Vous êtes sur la page 1sur 6

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY

UNIT I INTRODUCTION & NUMBER THEORY 10


Services, Mechanisms and attacks-the OSI security architecture-Network security modelClassical Encryption techniques (Symmetric cipher model, substitution techniques,
transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY:
Groups, Rings, Fields-Modular arithmetic- Euclids algorithm-Finite fields- Polynomial
Arithmetic Prime numbers-Fermats and Eulers theorem- Testing for primality -The
Chinese remainder theorem- Discrete logarithms.
UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY 10
Data Encryption Standard-Block cipher principles-block cipher modes of operationAdvanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key
cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management
- Diffie Hellman Key exchange- Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES 8
Authentication requirement Authentication function MAC Hash function Security of
hash function and MAC MD5 - SHA - HMAC CMAC - Digital signature and
authentication protocols DSS EI Gamal Schnorr.
UNIT IV SECURITY PRACTICE & SYSTEM SECURITY 8
Authentication applications Kerberos X.509 Authentication services - Internet Firewalls
for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls Firewall designs SET for E-Commerce Transactions. Intruder Intrusion detection system
Virus and related threats Countermeasures Firewalls design principles Trusted systems
Practical implementation of cryptography and security.
UNIT V E-MAIL, IP & WEB SECURITY 9
E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing
keys privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good
Privacy-S/MIME.
IP Security: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security
Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
Web Security: SSL/TLS
Basic Protocol-computing the keys- client authentication-PKI as deployed by SSLAttacks
fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).
TEXT BOOKS:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education,
March 2013. (UNIT I,II,III,IV).
2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, Prentice Hall of
India, 2002. (UNIT V).
REFERENCES:
1. Behrouz A. Ferouzan, Cryptography & Network Security, Tata Mc Graw Hill, 2007.
2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and
Protocols, Wiley Publications, 2003.
3. Charles Pfleeger, Security in Computing, 4th Edition, Prentice Hall of India, 2006.
4. Ulysess Black, Internet Security Protocols, Pearson Education Asia, 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, Network Security, Second Edition,
Private Communication in Public World, PHI 2002.
6. Bruce Schneier and Neils Ferguson, Practical Cryptography, First Edition, Wiley
Dreamtech India Pvt Ltd, 2003.
7. Douglas R Simson Cryptography Theory and practice, First Edition, CRC Press, 1995.
8. http://nptel.ac.in/.

CS6702 GRAPH THEORY AND APPLICATIONS


UNIT I INTRODUCTION 9
Graphs Introduction Isomorphism Sub graphs Walks, Paths, Circuits Connectedness
Components Euler graphs Hamiltonian paths and circuits Trees Properties of trees
Distance and centers in tree Rooted and binary trees.
UNIT II TREES, CONNECTIVITY & PLANARITY 9
Spanning trees Fundamental circuits Spanning trees in a weighted graph cut sets
Properties of cut set All cut sets Fundamental circuits and cut sets Connectivity and
separability Network flows 1-Isomorphism 2-Isomorphism Combinational and
geometric graphs Planer graphs Different representation of a planer graph.
UNIT III MATRICES, COLOURING AND DIRECTED GRAPH 8
Chromatic number Chromatic partitioning Chromatic polynomial Matching Covering
Four color problem Directed graphs Types of directed graphs Digraphs and binary
relations Directed paths and connectedness Euler graphs.
UNIT IV PERMUTATIONS & COMBINATIONS 9
Fundamental principles of counting - Permutations and combinations - Binomial theorem combinations with repetition - Combinatorial numbers - Principle of inclusion and exclusion Derangements - Arrangements with forbidden positions.
UNIT V GENERATING FUNCTIONS 10
Generating functions - Partitions of integers - Exponential generating function Summation
operator - Recurrence relations - First order and second order Non-homogeneous recurrence
relations - Method of generating functions.
TEXT BOOKS:
1. Narsingh Deo, Graph Theory: With Application to Engineering and Computer Science,
Prentice Hall of India, 2003.
2. Grimaldi R.P. Discrete and Combinatorial Mathematics: An Applied Introduction,
Addison
Wesley, 1994.
REFERENCES:
1. Clark J. and Holton D.A, A First Look at Graph Theory, Allied Publishers, 1995.
2. Mott J.L., Kandel A. and Baker T.P. Discrete Mathematics for Computer Scientists and
Mathematicians , Prentice Hall of India, 1996.
3. Liu C.L., Elements of Discrete Mathematics, Mc Graw Hill, 1985.
4. Rosen K.H., Discrete Mathematics and Its Applications, Mc Graw Hill, 2007.

