UNIT 1:
Services, Mechanisms and attacks-the OSI security architecture
Network security model-Classical Encryption techniques (Symmetric cipher model)
Transposition Techniques and Stenography
FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic
Finite Fields and Polynomial Arithmetic
Prime numbers-Fermat’s and Euler’s theorem- Testing for primality
Chinese Remainder Theorem-Dicrete Algorithm
UNIT 2:
Block cipher principles-block cipher modes of operation
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Principles of Public Key Cryptosystem
RSA Algorithm - Key management
iffie Hellman Key exchange
Elliptic Curve Arithmetic and Cryptography
UNIT 3:
Authentication Requirement and Function
Security of hash function and MAC
DIGITAL SIGNATURE AND AUTHENTICATION PROTOCOL
UNIT 4:
Authentication applications – Kerberos
X.509 Authentication Service
Internet Firewalls for Trusted System: Roles of Firewalls- Firewall related terminology- Types of Firewalls
Firewall designs – SET for E-Commerce Transactions
Intruder and Intruder Detection System
Virus and related Threats- Countermeasures
: Firewalls design principles-Trusted systems
Practical implementation of cryptography and security
UNIT 5:
E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy
Authentication of the source-Message Integrity-Non- Repudiation
Pretty Good Privacy-S/MIME
IPSecurity: Overview of IPSec - IP and IPv6
Authentication Header-Encapsulation Security Payload (ESP)
Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding
Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication
PKI as deployed by SSLAttacks fixed in v3- Exportability- Encoding
Secure Electronic Transaction (SET)