Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Secutiry (Introduction to Number Theory (System…
Cryptography and System Secutiry
Introduction to Number Theory
System Security.. Control of Access to a computer system's resources,specially its data and operating system files.
Dara Encryption
Network Security
Firewall
System Services,Mechanism and Attacks
OSI Security Architecture
Network Security model
Classical Encryption Techniques
Symmetric Cipher Model
Mono and Poly Alphabetic Substitution techniques.
In substitution cipher technique, character's identity is changed while its position remains unchanged
Hill Cipher
Vignere Cipher
Playfair Cipher
Steganography.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination
Transposition Substitution Techniques.
Transposition cipher technique, the position of the character is changed but character's identity is not changed.
keyed Transposition Cipher
Keyless Transposition Cipher
Symmetric and Asymmetric Key Cryptography and Key Management
Block Cipher Principles.
A block cipher is one in which a block of plaintext is treated as a whole and used to produce a cipher text block of equal length.
Block Cipher modes of Operation
Electronic Code Book (ECB) Mode
Cipher Block Chaining (CBC) Mode
Cipher Feedback (CFB) Mode
Output Feedback (OFB) Mode
Counter (CTR) Mode
DES.
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure.
Double DES.
Double DES is a encryption technique which uses two instance of DES on same plain text.
Triple DES.
Triple Data Encryption Standard (DES) is a type of computerized cryptography where block cipher algorithms are applied three times to each data block.
Advanced Encryption Standard(AES).
AES is a symmetric, block cipher which means that blocks of text of a certain size (128 bits) are encrypted.
Stream Ciphers
RC5 Algorithm.
RC5 is a block cipher and addresses two word blocks at a time.
Hashes,Message Digests and Digital Certificates
Cyptographic Hash Functions
Properties of Hash Functions
MD5
SHA-1
MAC
HMAC
CMAC
Digital Certificates.
A digital certificate, also known as a public key certificate, is used to cryptographically link ownership of a public key with the entity that owns it
PKI
X.509
Authentication Protocols & Digital Signature
Digital Signature Scheme - RSA, EIGamal and Schnorr signature signature
User authentication and entity Authentication- one way and mutual authentication scheme, Needham schroeder
Network Security and Applications
DOS, classic DOS Attacks, Source address spoofing, ICMP flood, SYN flood, UDP flood, DDOS, Defenses against DOS attack
Network Security Basics - TCP/IP vulnerabilities,Packet spoofing, ARP spoofing, ports scanning, IP spoofing, TCP Syn flooding, DNS spoofing
Internet security protocols, SSL,IPSEC, Secure Email, Firewalls, IDS and types, Honey pots
System Security: Buffer Overflow, Format string, cross site scripting, SQL injection, malware : viruses, Worms, Trojans, Login Bombs, Bots, Rootkits