0% found this document useful (0 votes)
98 views2 pages

Gujarat Technological University: Information Technology

This document outlines the course content for the Information Security subject in the 6th semester of the Bachelor of Engineering program at Gujarat Technological University. The course covers topics such as conventional encryption techniques including symmetric ciphers, public key cryptography, number theory concepts, message authentication codes, hash functions, introduction to e-commerce security, network security, email security, and web security. The textbook listed is Cryptography and Network Security by William Stallings and there are 4 recommended reference books provided as well.

Uploaded by

Homik Soni
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views2 pages

Gujarat Technological University: Information Technology

This document outlines the course content for the Information Security subject in the 6th semester of the Bachelor of Engineering program at Gujarat Technological University. The course covers topics such as conventional encryption techniques including symmetric ciphers, public key cryptography, number theory concepts, message authentication codes, hash functions, introduction to e-commerce security, network security, email security, and web security. The textbook listed is Cryptography and Network Security by William Stallings and there are 4 recommended reference books provided as well.

Uploaded by

Homik Soni
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

GUJARAT TECHNOLOGICAL UNIVERSITY

B. E. SEMESTER: VI

Information Technology
Subject Name: Information Security
Sr. No 1. Course Content Conventional Encryption: Conventional Encryption Model, Steganography, Classical Encryption Techniques Conventional Encryption Techniques: Simplified Des, Block Cipher Principles, Data Encryption Standards, Differential And Linear Cryptography Principles, Block Cipher Design Principles, Modes Of Operations, Algorithms Like Triple Des, International Data Encryption Algorithm, Blowfish, Rc5, Cast-128, Rc2, Characteristics Of Advanced Symmetrical Block Cipher, Issues Of Conventional Encryption Like Traffic Distribution, Random Number Generation, Key Distribution Public Key Cryptography:Principles Of Public-Key Cryptography, RSA Algorithm, Key Management, Elliptic Curve Cryptography, Diffie-Hellman Key Exchange Number Theory:Prime And Relative Prime Numbers, Modular Arithmetic, Eulers Theorem, Euclids Algorithm, Discrete Logarithm Tics Message Authentication And Hash Functions:Authentication Requirement, Functions, Message Authentication Code, Hash Functions, Security Of Hash Functions And Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm, Ripemd-160, Hmac Introduction To E-Commerce: Introduction To E-Commerce, Transactions Requirement Of Security On E-Commerce Total Hrs. 04

2.

14

3.

08

4.

04

5.

06

6.

On

E-Commerce,

04

7.

Network Security: Digital Signatures, Authentication Protocols, Digital Signature Standards, Application Authentication Techniques Like Kerberos, X.509 Directory Authentication Services, Active Directory Service Of Windows NT/Windows 2000 IP Security E-Mail Security: IP Security Overview, Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Association, Key Management, Pretty Good Privacy, S/Mime And Types Web Security: Web Security Requirement, SSL And Transport Layer Security, Secure Electronic Transactions, Firewall Design Principles, Trusted Systems

10

8.

08

9.

06

Text Book: 1. Cryptography And Network Principles And Practice Fourth Edition, William
Stallings, Pearson

References Books:
1 2 3 4 Cryptography & Network Security, Forouzan, Mukhopadhyay, McGrawHill Cryptography and Network Security (2nd Ed.), Atul Kahate, TMH Information Systems Security, Godbole, Wiley-India Information Security Principles and Practice, Deven Shah, Wiley-India

You might also like