UNIT 1:
Security trends - Legal, Ethical and Professional Aspects of Security,
Need for Security at Multiple levels, Security Policies
Model of network security
Security attacks, services and mechanisms
– OSI security architecture – Classical encryption techniques: substitution techniques,
transposition techniques, steganography)
product cryptosystem – cryptanalysis
Foundations of modern cryptography: perfect security
UNIT 2:
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures
Modular arithmetic-]Euclid‘s algorithm- Congruence and matrices
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES
Strength of DES – Differential and linear cryptanalysis
Advanced Encryption Standard - RC4 – Key distribution
Evaluation criteria for AES
Block cipher design principles
Block cipher mode of operation
Groups, Rings, Fields- Finite fields
UNIT 3:
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
Factorization – Euler‘s totient function
Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
Diffie Hellman key exchange
Elliptic curve arithmetic-Elliptic curve cryptography
Key distribution – Key management
Exponentiation and logarithm
UNIT 4:
Authentication applications
Digital signature and authentication protocols – DSS
Security of hash function and MAC – SHA
Entity Authentication: Biometrics, Passwords
Authentication requirement
Challenge Response protocols
UNIT 5:
SYSTEM SECURITY: Intruders