# Cryptography and Network Security Study Material BOOK PDF | Download Cryptography and Network Security Study Material BOOK PDF

## Syllabus

UNIT- I: Basic Principles
Security Goals, Cryptographic Attacks, Services and Mechanisms, Mathematics of Cryptography
UNIT -II: Symmetric Encryption
Mathematics of Symmetric Key Cryptography, Introduction to Modern Symmetric Key Ciphers,
Data Encryption Standard, Advanced Encryption Standard.
UNIT- III: Asymmetric Encryption
Mathematics of Asymmetric Key Cryptography, Asymmetric Key Cryptography
UNIT -IV: Data Integrity, Digital Signature Schemes & Key Management
Message Integrity and Message Authentication, Cryptographic Hash Functions, Digital
Signature, Key Management.
UNIT-V: Network Security-I
Security at application layer: PGP and S/MIME, Security at the Transport Layer: SSL and TLS
UNIT- VI: Network Security-II
Security at the Network Layer: IPSec, System Security
IV Year – I Semester

## Recommended Books

1) Cryptography and Network Security, Behrouz A Forouzan, Debdeep Mukhopadhyay,
(3e) Mc Graw Hill.
2) Cryptography and Network Security, William Stallings, (6e) Pearson.
3) Everyday Cryptography, Keith M.Martin, Oxford.

## Important Questions

1) Network Security and Cryptography, Bernard Meneges, Cengage Learning.

Construct a Playfair matrix with the key largest. encrypt this message: MEET
ME AT THE TOGA PARTY
[8] b) List and explain the security mechanisms defined by X.800. [8] 3. Write about the following in AES cipher:
Substitute Bytes Transformation
ShiftRows Transformation
MixColumns Transformation
AddRound Key Transformation [16] 4. Write about key generation, encryption and decryption in ElGamal
Cryptosystem. [16] 5. a) Give the structure of CMAC. What is the difference between CMAC and
HMAC?
[8] b) Describe the attacks on digital signatures. [8] 6. a) In S/MIME, how does a receiver find out what cryptographic algorithms the
sender has used when receives an S/MIME message.
[8] b) Explain about the trust mechanism and certificates used by PGP and S/MIME. [8] 7. a) Write short notes on Signature based IDS. [8] b) What are the basic approaches of building Security Associations?