UNIT 1:
1. Services, Mechanisms and attacks, OSI security architecture
Network security model and Classical Encryption techniques, Symmetric cipher model
Transposition techniques and Steganography
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields, Modular arithmetic
Finite fields, Polynomial Arithmetic,
Prime numbers , Fermat’s and Euler’s theorem, Testing for primality
The Chinese remainder theorem, Discrete logarithms
UNIT 2:
Block cipher principles and block cipher modes of operation
Advanced Encryption Standard (AES)- Structure, Transformation Function
Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation
Principles of public key cryptosystems
The RSA algorithm and Key management
Diffie Hellman Key exchange
Elliptic curve arithmetic and Elliptic curve cryptography
UNIT 3:
Authentication requirement and Authentication function
Security of hash function and MAC
Digital signature and authentication protocols
Authentication requirement and Authentication function
UNIT 4:
Roles of Firewalls, Firewall related terminology and Types of Firewalls
X.509 Authentication services
Authentication applications and Kerberos
Firewall designs and SET for E-Commerce Transactions
Intruder and Intrusion detection system
Virus and related threats, Countermeasures
Practical implementation of cryptography and security
UNIT 5:
E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys, privacy
Authentication of the source, Message Integrity and Non-repudiation
Pretty Good Privacy and S/MIME
IPSecurity: Overview of IPSec, IP and IPv6
Authentication Header and Encapsulation Security Payload(ESP)
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication
PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding
Secure Electronic Transaction (SET).