Information security hand written notes

INFORMATION SECURITY Credit : 3 1.Introduction, CRYPTO BASICS :Classic Crypto, Simple Substitution Cipher,, Cryptanalysis of a simple substitution, Double Transposition Cipher, One-time Pad, Project VENONA, Codebook Cipher. 2.SYMMETRIC KEY CRYPTO :Stream Ciphers, A5/1, RC4, Block Ciphers, Fiestel Cipher, DES, Triple DES, AES. 3.PUBLIC KEY CRYPTO :Knapsack, RSA, Diffie-Hellman, Uses for Public Key Crypto. 4.HASH FUNCTION : AUTHENTICATION : Authentication Methods, Keys versus Passwords, Biometrics, Two-Factor […]

Continue reading

Compiler design

COMPILER DESIGN   L–T–P : 3–0–3   Credit : 5 1. Introduction to Compilers : Compilers and translators, The phases of a compiler, Compiler writing tools, The lexical and System structure of a language, Operators, Assignment statements and parameter translation. Lecture : 2 2. Lexical Analysis : The role of the lexical analyzer, Specification of tokens, Lexical analysis tool. Lecture : 2 3. Syntax Analysis : Role […]

Continue reading