CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE

Important questions and answers, Question Paper download, Online Study Material, Lecturing Notes, Assignment, Reference, Wiki

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE


CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE



Chapter 1 : Overview


Concepts and Definition of Computer Security
The Challenges of Computer Security
The OSI Security Architecture
Security Attacks: Passive and Active Attacks
Security Services
Security Mechanisms
A Model For Network Security
Classical Encryption Techniques

PART ONE SYMMETRIC CIPHERS

Chapter 2 : Classical Encryption Techniques


Symmetric Cipher Model
Substitution Techniques
Transposition Techniques
Rotor Machines
Steganography

Chapter 3 : Block Ciphers and the Data Encryption Standard


Block Ciphers and the Data Encryption Standard
Block Cipher Principles
The Data Encryption Standard
A DES(Data Encryption Standard) Example
The Strength of DES(Data Encryption Standard)
Differential and Linear Cryptanalysis
Block Cipher Design Principles

Chapter 4 : Basic Concepts in Number Theory and Finite Fields


Basic Concepts in Number Theory and Finite Fields
Divisibility and the Division Algorithm
The Euclidean Algorithm
Modular Arithmetic
Groups, Rings, and Fields
Finite Fields Of The Form GF(p)
Polynomial Arithmetic
Finite Fields of the Form GF(2n)

Chapter 5 : Advanced Encryption Standard


Advanced Encryption Standard(AES)
Finite Field Arithmetic
AES(Advanced Encryption Standard) Structure
Advanced Encryption Standard(AES) Transformation Functions
AES Key Expansion
An Advanced Encryption Standard(AES) Example
AES(Advanced Encryption Standard) Implementation

Chapter 6 : Block Cipher Operation


Block Cipher Operation
Multiple Encryption and Triple DES(Data Encryption Standard)
Electronic Code Book
Cipher Block Chaining(CBC) Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
XTS-AES Mode For Block-Oriented Storage Devices

Chapter 7 : Pseudorandom Number Generation and Stream Ciphers


Pseudorandom Number Generation and Stream Ciphers
Principles of Pseudorandom Number Generation
Pseudorandom Number Generators
Pseudorandom Number Generation Using a Block Cipher
Stream Ciphers
RC4
True Random Number Generators

PART TWO ASYMMETRIC CIPHERS

Chapter 8 : More Number Theory


Introduction to Number Theory
Prime Numbers
Fermat’s And Euler’s Theorems
Testing for Primality
The Chinese Remainder Theorem
Discrete Logarithms

Chapter 9 : Public Key Cryptography and RSA


Public-Key Cryptography and RSA
Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
The RSA Algorithm
Description of the RSA Algorithm
The Security of RSA

Chapter 10 : Other Public Key Cryptosystems


Other Public-Key Cryptosystems
Diffie-Hellman Key Exchange
Elgamal Cryptographic System
Elliptic Curve Arithmetic
Elliptic Curve Cryptography
Pseudorandom Number Generation Based on an Asymmetric Cipher

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 : Cryptographic Hash Functions


Cryptographic Hash Functions
Applications of Cryptographic Hash Functions
Two Simple Hash Functions
Requirements and Security
Hash Functions Based on Cipher Block Chaining
Secure Hash Algorithm (SHA)
SHA-3

Chapter 12 : Message Authentication Codes


Message Authentication Codes
Message Authentication Requirements
Message Authentication Functions
Requirements For Message Authentication Codes
Security of MACS
MACS Based on Hash Functions: HMAC
MACS Based on Block Ciphers: DAA And CMAC
Authenticated Encryption: CCM and GCM
Pseudorandom Number Generation Using Hash Functions and MACS

Chapter 13 : Digital Signatures


Digital Signatures
Digital Signatures: Properties, Attacks and Forgeries
ELGAMAL Digital Signature Scheme
Schnorr Digital Signature Scheme
Digital Signature Standard

PART FOUR MUTUAL TRUST

Chapter 14 : Key Management and Distribution


Key Management and Distribution
Symmetric Key Distribution Using Symmetric Encryption
Symmetric Key Distribution Using Asymmetric Encryption
Distribution of Public Keys
X.509 Certificates
Public-Key Infrastructure

Chapter 15 : User Authentication Protocols


User Authentication
Remote User-Authentication Principles
Remote User-Authentication Using Symmetric Encryption
Kerberos
Remote User Authentication Using Asymmetric Encryption
Federated Identity Management

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 : Transport Level Security


Transport-Level Security
Web Security Considerations
Secure Socket Layer and Transport Layer Security
Transport Layer Security
HTTPS
Secure Shell (SSH)

Chapter 17 : Wireless Network Security


Wireless Network Security
IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
IEEE 802.11i Wireless LAN Security
Wireless Application Protocol Overview
Wireless Transport Layer Security
WAP End-to-End Security

Chapter 18 : Electronic Mail Security


Electronic Mail Security
Pretty Good Privacy
S/MIME
DomainKeys Identified Mail

Chapter 19 : IP Security


IP Security(IPsec)
IP Security Overview
IP Security Policy
Encapsulating Security Payload
Combining Security Associations
Internet Key Exchange
Cryptographic Suites

PART SIX SYSTEM SECURITY

Chapter 20 : Intruders


Intruders
Intruders: Behavior Patterns and Techniques
Intrusion Detection
Password Management

Chapter 21 : Malicious Software


Malicious Software
Types of Malicious Software
Computer Viruses: Nature, Classification, Virus Kits
Computer Virus Countermeasures
Computer or Network Worms
Distributed Denial of Service Attacks
Firewalls

Chapter 22 : Firewalls


The Need for Firewalls
Firewall Characteristics and limitations
Types of Firewalls
Firewall Basing
Firewall Location and Configurations

PART SEVEN LEGAL AND ETHICAL ISSUES

Chapter 23 : Legal and Ethical Issues


Legal And Ethical Aspects
Cybercrime and Computer Crime
Types of Computer Crime
Intellectual Property
Network and Computer Privacy
Ethical Issues - Network or Computer



Privacy Policy, Terms and Conditions, DMCA Policy and Compliant, Contact

Contact Us(Customer Care) Via Social Media

Copyright © 2018-2023 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.