Network Security Most IMP Topics for GTU Exam - Click Here
Unit – 1
Basic Terms of Network Security - Video Link | Blog Link
Network Security Model – Video Link | Blog Link
CIA Triangle (Security Services) – Video Link | Blog Link
Symmetric Cipher Model (Symmetric key cryptography) – Video Link | Blog Link
Asymmetric Cipher Model (Asymmetric key cryptography) – Video Link | Blog Link
Differentiate Symmetric and Asymmetric Key Cryptography – Video Link | Blog Link
Types of Attack: Blog Link
Active Attack – Video Link | Blog Link
Passive Attack – Video Link | Blog Link
Differentiate active attack and passive attack – Video Link | Blog Link
Substitution Cipher:
Caesar cipher – Video Link | Blog Link
Monoalphabetic Cipher – Video Link | Blog Link
Play fair cipher – Video Link | Blog Link
Vigenère Cipher (Polyalphabetic Cipher) – Video Link | Blog Link
One time pad cipher – Video Link | Blog Link
Hill Cipher – Video Link | Blog Link
Differentiate mono alphabetic and poly alphabetic cipher – Video Link | Blog Link
Transposition techniques:
Columnar Transposition Cipher – Video Link | Blog Link
Rail fence cipher (Zigzag Cipher) – Video Link | Blog Link
Differentiate Substitution cipher and Transposition cipher – Video Link | Blog Link
Unit – 2
Stream ciphers and Block ciphers – Video Link | Blog Link
Confusion & Diffusion (Frustrated Statistical Analysis or Claud Shannon Properties) – Video Link | Blog Link
Feistel Cipher Structure (to understand DES) – Video Link | Blog Link
Data Encryption Standard (DES) Algorithm – Video Link | Blog Link
DES Example using Animation – Video Link
Strength & Weakness of DES, Avalanche effect in DES – Video Link | Blog Link
Advanced Encryption Standard (AES) Algorithm with structure – Video Link | Blog Link
AES Introduction – Video Link | Blog Link
Plain text convert into 4x4 matrix in AES – Video Link | Blog Link
AES transformation function:
Sub Bytes – Video Link | Blog Link
Shift Rows – Video Link | Blog Link
Mix Column – Video Link | Blog Link
Add Round Key – Video Link | Blog Link
AES Example using Animation – Video Link
Key expansion in AES – Video Link | Blog Link
Unit – 3
Multiple encryptions in DES:
Double DES – Video Link | Blog Link
Triple DES – Video Link | Blog Link
Modes of operation in Block cipher & Applications of Block Cipher Modes – Video Link | Blog Link
Electronic Code Book (ECB Mode) – Video Link | Blog Link
Cipher Block Chaining Mode (CBC Mode) – Video Link | Blog Link
Cipher Feedback mode (CFB Mode) – Video Link | Blog Link
Output Feedback mode (OFB Mode) – Video Link | Blog Link
Counter mode (CTR Mode) – Video Link | Blog Link
Unit – 4
Public Key Cryptosystems with Applications – Video Link | Blog Link
Requirements and Cryptanalysis – Video Link | Blog Link
RSA algorithm (Explain with example step by step) – Video Link | Blog Link
Diffie-Hellman Key Exchange algorithm (Explain with example) – Video Link | Blog Link
Man-in-Middle attack in Diffie-Hellman – Video Link | Blog Link
Man-in-the Middle attack in DES – Video Link | Blog Link
Unit – 5
Introduction of Hash Function, Properties of Hash Function & Simple Hash Function – Video Link | Blog Link
Applications of Hash Function – Video Link | Blog Link
Requirement and Security of Hash Function – Video Link | Blog Link
Hash functions based on Cipher Block Chaining – Video Link | Blog Link
Secure Hash Algorithm (SHA-1) – Video Link | Blog Link
Message Digest (MD - 5) – Video Link | Blog Link
Difference between SHA 1 & MD 5 – Video Link | Blog Link
Unit – 6
Introduction of Message Authentication Code (MAC) | Application of MAC – Video Link | Blog Link
MAC based on Hash Functions (HMAC) – Video Link | Blog Link
MAC based on Block Ciphers – Video Link | Blog Link
Difference between hash function and MAC – Video Link | Blog Link
Unit – 7
Introduction of Digital Signature & its properties – Video Link | Blog Link
Digital Signature Requirements and security – Video Link | Blog Link
El Gamal & Schnorr Digital Signature Scheme – Video Link | Blog Link
Digital Signature Algorithm (Include RSA approach & Digital Signature Standard) – Video Link | Blog Link
Unit – 8
Key management and distribution – Video Link | Blog Link
Symmetric key distribution using symmetric Encryption – Video Link | Blog Link
Symmetric key distribution using asymmetric Encryption – Video Link | Blog Link
Distribution of public keys – Video Link | Blog Link
X.509 Certificate Format – Video Link | Blog Link
Obtain & Revoke X.509 Certificate – Video Link | Blog Link
Public key infrastructure (PKI) – Video Link | Blog Link
Unit – 9
Remote user authentication with symmetric encryption – Video Link | Blog Link
Kerberos Protocol terminology, requirement & working – Video Link | Blog Link
Kerberos Version 4 – Video Link | Blog Link
Kerberos Version 4 message exchange – Video Link | Blog Link
Kerberos Realm – Video Link | Blog Link
Unit – 10
Web Security Threats and Approaches – Video Link | Blog Link
SSL (Secure Socket Layer) – Video Link | Blog Link
HTTPS – Video Link | Blog Link
SSH – Video Link | Blog Link
Thank-you sir
ReplyDeleteYou are welcome...Please share with others and follow my blog...
DeleteSubscribe my channel: https://www.youtube.com/channel/UCPEyHmxdc9-eqyC6h66Y6Vw
You wrote this post very carefully.network security assignment help The amount of information is stunning and also a gainful article for us. Keep sharing this kind of articles, Thank you.
ReplyDeleteGlad to hear that...!!! Please share with others and follow my blog...
Deletesir can you mention the reference here?
ReplyDeleteFor what kind of reference you want???
DeleteHey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you Best Commercial Property Security services Adelaide service provider.
ReplyDeleteThank you... Please share with others and follow my blog
Deleteblow fish
ReplyDeletesir please upload blog of kerberos V 5
ReplyDeleteexcellent
ReplyDeletegreat articles.. thanks.. it helped me alot bcz i am in gtu university
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteThanks for share your blog here .
ReplyDeletebuy fragrance
Comparta gran información sobre su blog, Blog realmente útil para nosotros.
ReplyDeletecomprar cialis generico
Impressive and powerful suggestion by the author of this blog are really helpful to me.
ReplyDeleteantivirus protection brisbane
I read your blog now share great information here.
ReplyDeletecustomise your motorcycle
Nice and interesting information and informative too.
ReplyDeleteExcavator hire
You wrote an extremely useful article Network Security and Protection Solution Atlanta. I gleaned some useful information from this article. Many thanks for writing about it. I wish you continued success.
ReplyDeleteI am grateful to this blog site providing special as well as useful understanding concerning this subject.
ReplyDeleteDarwin movers
I am thankful to this blog giving unique and helpful knowledge about this topic.
ReplyDeletebuying a secondhand iPhone
This comment has been removed by the author.
ReplyDeleteWith the assistance of such countless various kinds of security instruments which are accessible nowadays, it has become exceptionally simple to ensure that the homes are no problem at all.
ReplyDeletealphasecuritemontreal.com
Excellent knowledge, You are providing important knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Read more info about Network Security Services
ReplyDelete