UNIT 1:
Services, Mechanisms and attacks, OSI security architecture
Network security model and Classical Encryption techniques, Symmetric cipher model
Transposition techniques and Steganography
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields
Modular arithmetic, Euclid’s algorithm
Finite fields, Polynomial Arithmetic, Prime numbers
Fermat’s and Euler’s theorem, Testing for primality
The Chinese remainder theorem, Discrete logarithms.
UNIT 2:
Block cipher principles and block cipher modes of operation
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)- Key Expansion, Example, Implementation
Principles of public key cryptosystems
The RSA algorithm and Key management
Diffie Hellman Key exchange
Elliptic curve arithmetic and Elliptic curve cryptography
UNIT 3:
Authentication requirement and Authentication function
Security of hash function and MAC
Digital signature and authentication protocols
UNIT 4:
Authentication applications and Kerberos
X.509 Authentication services
Roles of Firewalls, Firewall related terminology and Types of Firewalls
Firewall designs and SET for E-Commerce Transactions.
Intruder and Intrusion detection system
Virus and related threats, Countermeasures
Firewalls design principles, Trusted systems
UNIT 5:
E-mail Security: Security Services for E-mail, attacks possible through E-mail, establishing keys, privacy
Authentication of the source, Message Integrity and Non-repudiation
Pretty Good Privacy and S/MIME.
Pretty Good Privacy and S/MIME.
IPSecurity: Overview of IPSec, IP and IPv6
Authentication Header and Encapsulation Security Payload(ESP)
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).
Web Security: SSL/TLS Basic Protocol, computing the keys, client authentication
PKI as deployed by SSL, Attacks fixed in v3, Exportability and Encoding
Secure Electronic Transaction (SET).