Tuesday, August 6, 2019
Online examination system Essay Example for Free
Online examination system Essay The cellular concept, cellular frequency planning, link control, handoffs, power control, traffic capacity, propagation modelling, digital transmission techniques, fading mitigation, multiple access techniques, wireless networking, examples of current and future wireless standards. Introduction and overview (1 Lecture) Introduction to Cryptography: (2 lectures) Terminology steganography, substitution and transformation ciphers, XOR,à one-time pads, Protocol Building Blocks: (3 Lectures) Communications using symmetric cryptography, one-way hash functions, communications using public-key cryptography, digital signatures,à Basic Protocols: (2 lectures) Key exchange, authentication, secret splitting, secret sharing, cryptographic protection of databases, Intermediateà Protocols: (2 lectures) Time stamping services, subliminal channel, undeniable digital signatures, Key Length: (2 lecture) Symmetric key length, public-key key length, comparing symmetric and public-key key length, Key Management: (3 Lectures) Generating keys, transferring keys, verifying keys, using keys, updating keys, storing keys, compromised keys, lifetime of keys, destroying keys, public key management,à Algorithm Types and Modes: (10 Lecture) Electronic codebook mode, block replay, cipher block chaining mode, stream ciphers, cipher-feedback mode, output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm, Choosing an algorithm, public-key vs. symmetric cryptography, encrypting communication channels, encrypting data for storage, Security Models, Windows, Linux, Web, Cookies, Biometrics (gummy fingers), Tempest, Viruses, Firewalls, System/Comprehensive Security Analysis Text Book/s Stallings, W and Brown, L., Computer Security: principles and practice, 2nd edition, 2011 Reference Material William Stallings, Cryptography and Network Security, 4th Edition, 2005, ISBN-13: 978-0131873162 Kaufman, Perlman, Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN-13: 978-0130460196 Other books will be used in the course if necessary. Department Of Computer Science Information Technology, HIC Jauharabad Campus Instructional Aids/Resources Assessment Criteria Class Assessment 35% Quizzes and Test 15 Assignment and Presentations 10 Attendance and Class Participations 5 Assignments + Quizzes Mid 25% If Required: Final 40% If Required: Total 100%
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.