UNIT 1:
transposition techniques,
Classical encryption techniques: substitution techniques
Security trends - Legal, Ethical and Professional Aspects of Security
Need for Security at Multiple levels, Security Policies - Model of network security
Security attacks, services and mechanisms
OSI security architecture
Classical encryption techniques: substitution techniques
transposition techniques,
Foundations of modern cryptography: perfect security – information theory
UNIT 2:
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic
Euclid‟s algorithm- Congruence and matrices
Euclid‟s algorithm- Congruence and matrices
Groups, Rings, Fields- Finite fields
Block cipher Principles of DES – Strength of DES
Differential and linear cryptanalysis
Block cipher design principles – Block cipher mode of operation
RC4 – Key distribution.
UNIT 3:
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
Factorization – Euler’s totient function
Fermat’s and Euler’s Theorem - Chinese Remainder Theorem
Exponentiation and logarithm
Diffie Hellman key exchange
Factorization – Euler’s totient function
UNIT 4:
Authentication requirement – Authentication function
MAC – Hash function – Security of hash function and MAC
Digital signature and authentication protocols – DSS
Challenge Response protocols
Authentication applications
UNIT 5:
Security: Architecture, Authentication header
Encapsulating security payloads, combining security associations,
key management. Web Security: Secure socket layer
secure electronic transaction (SET)
System Security: Intruders, Viruses and related threads
firewall design principals