Home / Our Books /  Engineering Books < CS/IT Branch / Information Security System
×

More Books related to same category

Theory of Computation(toc)

Rs. 275

Control System Engineering

Rs. 310

Operating System

Rs. 290

Mechtronics

Rs. 290

Computer Aided Design and Graphics

Rs. 200

Information Security System

By Megha Chhabra, Neetu Agrwal

Ratings | 0 Reviews

Rs. 250

×
×
×
×
×

Specifications of Information Security System

Book Details

  • 978-93-83644-68-1
  • English
  • 2019
  • Paper Back
  • -

Contents

  • Unit 1. Introduction: Objective, scope and outcome of the course.

     

    Unit II. Introduction to Security Attacks: services and mechanism, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stream and block ciphers.

     

    Unit III. Modern Block Ciphers: Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation. Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter mode.

     

    Unit IV. Public Key Cryptosystems with Applications: Requirements and Cryptanalysis, RSA cryptosystem, Rabin cryptosystem, Elgamal cryptosystem, Elliptic curve cryptosystem.

     

    Unit V. Cryptographic Hash Functions, their Applications: Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA). Message Authentication Codes, its requirements and security, MACs based on Hash Functions, Macs based on Block Ciphers. Digital Signature, its properties, requirements and security, various digital signature chemes (Elgamal and Schnorr), NIST digital Signature algorithm.

     

    Unit VI. Key Management and Distribution: symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure. Remote user authentication with symmetric and asymmetric encryption, Kerberos Web Security threats and approaches, SSL architecture and protocol, Transport layer security, HTTPS and SSH.