Cryptography and System Secutiry

Introduction to Number Theory

System Security.. Control of Access to a computer system's resources,specially its data and operating system files.

System Services,Mechanism and Attacks

OSI Security Architecture

Network Security model

Classical Encryption Techniques

Symmetric Cipher Model

Mono and Poly Alphabetic Substitution techniques.
In substitution cipher technique, character's identity is changed while its position remains unchanged

Steganography.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination

Transposition Substitution Techniques.
Transposition cipher technique, the position of the character is changed but character's identity is not changed.

keyed Transposition Cipher

Keyless Transposition Cipher

Hill Cipher

Vignere Cipher

Playfair Cipher

Dara Encryption

Network Security

Firewall

Symmetric and Asymmetric Key Cryptography and Key Management

Block Cipher Principles.
A block cipher is one in which a block of plaintext is treated as a whole and used to produce a cipher text block of equal length.

Block Cipher modes of Operation

DES.
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure.

Double DES.
Double DES is a encryption technique which uses two instance of DES on same plain text.

Triple DES.
Triple Data Encryption Standard (DES) is a type of computerized cryptography where block cipher algorithms are applied three times to each data block.

Advanced Encryption Standard(AES).
AES is a symmetric, block cipher which means that blocks of text of a certain size (128 bits) are encrypted.

Stream Ciphers

RC5 Algorithm.
RC5 is a block cipher and addresses two word blocks at a time.

Electronic Code Book (ECB) Mode

Cipher Block Chaining (CBC) Mode

Cipher Feedback (CFB) Mode

Output Feedback (OFB) Mode

Counter (CTR) Mode

Hashes,Message Digests and Digital Certificates

Cyptographic Hash Functions

Properties of Hash Functions

MD5

SHA-1

MAC

HMAC

CMAC

Digital Certificates.
A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it

PKI

X.509

Authentication Protocols & Digital Signature

Digital Signature Scheme - RSA, EIGamal and Schnorr signature signature

User authentication and entity Authentication- one way and mutual authentication scheme, Needham schroeder

Network Security and Applications

DOS, classic DOS Attacks, Source address spoofing, ICMP flood, SYN flood, UDP flood, DDOS, Defenses against DOS attack

Network Security Basics - TCP/IP vulnerabilities,Packet spoofing, ARP spoofing, ports scanning, IP spoofing, TCP Syn flooding, DNS spoofing

Internet security protocols, SSL,IPSEC, Secure Email, Firewalls, IDS and types, Honey pots

System Security: Buffer Overflow, Format string, cross site scripting, SQL injection, malware : viruses, Worms, Trojans, Login Bombs, Bots, Rootkits