CS8792 Multiple Choice Questions for CNS - Anna University

This video features multiple choice questions for the CS8792 course on Computer Networks and Security (CNS) at Anna University, presented by D. Abisha. The video is organized by units, with timestamps for each unit starting from 0:00:48 for Unit 1, 0:04:3

CS8792 Multiple Choice Questions for CNS - Anna University
Abisha D
5.4K views β€’ Nov 3, 2020
CS8792 Multiple Choice Questions for CNS - Anna University

About this video

#CS8792 | #MCQs |#CNS | Multiple Choice Questions | Anna University | D.Abisha
TIMINGS FROM VIDEO
0:00:48 UNIT 1

0:04:37 UNIT 2

0:23:19 UNIT 3

0:34:10 UNIT 4

0:44:03 UNIT 5

Anna University Regulation 2017 CSE Engineering (CSE) 7th Sem
CS8792 CRYPTOGRAPHY AND NETWORK SECURITY Engineering Syllabus

UNIT I INTRODUCTION
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclidβ€Ÿs algorithm- Congruence and matrices -Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 –
Key distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization – Eulerβ€˜s totient function, Fermatβ€˜s and Eulerβ€˜s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

5.4K

Likes

124

Duration

01:00:08

Published

Nov 3, 2020

User Reviews

4.6
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.