BE Computer Engineering Semester 7 (BE Fourth Year)University of Mumbai
Share
Notifications

View all notifications

Cryptography and System Security Semester 7 (BE Fourth Year) BE Computer Engineering University of Mumbai Topics and Syllabus

Login
Create free account


      Forgot password?
CBCGS [2019 - current]
CBGS [2015 - 2018]
Old [2000 - 2014]

Topics with syllabus and resources

100.00 Introduction
  • Security Attacks, Security Goals, Computer criminals, Methods of defense, Security Services, Security Mechanisms.
200.00 Basics of Cryptography
  • Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Other Cipher Properties-Confusion, Diffusion, Block and Stream Ciphers.
300.00 Secret Key Cryptography
  • Data Encryption Standard(DES), Strength of DES, Block Cipher Design Principles and Modes of Operations, Triple DES, International Data Encryption algorithm, Blowfish, CAST-128.
400.00 Public Key Cryptography
  • Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key Exchange
500.00 Cryptographic Hash Functions
  • Applications of Cryptographic Hash Functions, Secure Hash Algorithm
  • Message Authentication Codes – Message Authentication Requirements and Functions, HMAC
  • Digital signatures, Digital Signature Schemes, Authentication Protocols, Digital Signature Standards.
600.00 Authentication Applications
  • Kerberos, Key Management and Distribution, X.509 Directory Authentication service, Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy, S/MIME.
700.00 Security
701.00 Program Security
  • Secure programs, Nonmalicious Program Errors
  • Malicious Software – Types, Viruses, Virus Countermeasures, Worms, Targeted Malicious Code, Controls against Program Threats.
702.00 Operating System Security
  • Memory and Address protection, File Protection Mechanism, User Authentication.
703.00 Database Security
  • Security Requirement, Reliability and Integrity, Sensitive data, Inference, Multilevel Databases.
704.00 IDS and Firewalls
  • Intruders, Intrusion Detection, Password Management, Firewalls-Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted systems.
800.00 IP Security and Non-cryptographic Protocol Vulnerabilities
801.00 IP Security
  • Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet Key Exchange
  • Web Security:- Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Electronic Payment.
802.00 Non-cryptographic Protocol Vulnerabilities
  • DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities-Phishing, Buffer Overflow, Format String Attacks, SQL Injection
S
View in app×