View all subjects

Cryptography and Network Security

Students studying Information Technology will find this subject very useful. Hundreds of important topics on Cryptography and Network Security are organized neatly into lessons below.

Add to your library

Overview

Topics Covered


As per Choice Based Grading System


Module 1: Introduction and Number Theory

1.1 Introduction to Cryptography

  • Security Mechanisms
  • Security Services
  • Security Attacks
  • Security Goals

1.2 Symmetric Cipher Model

1.3 Various Encryption Techniques

  • Substitution: (i) Monoalphabetic - Caeser Cipher ...

Read more

As per Choice Based Grading System


Module 1: Introduction and Number Theory

1.1 Introduction to Cryptography

  • Security Mechanisms
  • Security Services
  • Security Attacks
  • Security Goals

1.2 Symmetric Cipher Model

1.3 Various Encryption Techniques

  • Substitution: (i) Monoalphabetic - Caeser Cipher   (ii) Polyalphabetic - Playfair Cipher, Vignere Cipher, Hill Cipher

  • Transposition: (i) Keyless   (ii) Keyed

1.4 Stegnography

Module 2: Block Cipher and Public Key Cryptography

PART A:

2.1 Data Encryption Standard

2.2 Block Cipher Modes of Operation

  • Electronics Code Book (ECB)
  • Cipher block-chaining mode (CBC)
  • Cipher Feedback Mode (CFB)
  • Output Feedback Mode (OFB)

2.3 Advanced Encryption Standard

2.4 Blowfish Algorithm

2.5 RC-5 Algorithm

PART B:

2.6 Public Key Cryptography (Asymmetric Key Cryptography)

2.7 RSA Algorithm

2.8 Knapsack Algorithm

2.9 El-Gamal Algorithm

PART C:

2.10 Key Management - Diffie Hellman Key

Module 3: Cryptographic Hashes, Message Digests and Digital Certificate

3.1 Authentication Requirement

3.2 Authentication Functions

3.3 Types of Authentication

3.4 Message Authentication Code (MAC)

  • MD5 Algorithm

  • SHA Algorithm

  • HMAC Algorithm

3.5 Digital Certificate: X509, PKI

Module 4: Digital Signature Scheme and Authentication Protocols

4.1 Digital Signature Process

4.2 Digital Signature Scheme

  • RSA
  • El Gamal
  • Schnorr
  • DSS

4.3 Needham Schroedoer Authentication Protocol

Module 5: Network Security

5.1 Network Security Basics

5.2 TCP/IP Vulnerabilities (Layer-wise)

  • Application layer: HTTP, Session Hijacking, Replay attack, Cookie poisoning, Cross-site scripting, DHCP

  • Transport layer: TCP syn flood, Port Scanning

  • Network layer: IP Spoofing, Packet sniffing

  • Data link layer: ARP Spoofing, ARP cache poisioning

5.3 DOS

  • Classic DOS attacks: Ping flood, ICNP flood, UDP flood, Distributed DOS

  • Defenses against DOS attacks

5.4 Firewall

  • Types
  • Attacks on firewall
  • Configurations
  • Limitations

5.5 DMZ (Demilitarized zone)

5.6 IDS (Intrusion Detection Systems)

  • Types
  • Technologies: Network based, Host based

5.7 Honeypots

Module 6: Network Security Applications

6.1 Authentication Applications

  • Kerberos

6.2 Internet Security Protocols

  • SSL
  • TLS
  • IPSec: Att, ESP

6.3 Secure Email

  • PGP
  • S/MIME
Read less

Question Papers

No question papers found