The cellular construct. cellular frequence planning. associate control. handoffs. power control. traffic capacity. extension patterning. digital transmittal techniques. melting extenuation. multiple entree techniques. radio networking. illustrations of current and future radio criterions.
Introduction and overview ( 1 Lecture )
Introduction to Cryptography: ( 2 talks )
Terminology cryptography. permutation and transmutation cyphers. XOR. erstwhile tablets. Protocol Building Blocks: ( 3 Lectures )
Communicationss utilizing symmetric cryptanalysis. one-way hash maps. communications utilizing public-key cryptanalysis. digital signatures. Basic Protocols: ( 2 talks )
Key exchange. hallmark. secret splitting. secret sharing. cryptanalytic protection of databases. Intermediate Protocols: ( 2 talks )
Time stomping services. subliminal channel. undeniable digital signatures. Cardinal Length: ( 2 talk )
Symmetric cardinal length. public-key cardinal length. comparing symmetric and public-key cardinal length. Cardinal Management: ( 3 Lectures )
Generating keys. reassigning keys. verifying keys. utilizing keys. updating keys. hive awaying keys. compromised keys. life-time of keys. destructing keys. public cardinal direction. Algorithm Types and Modes: ( 10 Lecture )
Electronic codebook manner. block rematch. cypher block chaining manner. watercourse cyphers. cipher-feedback manner. end product feedback manner. taking a cypher manner. block cyphers vs. watercourse cyphers. Choosing an Algorithm. Choosing an algorithm. public-key vs. symmetric cryptanalysis. coding communicating channels. coding informations for storage. Security Models. Windows. Linux. Web. Cookies. Biometrics ( “gummy fingers” ) . Tempest. Viruss. Firewalls. System/Comprehensive Security Analysis
Text Book/s
Stalls. W and Brown. L. . Computer Security: rules and pattern. 2nd edition. 2011
Reference Material
William Stallings. Cryptography and Network Security. 4th Edition. 2005. ISBN-13: 978-0131873162 Kaufman. Perlman. Speciner. Network Security: Private Communication in a Public World. 2nd Edition. Prentice Hall. 2002. ISBN-13: 978-0130460196
Other books will be used in the class if necessary.
Department Of Computer Science & A ; Information Technology. HIC Jauharabad Campus Instructional Aids/Resources
Appraisal Standards
Class
Appraisal
35 %
Quizs and Trial
15
Assignment and Presentations
10
Attendance and Class Participations 5
Assignments + Quizs
Mid
25 %
If Required:
Concluding
40 %
If Required:
Entire
100 %