B.Tech. CSE
B.Tech. CSE 3rd Sem
System Analysis and Design
Object Oriented Programming with C++
Mathematics - III
DIGITAL LOGIC AND DESIGN
Electronics Devices And Circuits
B.Tech. CSE 4th Sem
Data Structure with Algorithm
Computer System Architecture
Discrete Structure & Fuzzy Techniques
System Software
Data Communication & Networks
B.Tech. CSE 5th Sem
Operating System
Microprocessor And Interfaces
Computer Oriental Numerical Method
Formal Language & Automata Theory
Parallel Computing
B.Tech. CSE 6th Sem
RDBMS
Software Engineering
Analysis & Design of Algorithm
Advance Programming Through Java
Computer Graphics
B.Tech. CSE 7th Sem
Web Technology
Compiler Design
Network Security
Elective-I
Professional Elective-I
B.Tech. CSE 8th Sem
Artificial Intelligence and Expert Systems
Data Mining & Data Warehousing
GUI Programming (Using Vb.net)
Professional Elective-II

Guru Ghasidas Vishwavidyalaya
Bilaspur Bilaspur Chhattisgarhhttp://www.ggu.ac.in
B.Tech. CSE 7th Sem
Subject: Network Security

UNIT - 1

Services, Mechanisms, Attacks, The OSI Security Architecture, A Model for Network Security, symmetric cipher model, substitution techniques, Transposition techniques, Rotor machines, Steganography.


UNIT - 2

Block ciphers, the data encryption standard, simplified DES, Block cipher principles, The data Encryption Standard, The Strength of DEC, Differential and Linear Cryptanalysis, Block Cipher Design principles, Block Cipher, Modes of Operation, Evaluation Criteria for AES, The AES cipher, Triple DES, blowfish, RC5, Rc4 Stream Cipher.


UNIT - 3

principles of public – Key Cryptosystems, public – Key cryptosystems, Applications for public – Key Cryptosystems, Requirements for public – Key Cryptosystems, Public – Key Cryptosystems, The RAS Algorithm, Computational Aspects, The Security of RSA, Key management, Distribution of public keys, public – Key Distribution of Secret Keys, Differ – Hellmann Key Exchange.


UNIT - 4

Web Security, Web Security Threats, Web Traffic Security Approaches, SSL Architecture, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol, Cryptographic Computations, Transport Layer Security, Secure Electronic Transaction.


UNIT - 5

Intruders, Intrusion Techniques, Intrusion Detection, Audit Records, Statistical Anomaly Detection, Rule – Based Intrusion Detection, The Base – Rate Fallacy, Distributed Intrusion Detection, Honeypots, Intrusion Detection Exchange Format, Firewall Design principles, Firewall Characteristics, Types of Firewalls, Firewall Configurations.


Jump to Top | Home Page