M Tech (Computer Science and Applications):Information Security
Master
In Patiala
Description
-
Type
Master
-
Location
Patiala
Facilities
Location
Start date
Start date
About this course
Admission to M. Tech. (Computer Science and Applications) will be open to a candidate who obtains at least 50% marks in aggregate in the qualifying examination from a recognized university.
Reviews
Course programme
Semester I
Advanced Data Structures
Data Communication and Computer Networks
Computer Organization and Operating Systems
Computational Algorithms in Optimization
Statistical Methods and Algorithms
Database Management and Administration
Semester II
Object Oriented Analysis and Design
Software Engineering
Logic and its applications
Computer Graphics and Multimedia Technologies
Web Technologies and E-Governance
Semester III
Seminar
Thesis (starts)
Semester IV
Thesis (contd.)
Information Security
Introduction to cryptography: Encryption schemes, Cryptanalysis, Block ciphers, Stream ciphers, Affine ciphers, DES and AES algorithms,
Public Key Encryption: RSA cryptosystem, Rabin Encryption, Diffie-Hellman Key Exchange, ElGamal Encryption, Cryptographic hash functions,
Network security: Network security issues, Sniffing, IP spoofing, Common threats, E-Mail security, IPSec, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, Types of firewall, Intruder Detection Systems.
Digital Signatures: RSA signatures, Signatures from public key systems, ElGamal Signatures, Digital Signature Algorithm, Undeniable Signatures, Blind Signatures, Digital certificates.
Cyber Security: Cyber Crime and security, Security tools, Introduction to Digital Forensic, OS fingerprinting, TCP/IP stack masking, Social engineering.
Laboratory: The lab work will be based on the setting up of network firewalls, Intruder Detection systems, implementation of cryptography algorithms and digital signature algorithms, tcpdump.
M Tech (Computer Science and Applications):Information Security