Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Network Security and Application (TCP/IP…
Cryptography and System Security
Introduction and Number Theory
Security Goals
Security Mechanism and Services
Encryption
Substitution Cipher
Transposition Cipher
Symmetric and Asymmetric key Cryptography
Public Key Cryptography
Key Management Techniques
Diffie Hellman Key Exchange Algorithm
Block Cipher Principles
Authentication Protocols
User and Entity Authentication
One way and Mutual authentication Schemes
Kerberos authentication Protocol
Hashes,Message Digests
Cryptography Hash Function
Properties of Secure Hash Function
SHA-1
MAC
CMAC
Network Security and Application
TCP/IP Vulnerabilities
Packet Sniffing
Spoofing
Port Scanning
DOS
Internet Security Protocols
DDOS
Digital Signature Schemes
RSA Algorithm
Schnorr Signature Scheme
EIGamal Signature Scheme
Digital Certificate
X.509
PKI
System Security
Software Vulnerabilities
Buffer Overflow
SQL Injection
Malware
Format Strings