0% found this document useful (0 votes)
9 views2 pages

CCS UPC Planner Student

Uploaded by

Akshaya R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views2 pages

CCS UPC Planner Student

Uploaded by

Akshaya R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Subject Code : CB3491 CRYPTOGRAPHY AND CYBER SECURITY (2021R)

Semester & Year : Odd Semester (2025-26)

UPC Student Planner – 2025-26

Unit Grade
Questions Univ Month / Year
A/B
1 The OSI Security Architecture N/D 23, A/M 25, A/M 24 A
2 Security Attacks N/D 23, N/D 24 A
I
3 Substitution techniques A/M 25, N/D 24 A
INTRO
DUCTI 4 Transposition techniques A/M 25, N/D 24 A
ON TO
SECU 5 Hill cipher & Play fair N/D 23, A/M 24 A
RITY 6 Network Security B

7 Steganography B

1 AES (Advanced Encryption Standard) A/M 25, N/D 24 A

2 DES (Data Encryption Standard) & SDES A/M 25, A/M 24, N/D 23 A
II
SYMM A
3 Block Cipher mode of operation N/D 23
ETRIC
CIPHE 4 Euclid’s algorithm N/D 24 A
RS A
5 Pseudo random number generator, RC4 A/M 24
6 Group, Rings, Fields, Finite Fields B

7 Triple DES B

1 Eulers Theorems N/D 24 A

2 RSA algorithm A/M 24, A/M 25, N/D 23, N/D 24 A


III
ASYM 3 Diffie-Hellman schema A/M 24, N/D 23(Part B &C), A
METR
IC 4 Key Distribution in AES A/M 25, N/D 24 A
CRYP A
TOGR
5 Fermat’s theorem N/D 24
APHY B
6 Elliptic curve cryptography
7 Chinese Remainder Theorem B

IV 1 Digital Signature Algorithm A/M 24, A/M 25. N/D 23, N/D 24 A
INTEG
2 SHA algorithm A/M 24, A/M 25, N/D 23 A
RITY
AND 3 Schnorr digital signature N/D 23 A
AUTH
ENTIC 4 Elgamal cryptosystem A/M 25, N/D 23 (Part B &C), A
ATION 5 Kerberos N/D 23, A/M 24 A
ALGO
6 Symmetric Key Distribution B
RITH
MS 7 X.509 certificate B
1 Network Access Control A/M 24, A/M 25, N/D 24 A
V
CYBE 2 Privacy and Data Security A/M 24 A
R
CRIM 3 Wireless Security A/M 24, N/D 24 A
ES A
4 Cyber Crime and Information Security A/M 25
AND
CYBE 4 Keyloggers, Spywares A/M 24 A
R
SECU 5 Web application security B
RITY

Prepared By Verified By Approved By

You might also like