<<<<<<< HEAD rgpv syllabus BE Grading System 8th Semester Microsoft Word - VIII IT_SY_

IT- 801 – Information Security


Branch : Information Technology, VIII Semester

Course: Information Security


Unit I: Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).


Unit II: Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.


Unit III: Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL), Transport Layer Security (TLS).


Unit IV: Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail

,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.


Unit V: Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.


References:-

Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.

Forouzan, “Cryptography & Network Security”, TMH

Randy Weaver, “ Network Infrastructure Security”, Cengage Learning. Atual Kahate, “ Cryptography and Network Security”, TMH.

William Stalling, “ Cryptography and Network security”, Pearson.


List of Experiment:-

IT- 802 – Soft Computing


Branch : Information Technology, VIII Semester

Course: Soft Computing


Unit I: Introduction to Neural Network: Concept, biological neural network, evolution of artificial neural network, McCulloch-Pitts neuron models, Learning (Supervise & Unsupervise) and activation function, Models of ANN-Feed forward network and feed back network, Learning Rules- Hebbian, Delta, Perceptron Learning and Windrow-Hoff, winner take all.


Unit II: Supervised Learning: Perceptron learning,- Single layer/multilayer, linear Separability, Adaline, Madaline, Back propagation network, RBFN. Application of Neural network in forecasting, data compression and image compression.


Unit III: Unsupervised learning: Kohonen SOM (Theory, Architecture, Flow Chart, Training Algorithm) Counter Propagation (Theory , Full Counter Propagation NET and Forward only counter propagation net), ART (Theory, ART1, ART2). Application of Neural networks in pattern and face recognition, intrusion detection, robotic vision.


Unit IV: Fuzzy Set: Basic Definition and Terminology, Set-theoretic Operations, Member Function, Formulation and Parameterization, Fuzzy rules and fuzzy Reasoning, Extension Principal and Fuzzy Relations, Fuzzy if-then Rules, Fuzzy Inference Systems. Hybrid system including neuro fuzzy hybrid, neuro genetic hybrid and fuzzy genetic hybrid, fuzzy logic controlled GA. Application of Fuzzy logic in solving engineering problems.


Unit V: Genetic Algorithm: Introduction to GA, Simple Genetic Algorithm, terminology and operators of GA (individual, gene, fitness, population, data structure, encoding, selection, crossover, mutation, convergence criteria). Reasons for working of GA and Schema theorem, GA optimization problems including JSPP (Job shop scheduling problem), TSP (Travelling salesman problem), Network design routing, timetabling problem. GA implementation using MATLAB.


References:-

S.N. Shivnandam, “Principle of soft computing”, Wiley.

S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.

Simon Haykins, “Neural Network- A Comprehensive Foudation”

Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.


List of Experiment:-

======= rgpv syllabus BE Grading System 8th Semester Microsoft Word - VIII IT_SY_

IT- 801 – Information Security


Branch : Information Technology, VIII Semester

Course: Information Security


Unit I: Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).


Unit II: Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.


Unit III: Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL), Transport Layer Security (TLS).


Unit IV: Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail

,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.


Unit V: Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.


References:-

Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning. Charlie Kaufman, “ Network Security”, PHI.

Forouzan, “Cryptography & Network Security”, TMH

Randy Weaver, “ Network Infrastructure Security”, Cengage Learning. Atual Kahate, “ Cryptography and Network Security”, TMH.

William Stalling, “ Cryptography and Network security”, Pearson.


List of Experiment:-

IT- 802 – Soft Computing


Branch : Information Technology, VIII Semester

Course: Soft Computing


Unit I: Introduction to Neural Network: Concept, biological neural network, evolution of artificial neural network, McCulloch-Pitts neuron models, Learning (Supervise & Unsupervise) and activation function, Models of ANN-Feed forward network and feed back network, Learning Rules- Hebbian, Delta, Perceptron Learning and Windrow-Hoff, winner take all.


Unit II: Supervised Learning: Perceptron learning,- Single layer/multilayer, linear Separability, Adaline, Madaline, Back propagation network, RBFN. Application of Neural network in forecasting, data compression and image compression.


Unit III: Unsupervised learning: Kohonen SOM (Theory, Architecture, Flow Chart, Training Algorithm) Counter Propagation (Theory , Full Counter Propagation NET and Forward only counter propagation net), ART (Theory, ART1, ART2). Application of Neural networks in pattern and face recognition, intrusion detection, robotic vision.


Unit IV: Fuzzy Set: Basic Definition and Terminology, Set-theoretic Operations, Member Function, Formulation and Parameterization, Fuzzy rules and fuzzy Reasoning, Extension Principal and Fuzzy Relations, Fuzzy if-then Rules, Fuzzy Inference Systems. Hybrid system including neuro fuzzy hybrid, neuro genetic hybrid and fuzzy genetic hybrid, fuzzy logic controlled GA. Application of Fuzzy logic in solving engineering problems.


Unit V: Genetic Algorithm: Introduction to GA, Simple Genetic Algorithm, terminology and operators of GA (individual, gene, fitness, population, data structure, encoding, selection, crossover, mutation, convergence criteria). Reasons for working of GA and Schema theorem, GA optimization problems including JSPP (Job shop scheduling problem), TSP (Travelling salesman problem), Network design routing, timetabling problem. GA implementation using MATLAB.


References:-

S.N. Shivnandam, “Principle of soft computing”, Wiley.

S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI. Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.

Simon Haykins, “Neural Network- A Comprehensive Foudation”

Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.


List of Experiment:-

>>>>>>> html