UNIT 1:
Foundations of modern cryptography: perfect security
information theory ,product cryptosystem , cryptanalysis.
transposition techniques, steganography
Legal, Ethical and Professional Aspects of Security
Need for Security at Multiple levels, Security Policies
Model of network security
Security attacks, services and mechanisms – OSI security architecture
UNIT 2:
Evaluation criteria for AES ,Advanced Encryption Standard
Algebraic structures , Modular arithmetic,Euclid‟s algorithm
Block cipher Principles of DES
Strength of DES,Differential and linear cryptanalysis
Block cipher design principles, Block cipher mode of operation
UNIT 3:
Primes,Primality Testing, Factorization
Euler’s totient function, Fermat’s and Euler’s Theorem
Chinese Remainder Theorem
Diffie Hellman key exchange
Exponentiation and logarithm
UNIT 4:
MAC ,Hash function ,Security of hash function and MAC
Digital signature and authentication protocols
Authentication applications
UNIT 5:
IP Security: Architecture, Authentication header
Secure electronic transaction (SET)
Web Security: Secure socket layer
Encapsulating security payloads, combining security associations, key management.
System Security: Intruders, Viruses and related threads