Section A
Introduction: Codes and Ciphers – Some Classifical systems – Stiatistical theory of cipher systemsComplexity
theory of crypto systems – Stream ciphers, Block ciphers.
Stream Ciphers: Rotor based system – shift register based systems – Design considerations for stream
ciphers – Cryptanalsysis of stream ciphers – Combined eneryption and encoding. Block Ciphers – DES and
variant, modes of use of DES.
Section B
Public key systems – Knapsack systems – RSK – Diffie Hellman Exchange – Authentication and Digital
signatures, Elliptic curve based systems.
System Identification and clustering: Cryptology of speech signals – narrow band and wide band systems –
Analogue & Digital Systems of speech encryption.
Section C
Security: Hash function – Authentication: Protocols – Digital Signature standards. Electronics Mail Security
– PGP (Pretty Good Privacy) MIME, data Compression technique. IP Security: Architecture, Authentication
Leader, Encapsulating security Payload – Key Management. Web security: Secure Socket Layer & Transport
Layer security, Secure electronics transactions. Firewalls Design principle, established systems.
Section D
Telecommunication Network Architecture, TMN management layers, Management information Model,
Management servicing and functions, Structure of management information and TMN information model,
SNMP v1, SNMP2 & SNMP3, RMON1 & 2, Broadband Network Management (ATM, HFC, DSL), ASN