CS6703 GRID AND CLOUD COMPUTING


UNIT I INTRODUCTION 9
Evolution of Distributed computing: Scalable computing over the Internet Technologies for
network based systems clusters of cooperative computers - Grid computing Infrastructures
cloud computing - service oriented architecture Introduction to Grid Architecture and
standards Elements of Grid Overview of Grid Architecture.
UNIT II GRID SERVICES 9
Introduction to Open Grid Services Architecture (OGSA) Motivation Functionality
Requirements Practical & Detailed view of OGSA/OGSI Data intensive grid service
models OGSA services.
UNIT III VIRTUALIZATION 9
Cloud deployment models: public, private, hybrid, community Categories of cloud
computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of
cloud computing Implementation levels of virtualization virtualization structure
virtualization of CPU, Memory and I/O devices virtual clusters and Resource Management
Virtualization for data center automation.
UNIT IV PROGRAMMING MODEL 9
Open source grid middleware packages Globus Toolkit (GT4) Architecture , Configuration
Usage of Globus Main components and Programming model - Introduction to Hadoop
Framework - Mapreduce, Input splitting, map and reduce functions, specifying input and
output parameters, configuring and running a job Design of Hadoop file system, HDFS
concepts, command line and java interface, dataflow of File read & File write.
UNIT V SECURITY 9
Trust models for Grid security environment Authentication and Authorization methods
Grid security infrastructure Cloud Infrastructure security: network, host and application
level aspects of data security, provider data and its security, Identity and access
management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the
cloud, Key privacy issues in the cloud.
TEXT BOOK:
1. Kai Hwang, Geoffery C. Fox and Jack J. Dongarra, Distributed and Cloud Computing:
Clusters, Grids, Clouds and the Future of Internet, First Edition, Morgan Kaufman
Publisher, an Imprint of Elsevier, 2012.
REFERENCES:
1. Jason Venner, Pro Hadoop- Build Scalable, Distributed Applications in the Cloud, A
Press, 2009
2. Tom White, Hadoop The Definitive Guide, First Edition. OReilly, 2009.
3. Bart Jacob (Editor), Introduction to Grid Computing, IBM Red Books, Vervante, 2005
4. Ian Foster, Carl Kesselman, The Grid: Blueprint for a New Computing Infrastructure,
2nd Edition, Morgan Kaufmann.
5. Frederic Magoules and Jie Pan, Introduction to Grid Computing CRC Press, 2009.
6. Daniel Minoli, A Networking Approach to Grid Computing, John Wiley Publication,
2005.
7. Barry Wilkinson, Grid Computing: Techniques and Applications, Chapman and Hall,
CRC, Taylor and Francis Group, 2010.

CS6704 RESOURCE MANAGEMENT TECHNIQUES


UNIT I LINEAR PROGRAMMING 9
Principal components of decision problem Modeling phases LP Formulation and graphic
solution Resource allocation problems Simplex method Sensitivity analysis.
UNIT II DUALITY AND NETWORKS 9
Definition of dual problem Primal Dual relation ships Dual simplex methods Post
optimality analysis Transportation and assignment model - Shortest route problem.
UNIT III INTEGER PROGRAMMING 9
Cutting plan algorithm Branch and bound methods, Multistage (Dynamic) programming.
UNIT IV CLASSICAL OPTIMISATION THEORY: 9
Unconstrained external problems, Newton Ralphson method Equality constraints
Jacobean methods Lagrangian method Kuhn Tucker conditions Simple problems.
UNIT V OBJECT SCHEDULING: 9
Network diagram representation Critical path method Time charts and resource leveling
PERT.
TEXT BOOK:
1. H.A. Taha, Operation Research, Prentice Hall of India, 2002.
REFERENCES:
1. Paneer Selvam, Operations Research, Prentice Hall of India, 2002
2. Anderson Quantitative Methods for Business, 8th Edition, Thomson Learning, 2002.
3. Winston Operation Research, Thomson Learning, 2003.
4. Vohra, Quantitative Techniques in Management, Tata Mc Graw Hill, 2002.
5. Anand Sarma, Operation Research, Himalaya Publishing House, 2003.

