You are on page 1of 1

Questions

Chapter 1
1. Elements of Information Security
2. Operational Model of Network Security
3. Security Attacks

Chapter 2
1. Encryption Methods
2. Substitution Ciphers and their types
3. Transposition Ciphers
4. Steganography

Chapter 3
1. Block Ciphers Modes of Operations
2. DES
3. Triple DES

Chapter 4
1. AES
2. Key Generation
3. Encryption and Decryption

Chapter 5
1. Blowfish Encryption Algorithm
2. RC5
3. RC4
4. RC6
5. Compare between RC6 and RC5
6. IDEA

NOTE 1: MID-SEM TOPICS

NOTE 2: Follow this Book

CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION PACHGHARE, V. K.,


PHI Learning Pvt. Ltd., Reprint - 2019.

You might also like