Please enable JavaScript.
Coggle requires JavaScript to display documents.
CRYPTOGRAPHY AND SYSTEM SECURITY (Introduction & Number Theory (Mono…
CRYPTOGRAPHY AND SYSTEM SECURITY
Introduction & Number Theory
Security Goals
Services
Mechanisms and attacks
OSI security architecture
Network Security Model
Encryption techniques
Symmetric cipher model
Mono and poly alphabetic substitution
Vigenere cipher
Playfair cipher
Hill cipher
Transposition techniques
Keyless transposition ciphers
keyed transposition ciphers
Euclidean algorithm
Symmetric and Asymmetric key Cryptography and key management
Block cipher principles
Block ciphers modes of operation
DES, Double DES, Triple DES
Advanced Encryption Standard(AES)
Stream CIphers: RC5 algorithm
The RSA algorithm
Diffie Hellman key exchange algorithm
Hashes, Message Digests and Digital Certificates
Cryptographic hash functions
Properties of secure hash functions
MD5, SHA-1, MAC, HMAC, CMAC
Digital Certificate: X.509, PKI
Authentication Protocols and Digital Signature Schemes
User Authentication and Entity Authentication
One way and mutual authentication schemes
Needham Schroeder Authentication Protocol
Kerberos Authentication Protocol
Digital Signature Schemes - RSA
Network Security and Apllications
Denial of Services
Network Security Basics
TCP/IP vulnerabilities
Packet sniffing
ARP spoofing
Port scanning
IP spoofing
TCP syn flood
DNS Spoofing
Internet Security Protocols
System Security
SQL injection
Software Vulnerabilities