Interline Publishing
 info@interlinepublishing.com +91 98867 328 23 / 24 / 25   +91 80 2333 2824 Sign Up   Sign In
Interline Publishing
Skip to Reader

Set up video

    Subscription offer
         (Unlimited Download)
Amount Validity
र 100 6 months
र 200 1 year
     
Search By
 
SRM Networks Security - Sem VI
No Units Titles Sub Titles Chapters
1 Unit 1 Conventional And Modern Encryption Model of network security , Security attacks, services and attacks , OSI security architecture , Classical encryption techniques , SDES , Block cipher Principles- DES , Strength of DES , Block cipher design principles , Block cipher mode of operation , Evaluation criteria for AES , RC4 - Differential and linear cryptanalysis , Placement of encryption function , traffic confidentiality VIEW CHAPTERS
2 Unit 2 Public Key Encryption Number Theory , Prime number , Modular arithmetic , Euclid s algorithm - Fermet s and Euler s theorem , Primality , Chinese remainder theorem , Discrete logarithm , Public key cryptography and RSA , Key distribution , Key management , Diffie Hellman key exchange , Elliptic curve Cryptography VIEW CHAPTERS
3 Unit 3 Authentication Authentication requirement , Authentication function , MAC , Hash function , Security of hash function and MAC , SHA - HMAC , CMAC - Digital signature and authentication protocols , DSS VIEW CHAPTERS
4 Unit 4 System Security Intruder , Intrusion detection system , Virus and related threats , Countermeasures , Firewalls design principles , Trusted systems , Practical implementation of cryptography and security VIEW CHAPTERS
5 Unit 5 System Security Intruder , Intrusion detection system , Virus and related threats , Countermeasures , Firewalls design principles , Trusted systems , Practical implementation of cryptography and security VIEW CHAPTERS
 
Home
About Us
Payments
Contact Us
Claims
Help
Advertising Guidelines
Safe and Secure Payment
All major credit and debit cards are accepted.
Policies: Terms of Use | Privacy    Copyright © 2019 Interline Publishing. All rights reserved.