Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cryptography and System Security (Introduction & Number Theory…
Cryptography and System Security
Introduction & Number Theory
Security Goals
Security Services & Mechanism
The OSI security architecture
Network security model
Steganography
Substitution cipher
playfair
hill
polyalphabetic
shift
vernam
Transposition
keyed
keyless
Euclis's algorithm
Symmetric and Asymmetric key Cryptography and key Management
Block cipher
DES
AES
double DES
triple DES
Stream cipher
RC5 algorithm
Public key cryptography
RSA algorithm
Knapsack algoriyhm
ElGamal algorithm
Diffie hellman algorithm
Key management
symmetric
asymmetric
Hashes, Message Digests and Digital Certificates
Hash function
MD5
SHA-1
MAC
HMAC
CMAC
Digital certificate
X.509
PKI
Authentication Protocols & Digital signature schemes
User Authentication and Entity Authentication
Needham Schroeder Authentication protocol
Kerberos Authentication protocol
One-way and mutual authentication schemes
Digital Signature Schemes
RSA
ElGamal
schnorr
Network Security and Application
TCP/IP vulnerabilities
ARP spoofing
DNS Spoofing
Denial of Service
Classic DOS attacks
UDP flood
SYN flood
ICMP flood
Internet Security Protocols
IPSEC
Secure Email
PGP
SSL
Firewall
IDS
Honeypots
System Security
Software Vulnerabilities
Buffer Overflow
Format string
cross-site scripting
SQL injection
Malware
Viruses
Worms
Trojans
Logic Bombs
Bot
Rootkit