UNIT 1:
Computer Security Concepts
The OSI Security Architecture
Substitution Techniques - Transposition Techniques
Security Attacks - A Model for Network Security
Multiple Encryption and Triple DES
UNIT 2:
Principles of Pseudorandom Number Generation
The Euclidean Algorithm - Modular Arithmetic
The Chinese Remainder Theorem - Principles of Public Key Cryptosystem
Diffie Hellman Key Exchange
Implementation of Euclidean Algorithm
UNIT 3:
Cryptographic Hash Functions
Two Simple Hash Functions Requirements and Security
Hash Functions Based on Cipher Block Chaining
Secure Hash Algorithm (SHA) - Message Authentication Codes
Message Authentication Requirements - Message Authentication Code
Security of MACs - MACs Based on Hash Functions (HMAC)
Digital Signatures - ElGamal Digital Signature Scheme