CS8792 Multiple Choice Questions for CNS - Anna University
This video features multiple choice questions for the CS8792 course on Computer Networks and Security (CNS) at Anna University, presented by D. Abisha. The video is organized by units, with timestamps for each unit starting from 0:00:48 for Unit 1, 0:04:3

Abisha D
5.4K views β’ Nov 3, 2020

About this video
#CS8792 | #MCQs |#CNS | Multiple Choice Questions | Anna University | D.Abisha
TIMINGS FROM VIDEO
0:00:48 UNIT 1
0:04:37 UNIT 2
0:23:19 UNIT 3
0:34:10 UNIT 4
0:44:03 UNIT 5
Anna University Regulation 2017 CSE Engineering (CSE) 7th Sem
CS8792 CRYPTOGRAPHY AND NETWORK SECURITY Engineering Syllabus
UNIT I INTRODUCTION
Security trends β Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies β Model of network security β Security attacks, services and mechanisms β OSI security architecture β Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security β information theory β product cryptosystem β cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures β Modular arithmetic-Euclidβs algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES β Block cipher Principles of DES β Strength of DES β Differential and linear cryptanalysis β Block cipher design principles β Block cipher mode of operation β Evaluation criteria for AES β Advanced Encryption Standard β RC4 β
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes β Primality Testing βFactorization β Eulerβs totient function, Fermatβs and Eulerβs Theorem β Chinese Remainder Theorem β Exponentiation and logarithm β ASYMMETRIC KEY CIPHERS: RSA cryptosystem β Key distribution β Key management β Diffie Hellman key exchange -ElGamal cryptosystem β Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement β Authentication function β MAC β Hash function β Security of hash function and MAC β SHA βDigital signature and authentication protocols β DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications β Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security β PGP, S/MIME β IP security β Web Security β SYSTEM SECURITY: Intruders β Malicious software β viruses β Firewalls.
TIMINGS FROM VIDEO
0:00:48 UNIT 1
0:04:37 UNIT 2
0:23:19 UNIT 3
0:34:10 UNIT 4
0:44:03 UNIT 5
Anna University Regulation 2017 CSE Engineering (CSE) 7th Sem
CS8792 CRYPTOGRAPHY AND NETWORK SECURITY Engineering Syllabus
UNIT I INTRODUCTION
Security trends β Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies β Model of network security β Security attacks, services and mechanisms β OSI security architecture β Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security β information theory β product cryptosystem β cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures β Modular arithmetic-Euclidβs algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES β Block cipher Principles of DES β Strength of DES β Differential and linear cryptanalysis β Block cipher design principles β Block cipher mode of operation β Evaluation criteria for AES β Advanced Encryption Standard β RC4 β
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes β Primality Testing βFactorization β Eulerβs totient function, Fermatβs and Eulerβs Theorem β Chinese Remainder Theorem β Exponentiation and logarithm β ASYMMETRIC KEY CIPHERS: RSA cryptosystem β Key distribution β Key management β Diffie Hellman key exchange -ElGamal cryptosystem β Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement β Authentication function β MAC β Hash function β Security of hash function and MAC β SHA βDigital signature and authentication protocols β DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications β Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security β PGP, S/MIME β IP security β Web Security β SYSTEM SECURITY: Intruders β Malicious software β viruses β Firewalls.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
5.4K
Likes
124
Duration
01:00:08
Published
Nov 3, 2020
User Reviews
4.6
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.