Page: Syllabus of Cryptography and Network Security
0

As per Choice Based Grading System


Module 1: Introduction and Number Theory

1.1 Introduction to Cryptography

  • Security Mechanisms
  • Security Services
  • Security Attacks
  • Security Goals

1.2 Symmetric Cipher Model

1.3 Various Encryption Techniques

  • Substitution: (i) Monoalphabetic - Caeser Cipher   (ii) Polyalphabetic - Playfair Cipher, Vignere Cipher, Hill Cipher

  • Transposition: (i) Keyless   (ii) Keyed

1.4 Stegnography

Module 2: Block Cipher and Public Key Cryptography

PART A:

2.1 Data Encryption Standard

2.2 Block Cipher Modes of Operation

  • Electronics Code Book (ECB)
  • Cipher block-chaining mode (CBC)
  • Cipher Feedback Mode (CFB)
  • Output Feedback Mode (OFB)

2.3 Advanced Encryption Standard

2.4 Blowfish Algorithm

2.5 RC-5 Algorithm

PART B:

2.6 Public Key Cryptography (Asymmetric Key Cryptography)

2.7 RSA Algorithm

2.8 Knapsack Algorithm

2.9 El-Gamal Algorithm

PART C:

2.10 Key Management - Diffie Hellman Key

Module 3: Cryptographic Hashes, Message Digests and Digital Certificate

3.1 Authentication Requirement

3.2 Authentication Functions

3.3 Types of Authentication

3.4 Message Authentication Code (MAC)

  • MD5 Algorithm

  • SHA Algorithm

  • HMAC Algorithm

3.5 Digital Certificate: X509, PKI

Module 4: Digital Signature Scheme and Authentication Protocols

4.1 Digital Signature Process

4.2 Digital Signature Scheme

  • RSA
  • El Gamal
  • Schnorr
  • DSS

4.3 Needham Schroedoer Authentication Protocol

Module 5: Network Security

5.1 Network Security Basics

5.2 TCP/IP Vulnerabilities (Layer-wise)

  • Application layer: HTTP, Session Hijacking, Replay attack, Cookie poisoning, Cross-site scripting, DHCP

  • Transport layer: TCP syn flood, Port Scanning

  • Network layer: IP Spoofing, Packet sniffing

  • Data link layer: ARP Spoofing, ARP cache poisioning

5.3 DOS

  • Classic DOS attacks: Ping flood, ICNP flood, UDP flood, Distributed DOS

  • Defenses against DOS attacks

5.4 Firewall

  • Types
  • Attacks on firewall
  • Configurations
  • Limitations

5.5 DMZ (Demilitarized zone)

5.6 IDS (Intrusion Detection Systems)

  • Types
  • Technologies: Network based, Host based

5.7 Honeypots

Module 6: Network Security Applications

6.1 Authentication Applications

  • Kerberos

6.2 Internet Security Protocols

  • SSL
  • TLS
  • IPSec: Att, ESP

6.3 Secure Email

  • PGP
  • S/MIME
page • 169 views
ADD COMMENTlink
modified 6 weeks ago  • written 9 months ago by gravatar for Yashbeer Yashbeer160
Please log in to add an answer.