Cryptography

Unit - 4 Cryptography

Unit 6: Cryptography

In Unit 6: Cryptography , learn concepts like User Authentication and Kerberos: Introduction, Authentication Basics, Passwords, Authentication Tokens, Certificate-based-Authentication, Biometric Authentication, Kerberos, Key Distribution Center(KDC), SecurityHandshake Pitfalls, Single Sign On (SSO) Approaches. Que 1. What is Biometric Authentication? Explain techniques of Biometric Authentication. Working: (a) Face: Distance between facial features is measured using geometrical techniques […]

Unit 6: Cryptography Read More »

Unit - 4 Cryptography

Unit 2: Cryptography

Que 1. What are streams and block cipher in Cryptography? Distinguish between Stream and block cipher Stream Cipher: Block Cipher: Parameters Block Cipher Stream Cipher Definition Block Cipher is the kind of encryption that converts plaintext by taking each block individually. Stream cipher is the kind of encryption that converts plaintext by taking one byte of the

Unit 2: Cryptography Read More »

Unit - 4 Cryptography

Unit 1: Cryptography

Que 1. List out the principles of Security. Here are some most important questions which are asked in University exam for unit 1: cryptography Having discussed some of the attacks that have occurred in real life, let us now classify the principles related to security. This will help us understand the attacks better, and also

Unit 1: Cryptography Read More »

Unit - 4 Cryptography

Unit 5: Cryptography

Contents : Internet Security Protocols: Introduction, Concepts, Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Hypertext Transport Protocol(SHTTP), Time Stamping Protocol(TSP), Secure Electronic Transaction(SET), SSL Versus SET, 3-D Secure Protocol, Electronic Money, Email Security, Wireless Application Protocol(WAP)Security, Security in GSM, Security in 3G Que 1: What are Internet Security Protocols? Explain any one. Internet security protocols

Unit 5: Cryptography Read More »

Unit - 4 Cryptography

Unit – 4 Cryptography

Topics: Digital Certificates and Public Key Infrastructure (PKI): Introduction, Digital Certificates, Private KeyManagement, The PKIX Model, Public Key Cryptography Standards (PKCS), XML,PKI and Security, CreatingDigital Certificate. Que 1. What is Digital Certificates? Explain steps for creating digital certificate digital certificate is a way to confirm the identity of a public key owner. Normally, a third

Unit – 4 Cryptography Read More »

Unit - 4 Cryptography

Unit 3: Cryptography

Topics: Asymmetric Key Algorithms, Digital Signatures and RSA: Introduction, History and Overview of Asymmetric KeyCryptography, The RSA Algorithm, Symmetric and Asymmetric Cryptography, Digital Signatures, Knapsack andother Algorithms. Que. 1: What are applications of RSA algorithm? Explain steps of RSA Algorithm. The RSA algorithm is a widely used public-key cryptography algorithm that is named after its

Unit 3: Cryptography Read More »

Scroll to Top