IT TE BTECH 24-25 - Organized-2
IT TE BTECH 24-25 - Organized-2
IT TE BTECH 24-25 - Organized-2
1.1 Computer security and Network Security (Definition), CIA, Services, Mechanisms and attacks.
1.2 The OSI security architecture, Network security model.
1.3 Classical Encryption techniques mono-alphabetic and poly-alphabetic substitution techniques: Vigenere
cipher, playfair cipher.
1.4 Transposition techniques: keyed and keyless transposition ciphers. Introduction to steganography.
2.1 Block cipher modes of operation,Data Encryption Standard, Advanced Encryption Standard (AES),
RC5 algorithm.
2.2 Public key cryptography: RSA algorithm. Hashing Techniques: SHA256, HMAC, CMAC.
2.3 Digital Signature Schemes – RSA, DSS, Key Management, Kerberos, Digital Certificate: X.509, PKI.
4.1 Cloud Security: Cloud Computing, Cloud Security Risk, Data Protection in the Cloud, Addressing
Cloud Computing Security Concerns.
4.2 Transport Layer Security: Introduction to Transport Layer Security ,HTTPS,Secure Shell.
4.3 Electronic Mail Security: Introduction to Mail Architecture , Mail Formats,Email Threats and Email
Security,S/MIME, Pretty Good Privacy.
Shah & Anchor Kutchhi Engineering College, B.Tech. in Information Technology R0-V0-2024-25 9