Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Key Cryptography and Management (Block…
Cryptography and System Security
Introduction to the Subject
Important terms and concepts
Security Goals
Services
Mechanisms and attacks
The OSI security architecture
Network security model
Steganography
Encryption Techniques
Substitution Techniques
Mono-alphabetic
Poly-alphabetic
Shift cipher
Vernam
Playfair cipher
Hill cipher
Transposition Techniques
Keyed transposition ciphers
Keyless transposition ciphers
Modular Arithmetic and Number Theory
Euclid‘s algorithm
Fermat‘s and Euler‘s theorem
The Chinese remainder theorem
Discrete logarithms
Key Cryptography and Management
Block ciphers
DES
Double DES
Triple DES
AES
Stream Cipher
RC5 algorithm
Public Key Cryptography
RSA algorithm
The knapsack algorithm
ElGamal Algorithm
Key Management
Symmetric key algorithms
Asymmetric key algorithms
Trusted Third Party
Diffie Hellman Key exchange algorithm
Hashes, Message Digests and Digital certificates
Hash Functions
SHA-1
MAC
MD5
HMAC
CMAC
Digital Certificate
X.509
PKI
Authentication Protocols & Digital signature schemes
Authentication
User
Entity
Authentication schemes
One-way
Mutual
Authentication Protocols
Needham Schroeder
Kerberos
Digital signature schemes
RSA
EIGamal
Schnorr
Network Security
Basic Concepts
TCP/IP Vulnerabilities
Packet sniffing
ARP spoofing
Port Scanning
IP spoofing
TCP SYN flood
DNS spoofing
Attacks
Denial of Service(DOS)
Source address spoofing
ICMP flood
Distributed DOS
SYN flood
UDP flood
Internet Security
SSL
IPSEC
PGP
Firewalls
IDS and types
Honey Pots
System Security
Software Vulnerabilites
Buffer Overflow
Format string
cross-site scripting
SQL injection
Malwares
Viruses
Worms
Trojans
Logic Bomb
Bots
Rootkits