10.07.2015 Views

B.Tech. Degree Programme Computer Science & Engineering

B.Tech. Degree Programme Computer Science & Engineering

B.Tech. Degree Programme Computer Science & Engineering

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B.<strong>Tech</strong>. <strong>Computer</strong> <strong>Science</strong> & <strong>Engineering</strong> (Regular)Linkers, Macros, Compilers, Software tools: Texteditors, Interpreters, program generators, Testingsoftware, Programming environment (such asIntegrated Development Editors)2. SYSTEM SOFTWARE SPECIFICS: Compiler:Brief overview of compilation process, Incrementalcompiler, structure of compiler: its different phases,Compiler construction tools. Assembler: Problemstatement, single phase and two phase assembler,symbol table; Loader schemes, compile and goLoader, general loader schemes, absolute loader,Subroutine linkage, Reallocating loader, Directlinkage Loader, Binders, Linking loader, overlays3. LEXICAL AND SYNTAX ANALYSIS: Role oflexical analyzer, design of lexical analyzer, regularexpressions, Specification and recognition oftokens, input buffering, a language specifyinglexical analyzer. Finite automata, conversion fromregular expression to finite automata, and viceversa, minimizing number of states of DFA,Implementation of lexical analyzer. SyntaxAnalysis: Role of parsers, context free grammars,definition of parsing4. PARSING TECHNIQUE: Shift- reduce parsing,operator precedence parsing, top down parsing,predictive parsing. LR parsers, SLR, LALR andCanonical LR parser5. SYNTAX DIRECTED TRANSLATIONS: Syntaxdirected definition, construction of syntax trees,syntax directed translation scheme,implementation of syntax directed translation, threeaddress code, quadruples and triples6. SYMBOL TABLE & ERROR DETECTION ANDRECOVERY: Symbol tables, its contents and datastructure for symbol tables; trees, arrays, linkedlists, hash tables. Errors, lexical phase error,syntactic phase error, semantic error7. CODE OPTIMIZATION AND CODEGENERATION: Code generation, forms of objectscode, machine dependent code, optimization,register allocation for temporary and user definedvariablesTEXT BOOKAlfred V. Aho, Ravi Sethi & J.D. Ullman, “CompilersPrinciple, <strong>Tech</strong>niques & Tools”, Addison Wesley, 1998REFERENCE BOOKS1. Kakde O. G., “Compiler Design”, LaxmiPublications, 19952. Dhamdhere, “System Software”, McGraw Hill,19863. Trembley and Sorenson, “Theory and Practice ofCompiler Writing”, McGraw Hill, 19854. Aho Alfred V. And Ullman Jeffrey D “Principles ofCompiler Design”, Narosa Publication, 1989.WEB REFERENCES1. www.onesmartclick.com/engineering/compilerdesign.html2. www.cse.iitd.ernet.in/~sak/courses/cdp/slides.pdf3. www.holub.com/software/compiler.design.in.c.docs.pdf4. en.wikipedia.org/wiki/Principles_of_Compiler_Design5. www.holub.com/software/compiler.design.in.c.htmlCS-422CRYPTOGRAPHY AND L T P CrDATA COMPRESSION 5 0 0 3OBJECTIVEThe course will attempt to dispel some of the manymyths that surround the idea of cryptography.Cryptography is (and will continue to be) anincreasingly important area of IT and it is important thatpractitioners are aware of the realities of the subject.The course will provide a down-to-earth overview ofcryptographic techniques applicable in an ITenvironment, and outline the constraints and limitationsof realistic secure systems. A running theme is thetradeoff between usability and security of a system.Also covered are a number of compression techniques- data compression and data encryption are, in somerespects, closely related. A working knowledge of C isassumed and essential.PRE-REQUISITESKnowledge of cryptography, analysis & designalgorithms and mathematics1. INTRODUCTION: Basics of cryptography; history;usefulness of compression techniques2. COMPRESSION: Packing, Huffman coding, Runlength encoding, Lempel-Ziv-Welch, PKZIP, Deltamodulation, JPEG; latest compression techniques3. ERROR DETECTION AND CORRECTION: Parity,1, 2, n-dimensions; Hamming codes; p-out-of-qcodes4. CRYPTOGRAPHY: vocabulary; history;steganography - visual textual, cipher hiding, falseerrors; public key cryptography - authentication,signatures, deniability5. MATHEMATICS: Information; confusion; diffusion;modular arithmetic; inverses; Fermats littletheorem; Chinese remainder theorem; factoring;prime numbers; discrete logarithms6. ALGORITHMS: DES; AES (Rijndael); IDEA; Onetime pad; Secret sharing and splitting; RSA; Ellipticcurves; Modes; Random numbers7. ATTACKING SYSTEMS: Recognition; destroyingdata; cryptanalysis: differential cryptanalysis,cracking desTEXT BOOKSchneier B., “Applied Cryptography: Protocols,Algorithms and Source Code in C”, 2nd edition, Wiley,1996.REFERENCE BOOKS1. Desai Suhas, “Security in Computing”, PearsonsEducation 20102. “Integration of Data Compression andCryptography: Another Way to Increase theInformation Security”, IEEE <strong>Computer</strong> SocietyVolume 2 ,20073. Trappe W. and Washington L., “Introduction toCryptography”, 2nd edition, Pearson Education,2006WEB REFERENCES1. http://www.data-compression.com/index.shtml2. http://www.webopedia.com/TERM/D/data_compression.html36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!