0% found this document useful (0 votes)
95 views1 page

EEE532 Network-Security TH 1.4 AC37

This document outlines the course EEE532 Network Security. The course introduces attacks on services and mechanisms for network security. It covers conventional encryption techniques, public key encryption including RSA and elliptic curve cryptography. It also covers message authentication through hash functions and digital signatures. The course examines IP security, web security protocols, and system security measures against intruders, viruses, and firewalls. The primary textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Ranjith M Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views1 page

EEE532 Network-Security TH 1.4 AC37

This document outlines the course EEE532 Network Security. The course introduces attacks on services and mechanisms for network security. It covers conventional encryption techniques, public key encryption including RSA and elliptic curve cryptography. It also covers message authentication through hash functions and digital signatures. The course examines IP security, web security protocols, and system security measures against intruders, viruses, and firewalls. The primary textbook is Cryptography and Network Security by William Stallings.

Uploaded by

Ranjith M Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

EEE532 Network Security

Version : 1.40

LTPC
3 0 0 3

Introduction:
Attacks Services Mechanisms Conventional Encryption Classical and Modern Techniques
Encryption Algorithms Confidentiality.
Public Key Encryption:
RSA Elliptic Curve cryptography Number Theory Concepts.
Message Authentication:
Hash Functions, Hash and Mac algorithms Digest Functions Digital Signatures Authentication
Protocols.
Network Security Practice:
IP Security overview, architecture, authentication header, security payload and key managementWeb
Security: secure socket layer, transport layer security, secure electronic transaction, dual signature.
System Security:
Intruders, viruses, worms, Fire Walls, Trusted systems: antivirus techniques and digital immune systems.
TextBook:
1. William Stallings, Cryptography and Network Security: Principles and Standards, Prentice Hall India, 6th
Edition, 2014.
Reference Books :
1. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: Private Communication in a
public world, Prentice Hall India, 2nd Edition, 2002.
2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, John Wiley
& Sons, 1st Edition, 2007.
3. Pfleeger & Pfleeger, Security in Computing, Pearson Education, 4th Edition, 2007.

You might also like