As per Choice Based Grading System
Module 1: Introduction and Number Theory
1.1 Introduction to Cryptography
- Security Mechanisms
- Security Services
- Security Attacks
- Security Goals
1.2 Symmetric Cipher Model
1.3 Various Encryption Techniques
Substitution: (i) Monoalphabetic - Caeser Cipher (ii) Polyalphabetic - Playfair Cipher, Vignere Cipher, Hill Cipher
Transposition: (i) Keyless (ii) Keyed
1.4 Stegnography
Module 2: Block Cipher and Public Key Cryptography
PART A:
2.1 Data Encryption Standard
2.2 Block Cipher Modes of Operation
- Electronics Code Book (ECB)
- Cipher block-chaining mode (CBC)
- Cipher Feedback Mode (CFB)
- Output Feedback Mode (OFB)
2.3 Advanced Encryption Standard
2.4 Blowfish Algorithm
2.5 RC-5 Algorithm
PART B:
2.6 Public Key Cryptography (Asymmetric Key Cryptography)
2.7 RSA Algorithm
2.8 Knapsack Algorithm
2.9 El-Gamal Algorithm
PART C:
2.10 Key Management - Diffie Hellman Key
Module 3: Cryptographic Hashes, Message Digests and Digital Certificate
3.1 Authentication Requirement
3.2 Authentication Functions
3.3 Types of Authentication
3.4 Message Authentication Code (MAC)
MD5 Algorithm
SHA Algorithm
HMAC Algorithm
3.5 Digital Certificate: X509, PKI
Module 4: Digital Signature Scheme and Authentication Protocols
4.1 Digital Signature Process
4.2 Digital Signature Scheme
4.3 Needham Schroedoer Authentication Protocol
Module 5: Network Security
5.1 Network Security Basics
5.2 TCP/IP Vulnerabilities (Layer-wise)
Application layer: HTTP, Session Hijacking, Replay attack, Cookie poisoning, Cross-site scripting, DHCP
Transport layer: TCP syn flood, Port Scanning
Network layer: IP Spoofing, Packet sniffing
Data link layer: ARP Spoofing, ARP cache poisioning
5.3 DOS
Classic DOS attacks: Ping flood, ICNP flood, UDP flood, Distributed DOS
Defenses against DOS attacks
5.4 Firewall
- Types
- Attacks on firewall
- Configurations
- Limitations
5.5 DMZ (Demilitarized zone)
5.6 IDS (Intrusion Detection Systems)
- Types
- Technologies: Network based, Host based
5.7 Honeypots
Module 6: Network Security Applications
6.1 Authentication Applications
6.2 Internet Security Protocols
6.3 Secure Email