CS8792 Multiple Choice Questions for CNS - Anna University

This video features multiple choice questions for the CS8792 course on Computer Networks and Security (CNS) at Anna University, presented by D. Abisha. The video is organized by units, with timestamps for each unit starting from 0:00:48 for Unit 1, 0:04:3

Abisha D5.4K views01:00:08

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Finland under the topic 'joanna lumley'.

About this video

#CS8792 | #MCQs |#CNS | Multiple Choice Questions | Anna University | D.Abisha TIMINGS FROM VIDEO 0:00:48 UNIT 1 0:04:37 UNIT 2 0:23:19 UNIT 3 0:34:10 UNIT 4 0:44:03 UNIT 5 Anna University Regulation 2017 CSE Engineering (CSE) 7th Sem CS8792 CRYPTOGRAPHY AND NETWORK SECURITY Engineering Syllabus UNIT I INTRODUCTION Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis. UNIT II SYMMETRIC KEY CRYPTOGRAPHY MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclid‟s algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 – Key distribution. UNIT III PUBLIC KEY CRYPTOGRAPHY MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography. UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509 UNIT V SECURITY PRACTICE AND SYSTEM SECURITY Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.

Video Information

Views
5.4K

Total views since publication

Likes
124

User likes and reactions

Duration
01:00:08

Video length

Published
Nov 3, 2020

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.