|
UNIT I: Conventional encryption, security attacks, security model for network, security conventional encryption model, encryption techniques, DES, Triple DES, key distribution, random number generation.
UNIT II: Public � key cryptology , principles of public � key crypto systems, RSA algorithm, Key management, distribution of public keys, public key � distribution of secret keys.
UNIT III: Authentication and digital systems, authenticate requirements � functions cryptographic checksum, hash function, digital signatures and authentication protocols, kenboros, x-509 directory, authentication service - hellman key exchange, digital signature standards.
UNIT IV: Cryptographic algorithms, The MD 5 message digest algorithm, secure has algorithm, international data encryption algorithm, LUC public key encryption � Electronic mail and managemnt security � Pretty good privacy(POP), privacy enhanced mail.
Text Book: William Stallings, Network and internet security, PHI
|