2023 2024 EduVark > Education Discussion > General Discussion


  #1  
January 12th, 2016, 09:31 AM
Unregistered
Guest User
 
IIT Bombay cryptography

hii sir, will you please provide me the Syllabus of the b.tech cs Cryptography and Network Security – I of thE Autumn Smester of the IIT Bombay ?
Similar Threads
Thread
IISC Cryptography
Cryptography IIT Bombay
Cryptography and Network Security UPTU Paper
IIT Bombay Jam
Cryptography VTU
Cryptography IIT Bombay
Indian Institute Of Technology Bombay (IIT Bombay)
IIT Bombay To BCT
Elitmus Cryptography
XPS IIT Bombay
KPK IIT Bombay
Institute of Cryptography Communication and Informatics
Cryptography Indian Statistical Institute
Cryptography Research Group ISI Kolkata
Cryptography IIT Kharagpur

  #2  
January 12th, 2016, 10:56 AM
Super Moderator
 
Join Date: Mar 2012
Re: IIT Bombay cryptography

As you asking for the Syllabus of the b.tech cs Cryptography and Network Security – I of the Autumn Semester of the IIT Bombay the syllabus is as follow:

The contents of the course are listed below.
Introduction
Cyber Attacks
Defense strategies and techniques
Computer Networking Primer
Introduction to LANs, IPv4, IPv6, ICMP, TCP/UDP, DNS, HTTP, etc.

Mathematical Background for Cryptography
Modulo Arithmetic
GCD (Euclids Algorithm)
Algebraic Structures (Groups)
Chinese Remainder Theorem

Basics of Cryptography
Elementary Ciphers (Substitution, Transposition and their Properties)

Secret Key Cryptography
DES (Data Encryption Standard)
MAC (Message Authentication Codes) and other applications
Attacks

Public Key Cryptography
RSA
Performance
Practical Issues
PKCS (Public Key Cryptography Standard)

Cryptographic Hash
Properties, Applications, Performance
Birthday Attack

Key Management
Digital Certificates
PKI (Public Key Infrastructure)

Authentication
One-Way Authentication
Mutual Authentication
Dictionary Attacks
Centralized Authentication
The Needham-Schroeder Protocol
Kerberos
Non-cryptographic Protocol Vulnerabilities
DoS and DDoS
Session High jacking and Spoofing
ARP Spoofing and Attacks on DNS

Viruses, Worms, and other Malware
Virus and Worm Features
Internet Scanning Worms
Mobile Malware and Botnets

Access Control in Operating Systems
Discretionary Access Control
Mandatory Access Control
Role Based Access Control
SELinux and Recent Trends


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 12:49 PM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8