Please enable JavaScript.
Coggle requires JavaScript to display documents.
CRYPTOGRAPHY AND CYBER SECURITY - Coggle Diagram
CRYPTOGRAPHY AND CYBER SECURITY
UNIT I – INTRODUCTION TO SECURITY
Computer Security Concepts
OSI Security Architecture:
Security Attacks: Passive (eavesdropping), Active (modification, DOS)
Security Services & Mechanisms
Model for Network Security: Sender, receiver, transmission medium, attacks
Classical Encryption Techniques
Substitution Techniques: Caesar Cipher, Monoalphabetic, Playfair, Vigenère
Transposition Techniques: Rail Fence, Matrix method
Steganography
Perfect Security (Shannon)
Information Theory Concepts
Product Cryptosystems: Combining multiple ciphers
Cryptanalysis: Techniques for breaking ciphers
UNIT II – SYMMETRIC CIPHERS
Mathematical Foundations
Number Theory & Algebraic Structures: Integers, primes, mod operations
Modular Arithmetic:
amodn, inverses, residue systems
Euclid’s Algorithm: GCD computation
Congruences & Matrices
Groups, Rings, Fields: Especially Finite Fields (GF)
𝑛
Symmetric Encryption Techniques
SDES (Simplified DES)
DES: Structure, Feistel network, security
DES Cryptanalysis: Differential & linear
Block Cipher Design: Confusion, diffusion, key schedule
Block Cipher Modes: ECB, CBC, CFB, OFB, CTR
AES Evaluation Criteria
Pseudorandom Number Generators (PRNGs)
Stream Cipher: RC4
Key Distribution Mechanisms
UNIT III – ASYMMETRIC CRYPTOGRAPHY
Mathematical Foundations:
Prime Numbers, Primality Testing
Factorization Methods
Euler’s Totient Function
ϕ(n), Fermat’s & Euler’s Theorem
Chinese Remainder Theorem
Modular Exponentiation, Logarithms
Asymmetric Key Ciphers
RSA: Algorithm, security
Key Distribution and Management
Diffie-Hellman Key Exchange
Elliptic Curve Cryptography (ECC): Arithmetic, cryptosystems
UNIT IV – INTEGRITY AND AUTHENTICATION ALGORITHMS
Authentication Concepts:
Authentication Requirements & Functions
Message Authentication Codes (MAC): HMAC, CMAC
Hash Functions & Security: SHA family
Digital Signatures: DSS, Schnorr, ElGamal
Authentication Protocols & Applications: Kerberos
Entity Authentication:
Biometrics, Passwords
Challenge-Response Protocols
Public Key Infrastructure (PKI): X.509 Certificates
UNIT V – CYBER CRIMES AND CYBER SECURITY
Cybersecurity Fundamentals:
Cyber Crime Classifications: Hacking, identity theft, financial fraud
Cyber Crime Tools & Techniques:
Password cracking
Keyloggers
Spyware
SQL Injection
Security Domains
Network Access Control
Cloud Security
Web Security
Wireless Security