Please enable JavaScript.
Coggle requires JavaScript to display documents.
CRYPTOGRAPHY AND SYSTEM SECURITY (Introduction and Number System (Security…
CRYPTOGRAPHY AND SYSTEM SECURITY
Hashes, Message Digests and Digital Certificates
Cryptographic Hash functions
MD5
SHA-1
MAC
HMAC
CMAC
Digital Certificates
X.509
PKI
Symmetric and Asymmetric Key Cryptography and key management
Block Cipher
Data Encryption Standard(DES)
Advanced Encryption Standard(AES)
Stream Ciphers: RC5 Algorithm
Public key cryptography
RSA Algorithm
Knapsack Algorithm
ElGamal Algorithm
Key management Systems
Diffie Hellman Key Exchange Algorithm
Introduction and Number System
Security
Goals
Services
Mechanisms
Attacks
OSI Architecture and Nework Security Model
Encryption Techniques
Cipher model and types of ciphers
Substitution and Transposition techniques
Steganography
Modular Arithmetic and Number Theory
Authentication Protocols and Digital Signature schemes
Authentication
User
Entity
Protocols
NSA Protocol
Kerberos Protocol
Signature Schemes
RSA
, ElGamal
Schnorr
System Security
Software Vulnerabilities
Buffer Overflow
SQL Injection
Format string
Cross-site scripting
Malware
Viruses
Worms
Trojans
Logic Bombs
Bots
Rootkits
Network Security and Applications
Network Security Basics
TCP/IP Vulnerabilities
Packet Snifffing
ARP Spoofing
TCP Sync flood
IP Spoofing
DNS Spoofing
Everything Denial of Service(DOS)
Internet Security Protocols
SSL
IPSEC
Secure Email: PGP
Firewalls
Honey Pots
IDS and Types