Cryptography and Network Security - CS8792, CS6701

Online Study Material, Lecturing Notes, Assignment, Reference, Wiki and important questions and answers

Cryptography and Network Security

Part 1


=> Cryptography and Network Security - Introduction
=> The OSI Security Architecture
=> Classical CryptoSystems
=> Classical Encryption Techniques
=> Linear Feedback Shift Register (LFSR)
=> Introduction to Number Theory
=> Finite Fields

Part 2


=> Simplified Data Encryption Standard (S-DES)
=> Block Cipher Principles
=> Multiple Encryption & DES
=> Modes of Operation
=> Stream Ciphers
=> RC4
=> Principles of Public Key Cryptography
=> RSA Algorithm

Part 3


=> Diffie-Hellman Key Exchange
=> Elliptic Curve Cryptography
=> Hash Functions
=> Simple Hash Functions
=> Birthday Attacks
=> Security of Hash Functions and Macs
=> Secure Hash Algorithm
=> Digital Signatures
=> Direct Digital Signatures
=> Digital Signature Algorithm(DSA)

Part 4


=> Authentication Applications
=> Kerbero V4 Authentication Dialogue Message Exchange
=> X.509 Certificates
=> Authentication Procedures
=> Electronic Mail Security
=> Public-Key Management
=> S/MIME
=> S/MIME Functionality and Messages

Part 5


=> Intruders
=> Intrusion Detection
=> Password Management
=> Firewalls: design principles, characteristics, Limitations, Types
=> Firewall configurations
=> Trusted systems
=> Viruses And Related Threats
=> Types of Network Viruses
=> Network Virus Countermeasures

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE by William Stallings

Chapter 1 Overview


=> Concepts and Definition of Computer Security
=> The Challenges of Computer Security
=> The OSI Security Architecture
=> Security Attacks: Passive and Active Attacks
=> Security Services
=> Security Mechanisms
=> A Model For Network Security
=> Classical Encryption Techniques

PART ONE SYMMETRIC CIPHERS

Chapter 2 Classical Encryption Techniques


=> Symmetric Cipher Model
=> Substitution Techniques
=> Transposition Techniques
=> Rotor Machines
=> Steganography

Chapter 3 Block Ciphers and the Data Encryption Standard


=> Block Ciphers and the Data Encryption Standard
=> Block Cipher Principles
=> The Data Encryption Standard
=> A DES(Data Encryption Standard) Example
=> The Strength of DES(Data Encryption Standard)
=> Differential and Linear Cryptanalysis
=> Block Cipher Design Principles

Chapter 4 Basic Concepts in Number Theory and Finite Fields


=> Basic Concepts in Number Theory and Finite Fields
=> Divisibility and the Division Algorithm
=> The Euclidean Algorithm
=> Modular Arithmetic
=> Groups, Rings, and Fields
=> Finite Fields Of The Form GF(p)
=> Polynomial Arithmetic
=> Finite Fields of the Form GF(2n)

Chapter 5 Advanced Encryption Standard


=> Advanced Encryption Standard(AES)
=> Finite Field Arithmetic
=> AES(Advanced Encryption Standard) Structure
=> Advanced Encryption Standard(AES) Transformation Functions
=> AES Key Expansion
=> An Advanced Encryption Standard(AES) Example
=> AES(Advanced Encryption Standard) Implementation

Chapter 6 Block Cipher Operation


=> Block Cipher Operation
=> Multiple Encryption and Triple DES(Data Encryption Standard)
=> Electronic Code Book
=> Cipher Block Chaining(CBC) Mode
=> Cipher Feedback Mode
=> Output Feedback Mode
=> Counter Mode
=> XTS-AES Mode For Block-Oriented Storage Devices

Chapter 7 Pseudorandom Number Generation and Stream Ciphers


=> Pseudorandom Number Generation and Stream Ciphers
=> Principles of Pseudorandom Number Generation
=> Pseudorandom Number Generators
=> Pseudorandom Number Generation Using a Block Cipher
=> Stream Ciphers
=> RC4
=> True Random Number Generators

PART TWO ASYMMETRIC CIPHERS

Chapter 8 More Number Theory


=> Introduction to Number Theory
=> Prime Numbers
=> Fermat’s And Euler’s Theorems
=> Testing for Primality
=> The Chinese Remainder Theorem
=> Discrete Logarithms

Chapter 9 Public Key Cryptography and RSA


=> Public-Key Cryptography and RSA
=> Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
=> The RSA Algorithm
=> Description of the RSA Algorithm
=> The Security of RSA

