HamroCSIT Logo
HAMRO CSIT
  • Semester
    • First Semester
    • Second Semester
    • Third Semester
    • Fourth Semester
    • Fifth Semester
    • Sixth Semester
    • Seventh Semester
    • Eight Semester
  • Questions
  • Entrance
    • Preparation
    • MCQ Questions
    • Discussion
    • Start Discussion
    • Colleges
  • Subscription New
  • Notices
  • Articles
  • Help
    • Ask Question
    • Application (2.9.1)
    • About Points
    • Contribute
    • Contact Us
Login Register
Hamro CSIT User Account
  • Sign In
  • Create Account
Shape | Hamro CSIT Shape | Hamro CSIT Shape | Hamro CSIT Shape | Hamro CSIT
Subject

Cryptography

The course introduces the underlying the principles and design of cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers, block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the theory of hash functions, authentication systems, network security protocols and malicious logic.

Subject Image | Hamro CSIT
  • Chapters
  • Syllabus
  • Question Banks
  • Questions
  • Text Book
  • Practical
  • Viva
Introduction and Classical Ciphers

1.4. Security: Computer Security, Information Security, Network Security, CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Service. . .

1.4. Security: Computer Security, Information Security, Network Security, CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Services, Security Mechanisms 1.5. Classical Cryptosystems: Substitution Techniques: Ceasar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers, One-time pad Transposition Techniques: Rail Fence Cipher 1.6. Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers

311+ Students

Questions : 4+

Read Note
Symmetric Ciphers

2.4. Feistel Cipher Structure, Substitution Permutation Network (SPN) 2.5. Data Encryption Standards (DES), Double DES, Triple DES 2.6. Finite Fields: Groups Rings, Fields,. . .

2.4. Feistel Cipher Structure, Substitution Permutation Network (SPN) 2.5. Data Encryption Standards (DES), Double DES, Triple DES 2.6. Finite Fields: Groups Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Galois Fields (GF(p) & GF(2n)), Polynomial Arithmetic 2.7. International Data Encryption Standard (IDEA) 2.8. Advanced Encryption Standards (AES) Cipher 2.9. Modes of Block Cipher Encryptions (Electronic Code Book, Cipher Block Chaining, Cipher Feedback Mode, Output Feedback Mode, Counter Mode)

276+ Students

Questions : 5+

Read Note
Asymmetric Ciphers

3.4. Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem, Primility Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem, Discrete Logarithms 3.5. Public . . .

3.4. Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem, Primility Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem, Discrete Logarithms 3.5. Public Key Cryptosystems, Applications of Public Key Cryptosystems 3.6. Distribution of public key, Distribution of secret key by using public key cryptography, Diffie-Helman Key Exchange, Man-in-the-Middle Attack 3.7. RSA Algorithm 3.8. Elgamal Cryptographic System

215+ Students

Questions : 3+

Read Note
Cryptographic Hash Functions and Digital Signatures

4.4. Message Authentication, Message Authentication Functions, Message Authentication Codes 4.5. Hash Functions, Properties of Hash functions, Applications of Hash Functions. . .

4.4. Message Authentication, Message Authentication Functions, Message Authentication Codes 4.5. Hash Functions, Properties of Hash functions, Applications of Hash Functions 4.6. Message Digests: MD4 and MD5 4.7. Secure Hash Algorithms: SHA-1 and SHA-2 4.8. Digital Signatures: Direct Digital Signatures, Arbitrated Digital Signature 4.9. Digital Signature Standard: The DSS Approach, Digital Signature Algorithm 4.10. Digital Signature Standard: The RSA Approach

192+ Students

Questions : 5+

Read Note
Authentication

5.4. Authentication System, 5.5. Password Based Authentication, Dictionary Attacks, 5.6. Challenge Response System, 5.7. Biometric System 5.8. Needham-Schroeder Scheme, K. . .

5.4. Authentication System, 5.5. Password Based Authentication, Dictionary Attacks, 5.6. Challenge Response System, 5.7. Biometric System 5.8. Needham-Schroeder Scheme, Kerberos Protocol

134+ Students

Questions : 1+

Read Note
Network Security and Public Key Infrastructure

6.1. Overview of Network Security 6.2. Digital Certificates and X.509 certificates, Certificate Life Cycle Management 6.3. PKI trust models, PKIX 6.4. Email Security: Pret. . .

6.1. Overview of Network Security 6.2. Digital Certificates and X.509 certificates, Certificate Life Cycle Management 6.3. PKI trust models, PKIX 6.4. Email Security: Pretty Good Privacy (PGP) 6.5. Secure Socket Layer (SSL) and Transport Layer Security (TLS) 6.6. IP Security (IPSec) 6.7. Firewalls and their types

143+ Students

Questions : 3+

Read Note
Malicious Logic

7.1. Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse, Zombies, Denial of Service Attacks, 7.2. Intrusion, Intruders and their types, Intrusion Detection. . .

7.1. Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse, Zombies, Denial of Service Attacks, 7.2. Intrusion, Intruders and their types, Intrusion Detection System

126+ Students

Questions : 3+

Read Note
Share

Share this link via

Or copy link

logoHAMROCSIT

Hamro CSIT is a Web and Mobile application that provides a complete set of reference materials like notes, syllabus, question banks, solutions, and many more for B. Sc. CSIT students.

  • [email protected]
Semester
  • First Semester
  • Second Semester
  • Third Semester
  • Fourth Semester
  • Fifth Semester
  • Sixth Semester
Links
  • About CSIT
  • About US
  • About Points
  • Sitemap
  • Privacy Policy
  • Terms and Conditions
Hits Counter
5381964
Google Play App Store
Follow Us

Copyright 2023 | HAMROCSIT | All Right Reserved | Powered by Code Help Pro

HAMROCSIT.COM

Copyright 2022 | HAMROCSIT.COM | All Right Reserved