Go to All Subject -

Computer Sotware and Inormation Technology Engineering CSE IT

Cryptography and Network Security - CS6701

Part 1


-> Cryptography and Network Security - Introduction
-> The OSI Security Architecture
-> Classical CryptoSystems
-> Classical Encryption Techniques
-> Linear Feedback Shift Register (LFSR)
-> Introduction to Number Theory
-> Finite Fields

Part 2


-> Simplified Data Encryption Standard (S-DES)
-> Block Cipher Principles
-> Multiple Encryption & DES
-> Modes of Operation
-> Stream Ciphers
-> RC4
-> Principles of Public Key Cryptography
-> RSA Algorithm

Part 3


-> Diffie-Hellman Key Exchange
-> Elliptic Curve Cryptography
-> Hash Functions
-> Simple Hash Functions
-> Birthday Attacks
-> Security of Hash Functions and Macs
-> Secure Hash Algorithm
-> Digital Signatures
-> Direct Digital Signatures
-> Digital Signature Algorithm(DSA)

Part 4


-> Authentication Applications
-> Kerbero V4 Authentication Dialogue Message Exchange
-> X.509 Certificates
-> Authentication Procedures
-> Electronic Mail Security
-> Public-Key Management
-> S/MIME
-> S/MIME Functionality and Messages

Part 5


-> Intruders
-> Intrusion Detection
-> Password Management
-> Firewalls: design principles, characteristics, Limitations, Types
-> Firewall configurations
-> Trusted systems
-> Viruses And Related Threats
-> Types of Network Viruses
-> Network Virus Countermeasures

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE by William Stallings

Chapter 1 Overview


-> Concepts and Definition of Computer Security
-> The Challenges of Computer Security
-> The OSI Security Architecture
-> Security Attacks: Passive and Active Attacks
-> Security Services
-> Security Mechanisms
-> A Model For Network Security
-> Classical Encryption Techniques

PART ONE SYMMETRIC CIPHERS

Chapter 2 Classical Encryption Techniques


-> Symmetric Cipher Model
-> Substitution Techniques
-> Transposition Techniques
-> Rotor Machines
-> Steganography

Chapter 3 Block Ciphers and the Data Encryption Standard


-> Block Ciphers and the Data Encryption Standard
-> Block Cipher Principles
-> The Data Encryption Standard
-> A DES(Data Encryption Standard) Example
-> The Strength of DES(Data Encryption Standard)
-> Differential and Linear Cryptanalysis
-> Block Cipher Design Principles

Chapter 4 Basic Concepts in Number Theory and Finite Fields


-> Basic Concepts in Number Theory and Finite Fields
-> Divisibility and the Division Algorithm
-> The Euclidean Algorithm
-> Modular Arithmetic
-> Groups, Rings, and Fields
-> Finite Fields Of The Form GF(p)
-> Polynomial Arithmetic
-> Finite Fields of the Form GF(2n)

Chapter 5 Advanced Encryption Standard


-> Advanced Encryption Standard(AES)
-> Finite Field Arithmetic
-> AES(Advanced Encryption Standard) Structure
-> Advanced Encryption Standard(AES) Transformation Functions
-> AES Key Expansion
-> An Advanced Encryption Standard(AES) Example
-> AES(Advanced Encryption Standard) Implementation

Chapter 6 Block Cipher Operation


-> Block Cipher Operation
-> Multiple Encryption and Triple DES(Data Encryption Standard)
-> Electronic Code Book
-> Cipher Block Chaining(CBC) Mode
-> Cipher Feedback Mode
-> Output Feedback Mode
-> Counter Mode
-> XTS-AES Mode For Block-Oriented Storage Devices

Chapter 7 Pseudorandom Number Generation and Stream Ciphers


-> Pseudorandom Number Generation and Stream Ciphers
-> Principles of Pseudorandom Number Generation
-> Pseudorandom Number Generators
-> Pseudorandom Number Generation Using a Block Cipher
-> Stream Ciphers
-> RC4
-> True Random Number Generators

PART TWO ASYMMETRIC CIPHERS

Chapter 8 More Number Theory


-> Introduction to Number Theory
-> Prime Numbers
-> Fermat’s And Euler’s Theorems
-> Testing for Primality
-> The Chinese Remainder Theorem
-> Discrete Logarithms

Chapter 9 Public Key Cryptography and RSA


-> Public-Key Cryptography and RSA
-> Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
-> The RSA Algorithm
-> Description of the RSA Algorithm
-> The Security of RSA

Chapter 10 Other Public Key Cryptosystems


-> Other Public-Key Cryptosystems
-> Diffie-Hellman Key Exchange
-> Elgamal Cryptographic System
-> Elliptic Curve Arithmetic
-> Elliptic Curve Cryptography
-> Pseudorandom Number Generation Based on an Asymmetric Cipher

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 Cryptographic Hash Functions


-> Cryptographic Hash Functions
-> Applications of Cryptographic Hash Functions
-> Two Simple Hash Functions
-> Requirements and Security
-> Hash Functions Based on Cipher Block Chaining
-> Secure Hash Algorithm (SHA)
-> SHA-3

Chapter 12 Message Authentication Codes


-> Message Authentication Codes
-> Message Authentication Requirements
-> Message Authentication Functions
-> Requirements For Message Authentication Codes
-> Security of MACS
-> MACS Based on Hash Functions: HMAC
-> MACS Based on Block Ciphers: DAA And CMAC
-> Authenticated Encryption: CCM and GCM
-> Pseudorandom Number Generation Using Hash Functions and MACS

Chapter 13 Digital Signatures


-> Digital Signatures
-> Digital Signatures: Properties, Attacks and Forgeries
-> ELGAMAL Digital Signature Scheme
-> Schnorr Digital Signature Scheme
-> Digital Signature Standard

PART FOUR MUTUAL TRUST

Chapter 14 Key Management and Distribution


-> Key Management and Distribution
-> Symmetric Key Distribution Using Symmetric Encryption
-> Symmetric Key Distribution Using Asymmetric Encryption
-> Distribution of Public Keys
-> X.509 Certificates
-> Public-Key Infrastructure

Chapter 15 User Authentication Protocols


-> User Authentication
-> Remote User-Authentication Principles
-> Remote User-Authentication Using Symmetric Encryption
-> Kerberos
-> Remote User Authentication Using Asymmetric Encryption
-> Federated Identity Management

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 Transport Level Security


-> Transport-Level Security
-> Web Security Considerations
-> Secure Socket Layer and Transport Layer Security
-> Transport Layer Security
-> HTTPS
-> Secure Shell (SSH)

Chapter 17 Wireless Network Security


-> Wireless Network Security
-> IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
-> IEEE 802.11i Wireless LAN Security
-> Wireless Application Protocol Overview
-> Wireless Transport Layer Security
-> WAP End-to-End Security

Chapter 18 Electronic Mail Security


-> Electronic Mail Security
-> Pretty Good Privacy
-> S/MIME
-> DomainKeys Identified Mail

Chapter 19 IP Security


-> IP Security(IPsec)
-> IP Security Overview
-> IP Security Policy
-> Encapsulating Security Payload
-> Combining Security Associations
-> Internet Key Exchange
-> Cryptographic Suites

PART SIX SYSTEM SECURITY

Chapter 20 Intruders


-> Intruders
-> Intruders: Behavior Patterns and Techniques
-> Intrusion Detection
-> Password Management

Chapter 21 Malicious Software


-> Malicious Software
-> Types of Malicious Software
-> Computer Viruses: Nature, Classification, Virus Kits
-> Computer Virus Countermeasures
-> Computer or Network Worms
-> Distributed Denial of Service Attacks
-> Firewalls

Chapter 22 Firewalls


-> The Need for Firewalls
-> Firewall Characteristics and limitations
-> Types of Firewalls
-> Firewall Basing
-> Firewall Location and Configurations

PART SEVEN LEGAL AND ETHICAL ISSUES

Chapter 23 Legal and Ethical Issues


-> Legal And Ethical Aspects
-> Cybercrime and Computer Crime
-> Types of Computer Crime
-> Intellectual Property
-> Network and Computer Privacy
-> Ethical Issues - Network or Computer

​Read Or Refer

Recent New Topics :