Go to All Subject -

Computer Sotware and Inormation Technology Engineering CSE IT

Cryptography and Network Security - CS6701

Cryptography and Network Security

Part 1


-:- Cryptography and Network Security - Introduction
-:- The OSI Security Architecture
-:- Classical CryptoSystems
-:- Classical Encryption Techniques
-:- Linear Feedback Shift Register (LFSR)
-:- Introduction to Number Theory
-:- Finite Fields

Part 2


-:- Simplified Data Encryption Standard (S-DES)
-:- Block Cipher Principles
-:- Multiple Encryption & DES
-:- Modes of Operation
-:- Stream Ciphers
-:- RC4
-:- Principles of Public Key Cryptography
-:- RSA Algorithm

Part 3


-:- Diffie-Hellman Key Exchange
-:- Elliptic Curve Cryptography
-:- Hash Functions
-:- Simple Hash Functions
-:- Birthday Attacks
-:- Security of Hash Functions and Macs
-:- Secure Hash Algorithm
-:- Digital Signatures
-:- Direct Digital Signatures
-:- Digital Signature Algorithm(DSA)

Part 4


-:- Authentication Applications
-:- Kerbero V4 Authentication Dialogue Message Exchange
-:- X.509 Certificates
-:- Authentication Procedures
-:- Electronic Mail Security
-:- Public-Key Management
-:- S/MIME
-:- S/MIME Functionality and Messages

Part 5


-:- Intruders
-:- Intrusion Detection
-:- Password Management
-:- Firewalls: design principles, characteristics, Limitations, Types
-:- Firewall configurations
-:- Trusted systems
-:- Viruses And Related Threats
-:- Types of Network Viruses
-:- Network Virus Countermeasures

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE by William Stallings

Chapter 1 Overview


-:- Concepts and Definition of Computer Security
-:- The Challenges of Computer Security
-:- The OSI Security Architecture
-:- Security Attacks: Passive and Active Attacks
-:- Security Services
-:- Security Mechanisms
-:- A Model For Network Security
-:- Classical Encryption Techniques

PART ONE SYMMETRIC CIPHERS

Chapter 2 Classical Encryption Techniques


-:- Symmetric Cipher Model
-:- Substitution Techniques
-:- Transposition Techniques
-:- Rotor Machines
-:- Steganography

Chapter 3 Block Ciphers and the Data Encryption Standard


-:- Block Ciphers and the Data Encryption Standard
-:- Block Cipher Principles
-:- The Data Encryption Standard
-:- A DES(Data Encryption Standard) Example
-:- The Strength of DES(Data Encryption Standard)
-:- Differential and Linear Cryptanalysis
-:- Block Cipher Design Principles

Chapter 4 Basic Concepts in Number Theory and Finite Fields


-:- Basic Concepts in Number Theory and Finite Fields
-:- Divisibility and the Division Algorithm
-:- The Euclidean Algorithm
-:- Modular Arithmetic
-:- Groups, Rings, and Fields
-:- Finite Fields Of The Form GF(p)
-:- Polynomial Arithmetic
-:- Finite Fields of the Form GF(2n)

Chapter 5 Advanced Encryption Standard


-:- Advanced Encryption Standard(AES)
-:- Finite Field Arithmetic
-:- AES(Advanced Encryption Standard) Structure
-:- Advanced Encryption Standard(AES) Transformation Functions
-:- AES Key Expansion
-:- An Advanced Encryption Standard(AES) Example
-:- AES(Advanced Encryption Standard) Implementation

Chapter 6 Block Cipher Operation


-:- Block Cipher Operation
-:- Multiple Encryption and Triple DES(Data Encryption Standard)
-:- Electronic Code Book
-:- Cipher Block Chaining(CBC) Mode
-:- Cipher Feedback Mode
-:- Output Feedback Mode
-:- Counter Mode
-:- XTS-AES Mode For Block-Oriented Storage Devices

Chapter 7 Pseudorandom Number Generation and Stream Ciphers


-:- Pseudorandom Number Generation and Stream Ciphers
-:- Principles of Pseudorandom Number Generation
-:- Pseudorandom Number Generators
-:- Pseudorandom Number Generation Using a Block Cipher
-:- Stream Ciphers
-:- RC4
-:- True Random Number Generators

PART TWO ASYMMETRIC CIPHERS

Chapter 8 More Number Theory


-:- Introduction to Number Theory
-:- Prime Numbers
-:- Fermat’s And Euler’s Theorems
-:- Testing for Primality
-:- The Chinese Remainder Theorem
-:- Discrete Logarithms

