Go to All Subject -

Computer Sotware and Inormation Technology Engineering CSE IT

Cryptography and Network Security - CS6701

Online Study Material, Lecturing Notes, Assignment, Reference, Wiki and important questions and answers

Cryptography and Network Security
-:- Cryptography and Network Security - Introduction
-:- The OSI Security Architecture
-:- Classical CryptoSystems
-:- Classical Encryption Techniques
-:- Linear Feedback Shift Register (LFSR)
-:- Introduction to Number Theory
-:- Finite Fields
-:- Simplified Data Encryption Standard (S-DES)
-:- Block Cipher Principles
-:- Multiple Encryption & DES
-:- Modes of Operation
-:- Stream Ciphers
-:- RC4
-:- Principles of Public Key Cryptography
-:- RSA Algorithm
-:- Diffie-Hellman Key Exchange
-:- Elliptic Curve Cryptography
-:- Hash Functions
-:- Simple Hash Functions
-:- Birthday Attacks
-:- Security of Hash Functions and Macs
-:- Secure Hash Algorithm
-:- Digital Signatures
-:- Direct Digital Signatures
-:- Digital Signature Algorithm(DSA)
-:- Authentication Applications
-:- Kerbero V4 Authentication Dialogue Message Exchange
-:- X.509 Certificates
-:- Authentication Procedures
-:- Electronic Mail Security
-:- Public-Key Management
-:- S/MIME
-:- S/MIME Functionality and Messages
-:- Intruders
-:- Intrusion Detection
-:- Password Management
-:- Firewalls: design principles, characteristics, Limitations, Types
-:- Firewall configurations
-:- Trusted systems
-:- Viruses And Related Threats
-:- Types of Network Viruses
-:- Network Virus Countermeasures
-:- Concepts and Definition of Computer Security
-:- The Challenges of Computer Security
-:- The OSI Security Architecture
-:- Security Attacks: Passive and Active Attacks
-:- Security Services
-:- Security Mechanisms
-:- A Model For Network Security
-:- Classical Encryption Techniques
-:- Symmetric Cipher Model
-:- Substitution Techniques
-:- Transposition Techniques
-:- Rotor Machines
-:- Steganography
-:- Block Ciphers and the Data Encryption Standard
-:- Block Cipher Principles
-:- The Data Encryption Standard
-:- A DES(Data Encryption Standard) Example
-:- The Strength of DES(Data Encryption Standard)
-:- Differential and Linear Cryptanalysis
-:- Block Cipher Design Principles
-:- Basic Concepts in Number Theory and Finite Fields
-:- Divisibility and the Division Algorithm
-:- The Euclidean Algorithm
-:- Modular Arithmetic
-:- Groups, Rings, and Fields
-:- Finite Fields Of The Form GF(p)
-:- Polynomial Arithmetic
-:- Finite Fields of the Form GF(2n)
-:- Advanced Encryption Standard(AES)
-:- Finite Field Arithmetic
-:- AES(Advanced Encryption Standard) Structure
-:- Advanced Encryption Standard(AES) Transformation Functions
-:- AES Key Expansion
-:- An Advanced Encryption Standard(AES) Example
-:- AES(Advanced Encryption Standard) Implementation
-:- Block Cipher Operation
-:- Multiple Encryption and Triple DES(Data Encryption Standard)
-:- Electronic Code Book
-:- Cipher Block Chaining(CBC) Mode
-:- Cipher Feedback Mode
-:- Output Feedback Mode
-:- Counter Mode
-:- XTS-AES Mode For Block-Oriented Storage Devices
-:- Pseudorandom Number Generation and Stream Ciphers
-:- Principles of Pseudorandom Number Generation
-:- Pseudorandom Number Generators
-:- Pseudorandom Number Generation Using a Block Cipher
-:- Stream Ciphers
-:- RC4
-:- True Random Number Generators
-:- Introduction to Number Theory
-:- Prime Numbers
-:- Fermat’s And Euler’s Theorems
-:- Testing for Primality
-:- The Chinese Remainder Theorem
-:- Discrete Logarithms
-:- Public-Key Cryptography and RSA
-:- Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
-:- The RSA Algorithm
-:- Description of the RSA Algorithm
-:- The Security of RSA
-:- Other Public-Key Cryptosystems
-:- Diffie-Hellman Key Exchange
-:- Elgamal Cryptographic System
-:- Elliptic Curve Arithmetic
-:- Elliptic Curve Cryptography
-:- Pseudorandom Number Generation Based on an Asymmetric Cipher
-:- Cryptographic Hash Functions
-:- Applications of Cryptographic Hash Functions
-:- Two Simple Hash Functions
-:- Requirements and Security
-:- Hash Functions Based on Cipher Block Chaining
-:- Secure Hash Algorithm (SHA)
-:- SHA-3
-:- Message Authentication Codes
-:- Message Authentication Requirements
-:- Message Authentication Functions
-:- Requirements For Message Authentication Codes
-:- Security of MACS
-:- MACS Based on Hash Functions: HMAC
-:- MACS Based on Block Ciphers: DAA And CMAC
-:- Authenticated Encryption: CCM and GCM
-:- Pseudorandom Number Generation Using Hash Functions and MACS
-:- Digital Signatures
-:- Digital Signatures: Properties, Attacks and Forgeries
-:- ELGAMAL Digital Signature Scheme
-:- Schnorr Digital Signature Scheme
-:- Digital Signature Standard
-:- Key Management and Distribution
-:- Symmetric Key Distribution Using Symmetric Encryption
-:- Symmetric Key Distribution Using Asymmetric Encryption
-:- Distribution of Public Keys
-:- X.509 Certificates
-:- Public-Key Infrastructure
-:- User Authentication
-:- Remote User-Authentication Principles
-:- Remote User-Authentication Using Symmetric Encryption
-:- Kerberos
-:- Remote User Authentication Using Asymmetric Encryption
-:- Federated Identity Management
-:- Transport-Level Security
-:- Web Security Considerations
-:- Secure Socket Layer and Transport Layer Security
-:- Transport Layer Security
-:- HTTPS
-:- Secure Shell (SSH)
-:- Wireless Network Security
-:- IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
-:- IEEE 802.11i Wireless LAN Security
-:- Wireless Application Protocol Overview
-:- Wireless Transport Layer Security
-:- WAP End-to-End Security
-:- Electronic Mail Security
-:- Pretty Good Privacy
-:- S/MIME
-:- DomainKeys Identified Mail
-:- IP Security(IPsec)
-:- IP Security Overview
-:- IP Security Policy
-:- Encapsulating Security Payload
-:- Combining Security Associations
-:- Internet Key Exchange
-:- Cryptographic Suites
-:- Intruders
-:- Intruders: Behavior Patterns and Techniques
-:- Intrusion Detection
-:- Password Management
-:- Malicious Software
-:- Types of Malicious Software
-:- Computer Viruses: Nature, Classification, Virus Kits
-:- Computer Virus Countermeasures
-:- Computer or Network Worms
-:- Distributed Denial of Service Attacks
-:- Firewalls
-:- The Need for Firewalls
-:- Firewall Characteristics and limitations
-:- Types of Firewalls
-:- Firewall Basing
-:- Firewall Location and Configurations
-:- Legal And Ethical Aspects
-:- Cybercrime and Computer Crime
-:- Types of Computer Crime
-:- Intellectual Property
-:- Network and Computer Privacy
-:- Ethical Issues - Network or Computer