View all subjects

Cryptography and System Security

Students studying Computer Science will find this subject very useful. Hundreds of important topics on Cryptography and System Security are organized neatly into lessons below.

Add to your library

Overview

Topics Covered

1. Introduction

  • Security Attacks, Security Goals, Computer criminals, Methods of defense, Security Services, Security Mechanisms

2. Basics of Cryptography

  • Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers.

3. Secret Key Cryptography

  • Data ...
Read more

1. Introduction

  • Security Attacks, Security Goals, Computer criminals, Methods of defense, Security Services, Security Mechanisms

2. Basics of Cryptography

  • Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers.

3. Secret Key Cryptography

  • Data Encryption Standard(DES), Strength of DES, Block Cipher Design Principles and Modes of Operations, Triple DES, International Data Encryption algorithm, Blowfish, CAST-128

4. Public Key Cryptography

  • Principles of Public Key Cryptosystems, RSA Algorithm, Diffie- Hellman Key Exchange

5. Cryptographic Hash Functions

  • Applications of Cryptographic Hash Functions, Secure Hash Algorithm, Message Authentication Codes – Message Authentication Requirements and Functions, HMAC, Digital signatures, Digital Signature Schemes, Authentication Protocols, Digital Signature Standards.

6. Authentication Applications

  • Kerberos, Key Management and Distribution, X.509 Directory Authentication service, Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy, S/MIME.

7. Program Security

  • Secure programs, Nonmalicious Program Errors, Malicious Software – Types, Viruses, Virus Countermeasures, Worms, Targeted Malicious Code, Controls against Program Threats.
  • Operating System Security Memory and Address protection, File Protection Mechanism, User Authentication.
  • Database Security Security Requirement, Reliability and Integrity, Sensitive data, Inference, Multilevel Databases
  • IDS and Firewalls Intruders, Intrusion Detection, Password Management, Firewalls- Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted systems.

8. IP Security

  • Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet Key Exchange, Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Electronic Payment.

  • Non-cryptographic protocol Vulnerabilities DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities- Phishing, Buffer Overflow, Format String Attacks, SQL Injection.

Read less

Question Papers

No question papers found