Chapter 9 Public Key Cryptography and RSA


-:- Public-Key Cryptography and RSA
-:- Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
-:- The RSA Algorithm
-:- Description of the RSA Algorithm
-:- The Security of RSA

Chapter 10 Other Public Key Cryptosystems


-:- Other Public-Key Cryptosystems
-:- Diffie-Hellman Key Exchange
-:- Elgamal Cryptographic System
-:- Elliptic Curve Arithmetic
-:- Elliptic Curve Cryptography
-:- Pseudorandom Number Generation Based on an Asymmetric Cipher

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 Cryptographic Hash Functions


-:- Cryptographic Hash Functions
-:- Applications of Cryptographic Hash Functions
-:- Two Simple Hash Functions
-:- Requirements and Security
-:- Hash Functions Based on Cipher Block Chaining
-:- Secure Hash Algorithm (SHA)
-:- SHA-3

Chapter 12 Message Authentication Codes


-:- Message Authentication Codes
-:- Message Authentication Requirements
-:- Message Authentication Functions
-:- Requirements For Message Authentication Codes
-:- Security of MACS
-:- MACS Based on Hash Functions: HMAC
-:- MACS Based on Block Ciphers: DAA And CMAC
-:- Authenticated Encryption: CCM and GCM
-:- Pseudorandom Number Generation Using Hash Functions and MACS

Chapter 13 Digital Signatures


-:- Digital Signatures
-:- Digital Signatures: Properties, Attacks and Forgeries
-:- ELGAMAL Digital Signature Scheme
-:- Schnorr Digital Signature Scheme
-:- Digital Signature Standard

PART FOUR MUTUAL TRUST

Chapter 14 Key Management and Distribution


-:- Key Management and Distribution
-:- Symmetric Key Distribution Using Symmetric Encryption
-:- Symmetric Key Distribution Using Asymmetric Encryption
-:- Distribution of Public Keys
-:- X.509 Certificates
-:- Public-Key Infrastructure

Chapter 15 User Authentication Protocols


-:- User Authentication
-:- Remote User-Authentication Principles
-:- Remote User-Authentication Using Symmetric Encryption
-:- Kerberos
-:- Remote User Authentication Using Asymmetric Encryption
-:- Federated Identity Management

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 Transport Level Security


-:- Transport-Level Security
-:- Web Security Considerations
-:- Secure Socket Layer and Transport Layer Security
-:- Transport Layer Security
-:- HTTPS
-:- Secure Shell (SSH)

Chapter 17 Wireless Network Security


-:- Wireless Network Security
-:- IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
-:- IEEE 802.11i Wireless LAN Security
-:- Wireless Application Protocol Overview
-:- Wireless Transport Layer Security
-:- WAP End-to-End Security

Chapter 18 Electronic Mail Security


-:- Electronic Mail Security
-:- Pretty Good Privacy
-:- S/MIME
-:- DomainKeys Identified Mail

Chapter 19 IP Security


-:- IP Security(IPsec)
-:- IP Security Overview
-:- IP Security Policy
-:- Encapsulating Security Payload
-:- Combining Security Associations
-:- Internet Key Exchange
-:- Cryptographic Suites

PART SIX SYSTEM SECURITY

Chapter 20 Intruders


-:- Intruders
-:- Intruders: Behavior Patterns and Techniques
-:- Intrusion Detection
-:- Password Management

Chapter 21 Malicious Software


-:- Malicious Software
-:- Types of Malicious Software
-:- Computer Viruses: Nature, Classification, Virus Kits
-:- Computer Virus Countermeasures
-:- Computer or Network Worms
-:- Distributed Denial of Service Attacks
-:- Firewalls

Chapter 22 Firewalls


-:- The Need for Firewalls
-:- Firewall Characteristics and limitations
-:- Types of Firewalls
-:- Firewall Basing
-:- Firewall Location and Configurations

PART SEVEN LEGAL AND ETHICAL ISSUES

Chapter 23 Legal and Ethical Issues


-:- Legal And Ethical Aspects
-:- Cybercrime and Computer Crime
-:- Types of Computer Crime
-:- Intellectual Property
-:- Network and Computer Privacy
-:- Ethical Issues - Network or Computer
Mahendra Varman Mahendra Varman Mahendra Varman Mahendra Varman Mahendra Varman

​ReadOrRefer.in

Recent New Topics :