# JNTUH B.TECH R18 4-1 Syllabus For network security and cryptography PDF 2022

### Get Complete Lecture Notes for network security and cryptography on Cynohub APP

You will be able to find information about network security and cryptography along with its Course Objectives and Course outcomes and also a list of textbook and reference books in this blog.You will get to learn a lot of new stuff and resolve a lot of questions you may have regarding network security and cryptography after reading this blog. network security and cryptography has 5 units altogether and you will be able to find notes for every unit on the CynoHub app. network security and cryptography can be learnt easily as long as you have a well planned study schedule and practice all the previous question papers, which are also available on the CynoHub app.

All of the Topic and subtopics related to network security and cryptography are mentioned below in detail. If you are having a hard time understanding network security and cryptography or any other Engineering Subject of any semester or year then please watch the video lectures on the official CynoHub app as it has detailed explanations of each and every topic making your engineering experience easy and fun.

### network security and cryptography Unit One

#### UNIT- I

Security Services, Mechanisms and Attacks, A Model for Internetwork security, Classical Techniques: Conventional Encryption model, Steganography, Classical Encryption Techniques.
Modern Techniques: Simplified DES, Block Cipher Principles, Data Encryption standard, Strength of DES, Block Cipher Design Principles.

### network security and cryptography Unit Two

#### UNIT- II

Encryption: Triple DES, International Data Encryption algorithm, Blowfish, RC5, Characteristics of Advanced Symmetric block Ciphers. Placement of Encryption function, Traffic confidentiality, Key distribution, Random Number Generation.

### network security and cryptography Unit Three

#### UNIT – III

Public Key Cryptography: Principles, RSA Algorithm, Key Management, Diffie-Hellman Key exchange, Elliptic Curve Cryptograpy.
Number Theory: Prime and Relatively prime numbers, Modular arithmetic, Fermat’s and Euler’s theorems, Testing for primality, Euclid’s Algorithm, the Chinese remainder theorem, Discrete logarithms.

### network security and cryptography Unit Four

#### UNIT- IV

Message Authentication and Hash Functions: Authentication requirements and functions, Message Authentication, Hash functions, Security of Hash functions and MACs.
Hash and Mac Algorithms: MD-5, Message digest Algorithm, Secure Hash Algorithm.
Digital signatures and Authentication protocols: Digital signatures, Authentication Protocols, Digital signature standards.
Authentication Applications: Kerberos, Electronic Mail Security: Pretty Good Privacy, SIME/MIME.

### network security and cryptography Unit Five

#### UNIT – V

IP Security: Overview, Architecture, Authentication, Encapsulating Security Payload, Key Management. Web Security: Web Security requirements, Secure sockets layer and Transport layer security, Secure Electronic Transaction.
Intruders, Viruses and Worms: Intruders, Viruses and Related threats.
Fire Walls: Fire wall Design Principles, Trusted systems.

### network security and cryptography Course Objectives

Understand the basic concept of Cryptography and Network Security, their mathematical models
To understand the necessity of network security, threats/vulnerabilities to networks and countermeasures
To understand Authentication functions with Message Authentication Codes and Hash Functions.
To provide familiarity in Intrusion detection and Firewall Design Principles

### network security and cryptography Course Outcomes

IP Security: Overview, Architecture, Authentication, Encapsulating Security Payload, Key Management. Web Security: Web Security requirements, Secure sockets layer and Transport layer security, Secure Electronic Transaction.
Intruders, Viruses and Worms: Intruders, Viruses and Related threats.
Fire Walls: Fire wall Design Principles, Trusted systems.

### network security and cryptography Text Books

Cryptography and Network Security: Principles and Practice – William Stallings, Pearson Education.
Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH,2004.

### network security and cryptography Reference Books

Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
Fundamentals of Network Security by Eric Maiwald (Dreamtech press)
Principles of Information Security, Whitman, Thomson.
Introduction to Cryptography, Buchmann, Springer.

### Scoring Marks in network security and cryptography

Scoring a really good grade in network security and cryptography is a difficult task indeed and CynoHub is here to help!. Please watch the video below and find out how to get 1st rank in your B.tech examinations . This video will also inform students on how to score high grades in network security and cryptography. There are a lot of reasons for getting a bad score in your network security and cryptography exam and this video will help you rectify your mistakes and help you improve your grades.

Information about JNTUH B.Tech R18 network security and cryptography was provided in detail in this article. To know more about the syllabus of other Engineering Subjects of JNTUH check out the official CynoHub application. Click below to download the CynoHub application.

Recent Courses

₹65,000.00

### Full Stack Development Masterclass

100% Job Guarantee Program Full Stack Development Master Class 100%...
₹15,000.00

₹1,000.00

### Effective English Communication

English is the Most used Language This Course will help...