# JNTU-K B.TECH R19 4-1 Syllabus For Cryptography and network security PDF 2022

### Get Complete Lecture Notes for Cryptography and network security on Cynohub APP

You will be able to find information about Cryptography and network security along with its Course Objectives and Course outcomes and also a list of textbook and reference books in this blog.You will get to learn a lot of new stuff and resolve a lot of questions you may have regarding Cryptography and network security after reading this blog. Cryptography and network security has 5 units altogether and you will be able to find notes for every unit on the CynoHub app. Cryptography and network security can be learnt easily as long as you have a well planned study schedule and practice all the previous question papers, which are also available on the CynoHub app.

All of the Topic and subtopics related to Cryptography and network security are mentioned below in detail. If you are having a hard time understanding Cryptography and network security or any other Engineering Subject of any semester or year then please watch the video lectures on the official CynoHub app as it has detailed explanations of each and every topic making your engineering experience easy and fun.

### Cryptography and network security Unit One

#### Classical Encryption Techniques

Classical Encryption Techniques: Security Attacks, Services & Mechanisms, Symmetric Cipher Model. Cyber Threats, Phishing Attack, Web Based Attacks, SQL Injection Attacks, Buffer Overflow& Format String Vulnerabilities, TCP session hijacking, UDP Session Hijacking.Block Ciphers: Traditional Block Cipher Structure, Block Cipher Design Principles.

### Cryptography and network security Unit Two

#### Symmetric Key Cryptography

Symmetric Key Cryptography: Data Encryption Standard (DES), Advanced Encryption Standard (AES), Blowfish, IDEA, Block Cipher Modes of Operations. Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms.

### Cryptography and network security Unit Three

#### Public Key Cryptography

Public Key Cryptography: Principles, Public Key Cryptography Algorithms, RSA Algorithm, Diffie Hellman Key Exchange, Elliptic Curve Cryptography.Cryptographic Hash Functions: Application of Cryptographic Hash Functions, Requirements & Security, Secure Hash Algorithm, Message Authentication Functions, Requirements & Security, HMAC & CMAC. Digital Signatures: NIST Digital Signature Algorithm, Key Management and Distribution

### Cryptography and network security Unit Four

#### User Authentication

User Authentication: Remote User Authentication Principles, Kerberos.Electronic Mail Security: Pretty Good Privacy (PGP) And S/MIME. IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management.

### Cryptography and network security Unit Five

#### Transport Level Security

Transport Level Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security(TLS), Secure Shell(SSH)Firewalls: Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted Systems.

### Cryptography and network security Course Objectives

This course aims at training students to master the: The concepts of classical encryption techniques and concepts of finite fields and number theoryWorking principles and utilities of various cryptographic algorithms including secret key cryptography, hashes and message digests, and public key algorithmsDesign issues and working principles of various authentication protocols, PKI standardsVarious secure communication standards including Kerberos, IPsec, and SSL/TLS and emailConcepts of cryptographic utilities and authentication mechanisms to design secureapplications

### Cryptography and network security Course Outcomes

By the end of the course the student Identify information security goals, classical encryption techniques and acquire fundamental knowledge on the concepts of finite fields and number theoryCompare and apply different encryption and decryption techniques to solve problems related to confidentiality and authenticationApply the knowledge of cryptographic checksums and evaluate the performance ofdifferent message digest algorithms for verifying the integrity of varying message sizes.Apply different digital signature algorithms to achieve authentication and create secure applicationsApply network security basics, analyze different attacks on networks and evaluate the performance of firewalls and security protocols like SSL, IPSec, and PGPApply the knowledge of cryptographic utilities and authentication mechanisms to design secure applications

### Cryptography and network security Text Books

1)Cryptography and Network Security-William Stallings, Pearson Education, 7th Edition.2)Cryptography, Network Security and Cyber Laws –Bernard Menezes, Cengage Learning, 2010 edition.

### Cryptography and network security Reference Books

1)Cryptography and Network Security-Behrouz A Forouzan, Debdeep Mukhopadhyaya, Mc-GrawHill, 3rd Edition, 2015.2)Network Security Illustrated, Jason Albanese and Wes Sonnenreich, MGH Publishers, 2003.

### Scoring Marks in Cryptography and network security

Information about JNTU-K B.Tech R19 Cryptography and network security was provided in detail in this article. To know more about the syllabus of other Engineering Subjects of JNTUH check out the official CynoHub application. Click below to download the CynoHub application.

Recent Courses

₹65,000.00

### Full Stack Development Masterclass

100% Job Guarantee Program Full Stack Development Master Class 100%...
₹15,000.00

₹1,000.00

### Effective English Communication

English is the Most used Language This Course will help...