CS6004 CYBER FORENSICS


UNIT I NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY 9
IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec .
Transport layer Security: SSL protocol, Cryptographic Computations TLS Protocol.
UNIT II E-MAIL SECURITY & FIREWALLS 9
PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related
terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
UNIT III INTRODUCTION TO COMPUTER FORENSICS 9
Introduction to Traditional Computer Crime, Traditional problems associated with Computer
Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and
incident response methodology - Forensic duplication and investigation. Preparation for IR:
Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding
Computer Investigation Data Acquisition.
UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS 9
Processing Crime and Incident Scenes Working with Windows and DOS Systems. Current
Computer Forensics Tools: Software/ Hardware Tools.
UNIT V ANALYSIS AND VALIDATION 9
Validating Forensics Data Data Hiding Techniques Performing Remote Acquisition
Network Forensics Email Investigations Cell Phone and Mobile Devices Forensics
TEXT BOOKS:
1. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and
Protocols,
Wiley Publications, 2003.
2. Nelson, Phillips, Enfinger, Steuart, Computer Forensics and Investigations, Cengage
Learning,
India Edition, 2008.
REFERENCES:
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005
2. Richard E.Smith, Internet Cryptography, 3rd Edition Pearson Education, 2008.
3. Marjie T.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition,
Prentice
Hall, 2013.

CS6007 INFORMATION RETRIEVAL L T P C


UNIT I INTRODUCTION 9
Introduction -History of IR- Components of IR - Issues Open source Search engine
Frameworks - The impact of the web on IR - The role of artificial intelligence (AI) in IR IR
Versus Web Search - Components of a Search engine- Characterizing the web.
UNIT II INFORMATION RETRIEVAL 9
Boolean and vector-space retrieval models- Term weighting - TF-IDF weighting- cosine
similarity Preprocessing - Inverted indices - efficient processing with sparse vectors
Language Model based IR - Probabilistic IR Latent Semantic Indexing - Relevance
feedback and query expansion.
UNIT III WEB SEARCH ENGINE INTRODUCTION AND CRAWLING 9
Web search overview, web structure, the user, paid placement, search engine optimization/
spam. Web size measurement - search engine optimization/spam Web Search Architectures
- crawling - meta-crawlers- Focused Crawling - web indexes - Near-duplicate detection Index Compression - XML retrieval.
UNIT IV WEB SEARCH LINK ANALYSIS AND SPECIALIZED SEARCH 9
Link Analysis hubs and authorities Page Rank and HITS algorithms -Searching and
Ranking Relevance Scoring and ranking for Web Similarity - Hadoop & Map Reduce Evaluation - Personalized search - Collaborative filtering and content-based recommendation
of documents and products handling invisible Web - Snippet generation, Summarization,
Question Answering, Cross- Lingual Retrieval.
UNIT V DOCUMENT TEXT MINING 9
Information filtering; organization and relevance feedback Text Mining -Text classification
and clustering - Categorization algorithms: naive Bayes; decision trees; and nearest neighbor
Clustering algorithms: agglomerative clustering; k-means; expectation maximization (EM).
TEXT BOOKS:
1. C. Manning, P. Raghavan, and H. Schtze, Introduction to Information Retrieval ,
Cambridge University Press, 2008.
2. Ricardo Baeza -Yates and Berthier Ribeiro - Neto, Modern Information Retrieval: The
Concepts and Technology behind Search 2nd Edition, ACM Press Books 2011.
3. Bruce Croft, Donald Metzler and Trevor Strohman, Search Engines: Information Retrieval
in Practice, 1st Edition Addison Wesley, 2009.
4. Mark Levene, An Introduction to Search Engines and Web Navigation, 2nd Edition Wiley,
2010.
REFERENCES:
1. Stefan Buettcher, Charles L. A. Clarke, Gordon V. Cormack, Information Retrieval:
Implementing and Evaluating Search Engines, The MIT Press, 2010.
2. Ophir Frieder Information Retrieval: Algorithms and Heuristics: The Information
Retrieval Series , 2nd Edition, Springer, 2004.
3. Manu Konchady, Building Search Applications: Lucene, Ling Pipe, and First Edition,
Gate Mustru Publishing, 2008.