UNIT 1:
Security trends - Legal, Ethical and Professional Aspects of Security
Need for Security at Multiple levels, Security Policies -Model of network security
Security attacks, services and mechanisms -OSI security architecture
Classical encryption techniques: substitution techniques-01
Classical encryption techniques: substitution techniques-02
Transposition techniques, steganography
Foundations of modern cryptography
perfect security – information theory - product cryptosystem
UNIT 2:
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
Euclid‟s algorithm- Congruence and matrices
Groups, Rings, Fields- Finite fields
SYMMETRIC KEY CIPHERS: SDES
Evaluation criteria for AES – Advanced Encryption Standard
Differential and linear cryptanalysis
Block cipher design principles – Block cipher mode of operation
UNIT 3:
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
Factorization – Euler’s totient function
Fermat’s and Euler’s Theorem
Chinese Remainder Theorem – Exponentiation and logarithm
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
Diffie Hellman key exchange