UNIT 1:
Computer Security Concepts
The OSI Security Architecture
3 Security Attacks - A Model for Network Security
Substitution Techniques - Transposition Techniques
Block Cipher Principles - Data Encryption Standard (DES)- Example
Multiple Encryption and Triple DES
UNIT 2:
Principles of Pseudorandom Number Generation
Pseudorandom Number Generators -Divisibility and the Division Algorithm
The Euclidean Algorithm - Modular Arithmetic
Diffie Hellman Key Exchange
The Chinese Remainder Theorem - Principles of Public Key Cryptosystem
UNIT 3:
Cryptographic Hash Functions
Two Simple Hash Functions Requirements and Security
Two Simple Hash Functions Requirements and Security
Hash Functions Based on Cipher Block Chaining
Secure Hash Algorithm (SHA) - Message Authentication Codes
Message Authentication Requirements - Message Authentication Code
Security of MACs - MACs Based on Hash Functions (HMAC)
Digital Signatures - ElGamal Digital Signature Scheme
Digital Signatures - ElGamal Digital Signature Scheme
Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)
Schnorr Digital Signature Scheme - Digital Signature Standard (DSS)
UNIT 4:
Symmetric Key Distribution Using Asymmetric Encryption
Distribution of Public Keys - X.509 Certificates
Key Management And Distribution
Email Security Pretty Good Privacy (PGP) - S/MIME
Email Security Pretty Good Privacy (PGP) - S/MIME
UNIT 5:
Web Security Issues - Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
IP Security Overview - Policy
Encapsulating Security Payload
Intruders-Intrusion Detection - Malicious Software
Viruses – Worms – Kerberos
Viruses – Worms – Kerberos
Viruses – Worms – Kerberos
Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations