Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
5 views1 page

Cryptography

The document outlines a comprehensive introduction to cryptography and network security, covering classical encryption techniques, number theory, block ciphers, and public key cryptography. It discusses hash functions, digital signatures, and security practices including authentication applications and firewall designs. Additionally, it addresses e-mail, IP, and web security, detailing security services, protocols, and potential threats.

Uploaded by

rajputkritik18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views1 page

Cryptography

The document outlines a comprehensive introduction to cryptography and network security, covering classical encryption techniques, number theory, block ciphers, and public key cryptography. It discusses hash functions, digital signatures, and security practices including authentication applications and firewall designs. Additionally, it addresses e-mail, IP, and web security, detailing security services, protocols, and potential threats.

Uploaded by

rajputkritik18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

UNIT I: INTRODUCTION & NUMBER THEORY

Services, Mechanisms and attacks-the OSI security architecture-Network security model-


Classical Encryption techniques (Symmetric cipher model, substitution techniques,
transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups,
Rings, Fields-Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic –
Prime numbers-Fermat‟s and Euler‟s theorem-Testing for primality -The Chinese remainder
theorem- Discrete logarithms.

UNIT II: BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY

Data Encryption Standard-Block cipher principles-block cipher modes of operation-


Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key
cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management –
Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT III: HASH FUNCTIONS AND DIGITAL SIGNATURES Authentication requirement –


Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 –
SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal –
Schnorr.

UNIT IV: SECURITY PRACTICE & SYSTEM SECURITY

Authentication applications – Kerberos – X.509 Authentication services – Internet Firewalls


for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls –
Firewall designs – SET for E-Commerce Transactions. Intruder – Intrusion detection system –
Virus and related threats – Countermeasures – Firewalls design principles – Trusted systems
– Practical implementation of cryptography and security.

UNIT V: E-MAIL, IP & WEB SECURITY E-mail Security: Security Services for E-mail-attacks
possible through E-mail – establishing keys privacy-authentication of the source-Message
Integrity-Non-repudiation-Pretty Good Privacy S/MIME. IPSecurity: Overview of IPSec – IP
and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange
(Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the
keys- client authentication-PKI as deployed by SSLAttacks fixed in v3- Exportability-Encoding-
Secure Electronic Transaction (SET)

You might also like