Introduction to cryptography, Security threats , Vulnerability ,Active and Passive ,Security service and Mechanism, Conventional Encryption , CIA Model , Modular Athematic ,Euclidean and extended Euclidean algorithm , Prime numbers ,Fermat's and Euler's Theorem.
Dimensions of cryptographic , Classical cryptographic Techniques, Fiestal Cipher structure, Simplifies DES ,DES , Double and Triple DES , Block Cipher design Principles , AES Modes of operations.
Principles of Public key cryptography, RSA Algorithm, Key Management, Diffie-Hellman Key Exchange ,Elgamal Algorithm ,Elliptic Curve cryptography
Authentication requirement, Functions , Message Authentication code, Hash Functions, Security of Hash functions and Macs,MD5 Message digest algorithm, Secure hash algorithm , Digital Signatures , Key Distribution Techniques, Kerberos
Threats in Networks, Network security controls -Architecture, Encryption , Content Integrity, Strong Authentication,Acess Controls ,Wireless Security ,Honeypots, Traffic flow security , Firewalls-Design and type of Firewalls,Personal Firewalls,IDS ,E-Mail Security -PGP, S/MIME.
Reference Book:
1. Network security Essentials:Application and Standards,by William Stallings,Prentice Hall 2.Cryptography:Theory and Practice by Douglas R.Stinson,CRCpress
Text Book:
1.cryptography and Network security Principles And Practice ,4th Edition, William Stallings, Pearson Education 2.Modern cryptography :Theory and Practice by Wenbo Mao, Prentice Hall PTR