Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Hashes, Messages Digest and Digital…
Cryptography and System Security
Introduction and Number theory
Security Goals
Confidentiality
Integrity
Availability
Network security model
Services mechanism
Susitution techniques
Vigenere cipher
Playfair cipher
Hill cipher
Transposition techniques
Keyed transposition cipher
Keyless transposition cipher
Modular arithmetic and number theory
Euclid's algorithm
Euclid's theorom
Discrete logarithms
Symmetric cipher model
Symmetric and Asymmetric key crytography
Block cipher
Principle of block cipher
Modes of operation
DES, Double DES
AES(Advance encryption standard)
Stream cipher
RC5 algorithm
Public key cryptography
RSA algorithm
Knapsack algorithm
EIGamal algorithm
Key management techniques
Symmetric and Asymmetric algorithms
Diffie hellman key exchange algorithm
Hashes, Messages Digest and Digital Certificates
HMAC
CMAC
MD5
SH-1
MAC
Cryptographic hash functions
Cryptographic hash functions
Digital Certificates
X.509
PKI
Authentication protocol and digital signature scheme
Authentication protocol
One way and mutual authentication scheme
Kerberos authentication protocol
Needham Schoeeder authentication protocol
Digital signature scheme
RSA
EIGamal
Schnorr signature scheme
System security
Software vulnerabilities
Buffer overflow
Format string
Cross site scripting
SQL injection
Malware
Viruses
Worms
Trojans
Logic bombs
BOTS
Rootkits
Network security and applicaton
Network security basics
TCP/IP vulnerabilities(LayerWise)
Packet sniffing
ARP spoofing
port scanning
IP spoofing
TCP sync flood attack
DNS spoofing
Denial of Service
DOS attack
Source address sppofing
ICMP FLOOD
TCP flood
UDP flood
DDOS attack
Defence against DOS attacks
Internet Security Protocols
SSL
IPSEC
Firewallas
Honey pots
IDS and types