UNIT I: Conventional encryption, security attacks, security model for network, security conventional encryption model, encryption techniques, DES, Triple DES, key distribution, random number generation.
UNIT II: Public – key cryptology , principles of public – key crypto systems, RSA algorithm, Key management, distribution of public keys, public key – distribution of secret keys.
UNIT III: Authentication and digital systems, authenticate requirements – functions cryptographic checksum, hash function, digital signatures and authentication protocols, kenboros, x-509 directory, authentication service - hellman key exchange, digital signature standards.
UNIT IV: Cryptographic algorithms, The MD 5 message digest algorithm, secure has algorithm, international data encryption algorithm, LUC public key encryption – Electronic mail and managemnt security – Pretty good privacy(POP), privacy enhanced mail.
Text Book: William Stallings, Network and internet security, PHI
|