1. | Introduction: Need for security, Introduction to security attacks, services and mechanism, introduction to cryptography, Conventional Encryption: Conventional encryption model, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stereography, stream and block ciphers, Intruders, Viruses and related threads. |
---|

2. | Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and diffusion, Fiestal structure, data encryption standard(DES), strength of DES, crypt analysis of DES, block cipher modes of operations, triple DES, IDEA encryption and decryption, strength of IDEA, key distribution. |
---|

3. | Introduction to graph, ring and field, prime and relative prime numbers, modular arithmetic, Fermat’s and Euler’s theorem, primarily testing, Euclid’s Algorithm, Chinese Remainder theorem, discrete logarithms, Principals of public key crypto systems, RSA algorithm, security of RSA, key management, Diffle-Hellman key exchange algorithm, introductory idea of Elliptic curve cryptography, Elgamal encryption. |
---|

4. | Message Authentication and Hash Function: Authentication requirements, authentication functions, message authentication code (MAC), hash functions, security of hash functions and MACS, MD5 message digest algorithm, Secure hash algorithm(SHA), Public Key Infrastructure(PKI): Digital Certificate, private key management, Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm. |
---|

5. | Authentication Applications: Kerberos and X.509, directory authentication service, password, challenge-response, biometric authentication, electronic mail security-pretty good privacy (PGP), S/ MIME. |
---|

6. | IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations, key management. Web Security: Secure Socket Layer(SSL) and transport layer security, TSP, Secure Electronic Transaction (SET), Electronic money, WAP security, firewall design principals, Virtual Private Network (VPN) security. |
---|