M Tech (Computer Science and Applications):Information Security

Thapar University
In Patiala

Price on request
You can also call the Study Centre
17523... More

Important information

Typology Master
Location Patiala
  • Master
  • Patiala


Where and when

Starts Location
On request
Thapar University P.O Box 32, 147004, Punjab, India
See map
Starts On request
Thapar University P.O Box 32, 147004, Punjab, India
See map

Frequent Asked Questions

· Requirements

Admission to M. Tech. (Computer Science and Applications) will be open to a candidate who obtains at least 50% marks in aggregate in the qualifying examination from a recognized university.

Course programme

Semester I

Advanced Data Structures
Data Communication and Computer Networks
Computer Organization and Operating Systems
Computational Algorithms in Optimization
Statistical Methods and Algorithms
Database Management and Administration

Semester II

Object Oriented Analysis and Design
Software Engineering
Logic and its applications
Computer Graphics and Multimedia Technologies
Web Technologies and E-Governance

Semester III

Thesis (starts)

Semester IV

Thesis (contd.)

Information Security

Introduction to cryptography: Encryption schemes, Cryptanalysis, Block ciphers, Stream ciphers, Affine ciphers, DES and AES algorithms,

Public Key Encryption: RSA cryptosystem, Rabin Encryption, Diffie-Hellman Key Exchange, ElGamal Encryption, Cryptographic hash functions,

Network security: Network security issues, Sniffing, IP spoofing, Common threats, E-Mail security, IPSec, SSL, PGP, Intruders, Virus, Worms, Firewalls-need and features of firewall, Types of firewall, Intruder Detection Systems.

Digital Signatures: RSA signatures, Signatures from public key systems, ElGamal Signatures, Digital Signature Algorithm, Undeniable Signatures, Blind Signatures, Digital certificates.

Cyber Security: Cyber Crime and security, Security tools, Introduction to Digital Forensic, OS fingerprinting, TCP/IP stack masking, Social engineering.

Laboratory: The lab work will be based on the setting up of network firewalls, Intruder Detection systems, implementation of cryptography algorithms and digital signature algorithms, tcpdump.

Students that were interested in this course also looked at...
See all