View all subjects

## Cryptography and Network Security

Students studying Information Technology will find this subject very useful. Hundreds of important topics on Cryptography and Network Security are organized neatly into lessons below.

### As per Choice Based Grading System

Module 1: Introduction and Number Theory

1.1 Introduction to Cryptography

• Security Mechanisms
• Security Services
• Security Attacks
• Security Goals

1.2 Symmetric Cipher Model

1.3 Various Encryption Techniques

• Substitution: (i) Monoalphabetic - Caeser Cipher ...

### As per Choice Based Grading System

Module 1: Introduction and Number Theory

1.1 Introduction to Cryptography

• Security Mechanisms
• Security Services
• Security Attacks
• Security Goals

1.2 Symmetric Cipher Model

1.3 Various Encryption Techniques

• Substitution: (i) Monoalphabetic - Caeser Cipher   (ii) Polyalphabetic - Playfair Cipher, Vignere Cipher, Hill Cipher

• Transposition: (i) Keyless   (ii) Keyed

1.4 Stegnography

Module 2: Block Cipher and Public Key Cryptography

PART A:

2.1 Data Encryption Standard

2.2 Block Cipher Modes of Operation

• Electronics Code Book (ECB)
• Cipher block-chaining mode (CBC)
• Cipher Feedback Mode (CFB)
• Output Feedback Mode (OFB)

2.3 Advanced Encryption Standard

2.4 Blowfish Algorithm

2.5 RC-5 Algorithm

PART B:

2.6 Public Key Cryptography (Asymmetric Key Cryptography)

2.7 RSA Algorithm

2.8 Knapsack Algorithm

2.9 El-Gamal Algorithm

PART C:

2.10 Key Management - Diffie Hellman Key

Module 3: Cryptographic Hashes, Message Digests and Digital Certificate

3.1 Authentication Requirement

3.2 Authentication Functions

3.3 Types of Authentication

3.4 Message Authentication Code (MAC)

• MD5 Algorithm

• SHA Algorithm

• HMAC Algorithm

3.5 Digital Certificate: X509, PKI

Module 4: Digital Signature Scheme and Authentication Protocols

4.1 Digital Signature Process

4.2 Digital Signature Scheme

• RSA
• El Gamal
• Schnorr
• DSS

4.3 Needham Schroedoer Authentication Protocol

Module 5: Network Security

5.1 Network Security Basics

5.2 TCP/IP Vulnerabilities (Layer-wise)

• Application layer: HTTP, Session Hijacking, Replay attack, Cookie poisoning, Cross-site scripting, DHCP

• Transport layer: TCP syn flood, Port Scanning

• Network layer: IP Spoofing, Packet sniffing

• Data link layer: ARP Spoofing, ARP cache poisioning

5.3 DOS

• Classic DOS attacks: Ping flood, ICNP flood, UDP flood, Distributed DOS

• Defenses against DOS attacks

5.4 Firewall

• Types
• Attacks on firewall
• Configurations
• Limitations

5.5 DMZ (Demilitarized zone)

5.6 IDS (Intrusion Detection Systems)

• Types
• Technologies: Network based, Host based

5.7 Honeypots

Module 6: Network Security Applications

6.1 Authentication Applications

• Kerberos

6.2 Internet Security Protocols

• SSL
• TLS
• IPSec: Att, ESP

6.3 Secure Email

• PGP
• S/MIME

### Question Papers

No question papers found