Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (5.Network Security and Applications (5.1…
Cryptography and System Security
1.Introduction &
Number Theory
1.1 Security Goals, Services, Mechanisms and attacks, The OSI security architecture, Network security model, Classical Encryption techniques.
1.2 Modular Arithmetic and Number Theory:- Euclid‘s algorithm-–Prime numbers-
4.Authentication Protocols
& Digital signature schemes
4.1User Authentication and Entity Authentication, One-way and mutual authentication schemes, Needham Schroeder.
4.2 Digital Signature Schemes – RSA, EIGamal and Schnorr signature schemes.
Hashes, Message
Digests and
Digital Certificates
3.1 Cryptographic hash functions, Properties of secure hash function, MD5, SHA-1, MAC, HMAC, CMAC.
3.2 Digital Certificate: X.509, PKI
5.Network Security and Applications
5.1 Network security basics: TCP/IP vulnerabilities Packet Sniffing, ARP spoofing, port scanning, IP spoofing.
5.2 Denial of Service: Classic DOS attacks, Source Address spoofing, ICMP flood, SYN flood, UDP flood, Distributed Denial of Service.
5.3 Internet Security Protocols: SSL, IPSEC, Secure Email: PGP, Firewalls, IDS and types, Honey pots
6.System Security
6.1 Software Vulnerabilities: Buffer Overflow, Format string, cross-site scripting, SQL injection, Malware: Viruses, Worms, Trojans, Logic Bomb, Bots, Rootkits.
2.Symmetric and Asymmetric key Cryptography and key Management
2.1 Block cipher principles, block cipher modes of operation, DES, Double DES, Triple DES, Advanced Encryption Standard (AES).
2.3 Key management techniques: using symmetric and asymmetric algorithms and trusted third party.
2.2 Public key cryptography: Principles of public key cryptosystems-The RSA algorithm.