BCS703 VTU Notes: Cryptography & Network Security

Secure the digital frontier with our BCS703 VTU Notes. Master encryption algorithms, digital signatures, and firewall defense for the 2022 Scheme at the all-new vtubuddy.in Computer Science and Cybersecurity portal.

Cryptography & Network Security

BCS703

2022 Scheme

Module 1 : A model for Network Security, Classical encryption techniques

A model for Network Security, Classical encryption techniques: Symmetric cipher model, Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polyalphabetic Ciphers, One time pad, Steganography. Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design principles.

Module 2 : Pseudorandom number Generators

Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub Generator. Public key cryptography and RSA: Principles of public key cryptosystems-Public key cryptosystems, Applications for public key cryptosystems, Requirements for public key cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm, Computational aspects, The Security of RSA. Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle Attack, Elliptic Curve Cryptography: Analog of Diffie Hellman key Exchange, Elliptic Curve Encryption/Decryption, Security of Elliptic Curve Cryptography.

Module 3 : Applications of Cryptographic Hash functions

Applications of Cryptographic Hash functions, Two simple Hash functions, Key management and distribution: Symmetric key distribution using symmetric encryption, Symmetric key distribution using asymmetric encryption, Distribution of public keys, X.509 Certificates, Public Key Infrastructures

Module 4 : User Authentication

User Authentication: Remote user authentication principles, Kerberos, Remote user authentication using asymmetric encryption. Web security consideration, Transport layer security. Email Threats and comprehensive email security, S/MIME, Pretty Good Privacy.

Module 5 : Domainkeys Identified Mail.

Domainkeys Identified Mail. IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload, Combining security associations, Internet key exchange.

Other Subject Notes

Model Question Papers

Previous Year Question Papers

Syllabus

Upload Notes 👇