Chapter 10 Other Public Key Cryptosystems


=> Other Public-Key Cryptosystems
=> Diffie-Hellman Key Exchange
=> Elgamal Cryptographic System
=> Elliptic Curve Arithmetic
=> Elliptic Curve Cryptography
=> Pseudorandom Number Generation Based on an Asymmetric Cipher

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 Cryptographic Hash Functions


=> Cryptographic Hash Functions
=> Applications of Cryptographic Hash Functions
=> Two Simple Hash Functions
=> Requirements and Security
=> Hash Functions Based on Cipher Block Chaining
=> Secure Hash Algorithm (SHA)
=> SHA-3

Chapter 12 Message Authentication Codes


=> Message Authentication Codes
=> Message Authentication Requirements
=> Message Authentication Functions
=> Requirements For Message Authentication Codes
=> Security of MACS
=> MACS Based on Hash Functions: HMAC
=> MACS Based on Block Ciphers: DAA And CMAC
=> Authenticated Encryption: CCM and GCM
=> Pseudorandom Number Generation Using Hash Functions and MACS

Chapter 13 Digital Signatures


=> Digital Signatures
=> Digital Signatures: Properties, Attacks and Forgeries
=> ELGAMAL Digital Signature Scheme
=> Schnorr Digital Signature Scheme
=> Digital Signature Standard

PART FOUR MUTUAL TRUST

Chapter 14 Key Management and Distribution


=> Key Management and Distribution
=> Symmetric Key Distribution Using Symmetric Encryption
=> Symmetric Key Distribution Using Asymmetric Encryption
=> Distribution of Public Keys
=> X.509 Certificates
=> Public-Key Infrastructure

Chapter 15 User Authentication Protocols


=> User Authentication
=> Remote User-Authentication Principles
=> Remote User-Authentication Using Symmetric Encryption
=> Kerberos
=> Remote User Authentication Using Asymmetric Encryption
=> Federated Identity Management

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 Transport Level Security


=> Transport-Level Security
=> Web Security Considerations
=> Secure Socket Layer and Transport Layer Security
=> Transport Layer Security
=> HTTPS
=> Secure Shell (SSH)

Chapter 17 Wireless Network Security


=> Wireless Network Security
=> IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
=> IEEE 802.11i Wireless LAN Security
=> Wireless Application Protocol Overview
=> Wireless Transport Layer Security
=> WAP End-to-End Security

Chapter 18 Electronic Mail Security


=> Electronic Mail Security
=> Pretty Good Privacy
=> S/MIME
=> DomainKeys Identified Mail

Chapter 19 IP Security


=> IP Security(IPsec)
=> IP Security Overview
=> IP Security Policy
=> Encapsulating Security Payload
=> Combining Security Associations
=> Internet Key Exchange
=> Cryptographic Suites

PART SIX SYSTEM SECURITY

Chapter 20 Intruders


=> Intruders
=> Intruders: Behavior Patterns and Techniques
=> Intrusion Detection
=> Password Management

Chapter 21 Malicious Software


=> Malicious Software
=> Types of Malicious Software
=> Computer Viruses: Nature, Classification, Virus Kits
=> Computer Virus Countermeasures
=> Computer or Network Worms
=> Distributed Denial of Service Attacks
=> Firewalls

Chapter 22 Firewalls


=> The Need for Firewalls
=> Firewall Characteristics and limitations
=> Types of Firewalls
=> Firewall Basing
=> Firewall Location and Configurations

PART SEVEN LEGAL AND ETHICAL ISSUES

Chapter 23 Legal and Ethical Issues


=> Legal And Ethical Aspects
=> Cybercrime and Computer Crime
=> Types of Computer Crime
=> Intellectual Property
=> Network and Computer Privacy
=> Ethical Issues - Network or Computer

CS6701 Cryptography and Network Security - Anna University 2013 Regulation Syllabus - Download Pdf
CS8792 Cryptography and Network Security - Anna University 2017 Regulation Syllabus - Download Pdf
Cryptography and Network Security - Question Bank 1 - Download Pdf


Cryptography and Network Security - Question Bank 2 - Download Pdf
Cryptography and Network Security - Question Bank 3 - Download Pdf
Cryptography and Network Security - 2 marks with answers 1 - Download Pdf
Cryptography and Network Security - 2 marks with answers 2 - Download Pdf
Cryptography and Network Security - 2 marks with answers 3 - Download Pdf
Cryptography and Network Security - 2 marks with answers 4 - Download Pdf
Cryptography and Network Security - Notes 2 - Download Pdf
Cryptography and Network Security - Notes 1 - Download Pdf
Cryptography and Network Security - Notes 3 - Download Pdf
Cryptography and Network Security - Nov Dec 2016 Question Paper
Download Anna University Notes Android App


Cryptography and Network Security - Start Reading Online



Copyright © 2018-2020 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.