Introduction to security attacks, Services and mechanism, Classical encryption
techniques-Substitution ciphers and transposition ciphers, Cryptanalysis,
Steganography, Stream and block ciphers.
Modern block ciphers : Block ciphers principles, Shannon's theory of confusion and
diffusion, Fiestal structure, Data Encryption Standard (DES), Strength of DES, Idea of
differential cryptanalysis, Block cipher modes of operations, Triple DES.
Introduction to group, Field, Finite field of the form GF(p), Modular arithmetic, Prime
and relative prime numbers, Extended Euclidean algorithm.
Advanced Encryption Standard (AES) encryption and decryption.
Fermat's and Euler's theorem, Primality testing. Chinese remainder theorem, Discrete
Principals of public key crypto systems, RSA algorithm, Security of RSA.
Message authentication codes : Authentication requirements. Authentication functions,
Message authentication code, Hash functions, Birthday attacks, Security of hash
functions, Secure Hash Algorithm (SHA).
Digital signatures : Digital signatures, Elgamal digital signature techniques, Digital
Signature Standards (DSS), Proof of digital signature algorithm.
Key management and distribution : Symmetric key distribution, Diffie-Hellman key
exchange, Public key distribution, X.509 certificates, Public key infrastructure.
Authentication applications : Kerberos.
Electronic mail security : Pretty Good Privacy (PGP), S/MIME.
IP Security : Architecture, Authentication header, Encapsulating security-payloads,
Combining security associations, Key management.
Introduction to secure socket layer, Secure Electronic Transaction (SET)
System security : Introductory idea of intrusion, Intrusion detection, Viruses and
related threats, Firewalls.