CO1: Appreciate the contemporary advancements in the field of cryptography and Network Security
CO2: Elaborate the computational hardness of re synthesis process of various cryptographic algorithms
CO3: Use pseudo random number generators in key distribution and management
CO4: Analyze the pros and cons of various security protocols and its applications.
CO5: Explore the necessity of cryptographic algorithms in hardware peripheral design and Digital Signatures.