3.Elliptic curve arithmetic - Elliptic curve cryptography. **
Don't share as screenshot
Unit:4
1. HMAC, CMAC-SHA**
2.
ElGamal cryptosystem Entity Authentication: Biometrics, Passwords, Challenge Response3.
TRUST Key management and distribution Symmetric key distribution using symmetric and asymmetric encryption Distribution of public keys-X.509 Certificates.*** Unit:5
1.Network Access Control Wireless Security**
2. Cyber Crime and Information Security classifications of Cyber Crimes Cracking, Keyloggers, SQL Injection ***
**Most important topic ,Can get good marks but read all topic thoroughly
PART-C
1.Compulsory Questions {a case study where the student will have to read and analyse the subject }
mostly asked from architectures and program of mpmc (OR) a situation given and you have to answer on your own
don't waste my hardwork and valuable time
As Engineer i think you know how to respect another
Share it as link alone . don't share it as screenshot or any text material if u found this anywhere kindly report me . #Admin WhatsAppContact uS
*These questions are expected for the exams This may or may not be asked for exams All the best.... from admin Santhosh
Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates ~$tuff$£ctor
Contact uS
*These questions are expected for the exams This may or may not be asked for exams
All the best.... from admin Santhosh
Thanks for your love and support guys keep supporting and share let the Engineers know about Us and leave a comment below for better improvements
If there is any doubt feel free to ask me I will clear if I can or-else I will say some solutions ..get me through WhatsApp for instant updates ~$tuff$£ctorSyllabus
UNIT I INTRODUCTION TO SECURITY
Computer Security Codlepts The OSI Security Architecture Security Attacks Security Services and Mechanisms A Model for Network Security Classical encryption techniques
Substitution techniques, Transposition techniques, Steganography Foundations of modem cryptography:
Perfect security Information Theory
,Prodact Cryptosystem-Cryptanalysis
UNIT II SYMMETRIC CIPHERS
Number theory Algebraic Structures Modular Arithmetic Euclid's algorithm Congraence and matrices Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS SDES-Block Ciphers-DES, Strength of DES-Differential and linear cryptanalysis - Block cipher design principles - Block cipher mode of operation Evaluation criteria for AES-Pseudorandom Number Generators-RC4-Key distribution.
UNIT III ASYMMETRIC CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes Primality Testing Factorization - Euler's totient function, Fermat's and Euler's Theorem Chinese Remainder Theorem Exponentiation and logarithm
ASYMMETRIC KEY CIPHERS: RSA cryptosystem- Key distribution-Key management Diffie Hellman kuy exchange - Elliptic curve arithmetic - Elliptic curve cryptography.
UNIT IV INTEGRITY AND AUTHENTICATION ALGORITHMS
Authentication requirement Authentication function MAC Hash function Security of hash function:
HMAC, CMAC-SHA- Digital signatund und authentication protocols -DSS-Schnorr Digital Signature Scheme
-ElGamal cryptosystem Entity Authentication: Biometrics, Passwords, Challenge Response protocols
Authentication applications Kerberoa. MUTUAL TRUST Key management and distribution Symmetric key distribution using symmetric and asymmetric encryption Distribution of public keys-X.509 Certificates.
UNIT V CYBER CRIMES AND CYBER SECURITY
Cyber Crime and Information Security classifications of Cyber Crimes Cracking, Keyloggers, Spywares, SQL Injection - Network Access Control Wireless Security (Chapter-5) Tools and Methods Password Cloud Security Web Security.