Online examination system
Remember! This is just a sample.
You can get your custom paper by one of our expert writers.
Get custom essay88 writers online

The cellular concept, cellular frequency planning, link control, handoffs, power control, traffic capacity, propagation modelling, digital transmission techniques, fading mitigation, multiple access techniques, wireless networking, examples of current and future wireless standards.
Introduction and overview (1 Lecture)
Introduction to Cryptography: (2 lectures)
Terminology steganography, substitution and transformation ciphers, XOR, one-time pads, Protocol Building Blocks: (3 Lectures)
Communications using symmetric cryptography, one-way hash functions, communications using public-key cryptography, digital signatures, Basic Protocols: (2 lectures)
Key exchange, authentication, secret splitting, secret sharing, cryptographic protection of databases, Intermediate Protocols: (2 lectures)
Time stamping services, subliminal channel, undeniable digital signatures, Key Length: (2 lecture)
Symmetric key length, public-key key length, comparing symmetric and public-key key length, Key Management: (3 Lectures)
Generating keys, transferring keys, verifying keys, using keys, updating keys, storing keys, compromised keys, lifetime of keys, destroying keys, public key management, Algorithm Types and Modes: (10 Lecture)
Electronic codebook mode, block replay, cipher block chaining mode, stream ciphers, cipher-feedback mode, output feedback mode, choosing a cipher mode, block ciphers vs. stream ciphers, Choosing an Algorithm, Choosing an algorithm, public-key vs. symmetric cryptography, encrypting communication channels, encrypting data for storage, Security Models, Windows, Linux, Web, Cookies, Biometrics (“gummy fingers”), Tempest, Viruses, Firewalls, System/Comprehensive Security Analysis
Text Book/s
Stallings, W and Brown, L., Computer Security: principles and practice, 2nd edition, 2011
Reference Material
William Stallings, Cryptography and Network Security, 4th Edition, 2005, ISBN-13: 978-0131873162 Kaufman, Perlman, Speciner, Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall, 2002, ISBN-13: 978-0130460196
Other books will be used in the course if necessary.
Department Of Computer Science & Information Technology, HIC Jauharabad Campus Instructional Aids/Resources
Assessment Criteria
Class
Assessment
35%
Quizzes and Test
15
Assignment and Presentations
10
Attendance and Class Participations 5
Assignments + Quizzes
Mid
25%
If Required:
Final
40%
If Required:
Total
100%