Computer Security Concepts - The OSI Security Architecture-Security Attacks - A Model for Network Security - Symmetric Cipher Model - Substitution Techniques - Transposition Techniques – Block Cipher Principles - Data Encryption Standard (DES) - Example - Multiple Encryption and Triple DES - Stream Ciphers - RC4 Lab Practice: 1. Implementation of Classical Encryption Technique 2. Implementation of Substitution Ciphers and Symmetric Cryptosystems 3. Implementation of Data Encryption Standard (DES)
Principles of Pseudorandom Number Generation - Pseudorandom Number Generators -Divisibility and the Division Algorithm - The Euclidean Algorithm - Modular Arithmetic - The Chinese Remainder Theorem - Principles of Public Key Cryptosystems - The RSA Algorithm - Diffie Hellman Key Exchange - ElGamal Cryptosystem Lab Practice: 1. Implementation of Euclidean Algorithm 2. Implementation of RSA Algorithm 3. Implementation of Diffie - Hellman Key Exchange
Cryptographic Hash Functions - Two Simple Hash Functions Requirements and Security - Hash Functions Based on Cipher Block Chaining - Secure Hash Algorithm (SHA) - Message Authentication Codes - Message Authentication Requirements - Message Authentication Codes - Security of MACs - MACs Based on Hash Functions (HMAC) - Digital Signatures - ElGamal Digital Signature Scheme - Schnorr Digital Signature Scheme - Digital Signature Standard (DSS) Lab Practice: 1. Implementation of SHA and MAC 2. Implementation of Digital Signature
Key Management And Distribution - Symmetric Key Distribution Using Asymmetric Encryption - Distribution of Public Keys - X.509 Certificates - Public Key Infrastructure - User Authentication Protocols - Remote User Authentication Principles - Remote User Authentication Using Symmetric Encryption - Email Security Pretty Good Privacy (PGP) - S/MIME Lab Practice: 1. Implementation of Steganography 2. Implementation of PGP and Public key Distribution
Web Security Issues - Secure Sockets Layer (SSL) - Transport Layer Security (TLS) – HTTPS - Secure Shell (SSH) - IP Security Overview - Policy - Encapsulating Security Payload – Intruders - Intrusion Detection - Malicious Software – Viruses – Worms – Kerberos - Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations Lab Practice: 1. Implementation of SSL 2. Implementation of SSH and TLS
Reference Book:
Behrouz A. Ferouzan, “Cryptography & Network Security”, 2nd Edition, Tata Mc Graw Hill, 1 2011 Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, 2nd 2 Edition, Wiley Publications, 2003 3 Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006 4 Ulysess Black, “Internet Security Protocols”, 2nd Edition, Pearson Education Asia, 2000
Text Book:
1 William Stallings, “Cryptography and Network Security”, 6th Edition, Pearson Education, 2013 Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, 2nd Edition, Prentice 2 Hall of India, 2002