Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Symmetric and Asymmetric key…
Cryptography and System Security
Introduction & Number Theory
1.1
Services
Mechanisms and attacks
The OSI security
architecture
Security Goals
Network security model
Classical Encryption
techniques
Symmetric cipher model
Mono-alphabetic and poly-
alphabetic substitution techniques
playfair cipher
Vigenere cipher
Hill cipher
Transposition techniques
steganography
keyed and keyless transposition
ciphers
Modular Arithmetic and Number Theory
Euclid‘s algorithm-–Prime
numbers
Ermat‘s and Euler‘s theorem- Testing for primality
The
Chinese remainder theorem
Discrete logarithms
Hashes, Message Digests and Digital Certificates
3.1
Cryptographic hash functions
Properties of secure hash function
MD5, SHA-1, MAC, HMAC, CMAC
3.2
Digital Certificate: X.509, PKI
Symmetric and Asymmetric key Cryptography and key Management
2.2
Principles of public key cryptosystems
Public key cryptography
The
RSA algorithm
The knapsack algorithm
ElGamal Algorithm
2.3
Key management techniques
using symmetric and asymmetric
algorithms and trusted third party
Diffie Hellman Key exchange
algorithm
2.1
block cipher modes of operation
DES,
Double DES, Triple DES,
Block cipher principles
Advanced Encryption Standard (AES)
Stream Ciphers
RC5 algorithm
Authentication Protocols & Digital signature schemes
4.1
One-way and mutual
authentication schemes
User Authentication and Entity Authentication
Kerberos Authentication protocol
Needham Schroeder Authentication
protocol
4.2
RSA, EIGamal and Schnorr signature
schemes
Digital Signature Schemes
Network Security and Applications
Denial of Service
Source Address spoofing
ICMP flood
Classic DOS attacks
SYN flood, UDP flood
Software Vulnerabilities
Network security basics
TCP/IP vulnerabilities (Layer wise)
Packet
Sniffing
ARP spoofing, port scanning
IP spoofing, TCP syn flood
DNS Spoofing
System Security
Software Vulnerabilities
Format string
cross-site
scripting
Buffer Overflow
Malware
Viruses, Worms, Trojans, Logic
Bomb, Bots, Rootkits