Cryptography and Network Security [CSE, ECE Department]
Part 1
1. Cryptography and Network Security - Introduction
2. The OSI Security Architecture
3. Classical CryptoSystems
4. Classical Encryption Techniques
5. Linear Feedback Shift Register (LFSR)
6. Introduction to Number Theory
7. Finite Fields
Part 2
1. Simplified Data Encryption Standard (S-DES)
2. Block Cipher Principles
3. Multiple Encryption & DES
4. Modes of Operation
5. Stream Ciphers
6. RC4
7. Principles of Public Key Cryptography
8. RSA Algorithm
Part 3
1. Diffie-Hellman Key Exchange
2. Elliptic Curve Cryptography
3. Hash Functions
4. Simple Hash Functions
5. Birthday Attacks
6. Security of Hash Functions and Macs
7. Secure Hash Algorithm
8. Digital Signatures
9. Direct Digital Signatures
10. Digital Signature Algorithm(DSA)
Part 4
1. Authentication Applications
2. Kerbero V4 Authentication Dialogue Message Exchange
3. X.509 Certificates
4. Authentication Procedures
5. Electronic Mail Security
6. Public-Key Management
7. S/MIME
8. S/MIME Functionality and Messages
Part 5
1. Intruders
2. Intrusion Detection
3. Password Management
4. Firewalls: design principles, characteristics, Limitations, Types
5. Firewall configurations
6. Trusted systems
7. Viruses And Related Threats
8. Types of Network Viruses
9. Network Virus Countermeasures
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE by William Stallings
Chapter 1 : Overview
1. Concepts and Definition of Computer Security
2. The Challenges of Computer Security
3. The OSI Security Architecture
4. Security Attacks: Passive and Active Attacks
5. Security Services
6. Security Mechanisms
7. A Model For Network Security
8. Classical Encryption Techniques
PART ONE SYMMETRIC CIPHERS
Chapter 2 : Classical Encryption Techniques
1. Symmetric Cipher Model
2. Substitution Techniques
3. Transposition Techniques
4. Rotor Machines
5. Steganography
Chapter 3 : Block Ciphers and the Data Encryption Standard
1. Block Ciphers and the Data Encryption Standard
2. Block Cipher Principles
3. The Data Encryption Standard
4. A DES(Data Encryption Standard) Example
5. The Strength of DES(Data Encryption Standard)
6. Differential and Linear Cryptanalysis
7. Block Cipher Design Principles
Chapter 4 : Basic Concepts in Number Theory and Finite Fields
1. Basic Concepts in Number Theory and Finite Fields
2. Divisibility and the Division Algorithm
3. The Euclidean Algorithm
4. Modular Arithmetic
5. Groups, Rings, and Fields
6. Finite Fields Of The Form GF(p)
7. Polynomial Arithmetic
8. Finite Fields of the Form GF(2n)
Chapter 5 : Advanced Encryption Standard
1. Advanced Encryption Standard(AES)
2. Finite Field Arithmetic
3. AES(Advanced Encryption Standard) Structure
4. Advanced Encryption Standard(AES) Transformation Functions
5. AES Key Expansion
6. An Advanced Encryption Standard(AES) Example
7. AES(Advanced Encryption Standard) Implementation
Chapter 6 : Block Cipher Operation
1. Block Cipher Operation
2. Multiple Encryption and Triple DES(Data Encryption Standard)
3. Electronic Code Book
4. Cipher Block Chaining(CBC) Mode
5. Cipher Feedback Mode
6. Output Feedback Mode
7. Counter Mode
8. XTS-AES Mode For Block-Oriented Storage Devices
Chapter 7 : Pseudorandom Number Generation and Stream Ciphers
1. Pseudorandom Number Generation and Stream Ciphers
2. Principles of Pseudorandom Number Generation
3. Pseudorandom Number Generators
4. Pseudorandom Number Generation Using a Block Cipher
5. Stream Ciphers
6. RC4
7. True Random Number Generators
PART TWO ASYMMETRIC CIPHERS
Chapter 8 : More Number Theory
1. Introduction to Number Theory
2. Prime Numbers
3. Fermat�s And Euler�s Theorems
4. Testing for Primality
5. The Chinese Remainder Theorem
6. Discrete Logarithms
Chapter 9 : Public Key Cryptography and RSA
1. Public-Key Cryptography and RSA
2. Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
3. The RSA Algorithm
4. Description of the RSA Algorithm
5. The Security of RSA
Chapter 10 : Other Public Key Cryptosystems
1. Other Public-Key Cryptosystems
2. Diffie-Hellman Key Exchange
3. Elgamal Cryptographic System
4. Elliptic Curve Arithmetic
5. Elliptic Curve Cryptography
6. Pseudorandom Number Generation Based on an Asymmetric Cipher
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 : Cryptographic Hash Functions
1. Cryptographic Hash Functions
2. Applications of Cryptographic Hash Functions
3. Two Simple Hash Functions
4. Requirements and Security
5. Hash Functions Based on Cipher Block Chaining
6. Secure Hash Algorithm (SHA)
7. SHA-3
Chapter 12 : Message Authentication Codes
1. Message Authentication Codes
2. Message Authentication Requirements
3. Message Authentication Functions
4. Requirements For Message Authentication Codes
5. Security of MACS
6. MACS Based on Hash Functions: HMAC
7. MACS Based on Block Ciphers: DAA And CMAC
8. Authenticated Encryption: CCM and GCM
9. Pseudorandom Number Generation Using Hash Functions and MACS
Chapter 13 : Digital Signatures
1. Digital Signatures
2. Digital Signatures: Properties, Attacks and Forgeries
3. ELGAMAL Digital Signature Scheme
4. Schnorr Digital Signature Scheme
5. Digital Signature Standard
PART FOUR MUTUAL TRUST
Chapter 14 : Key Management and Distribution
1. Key Management and Distribution
2. Symmetric Key Distribution Using Symmetric Encryption
3. Symmetric Key Distribution Using Asymmetric Encryption
4. Distribution of Public Keys
5. X.509 Certificates
6. Public-Key Infrastructure
Chapter 15 : User Authentication Protocols
1. User Authentication
2. Remote User-Authentication Principles
3. Remote User-Authentication Using Symmetric Encryption
4. Kerberos
5. Remote User Authentication Using Asymmetric Encryption
6. Federated Identity Management
PART FIVE NETWORK AND INTERNET SECURITY
Chapter 16 : Transport Level Security
1. Transport-Level Security
2. Web Security Considerations
3. Secure Socket Layer and Transport Layer Security
4. Transport Layer Security
5. HTTPS
6. Secure Shell (SSH)
Chapter 17 : Wireless Network Security
1. Wireless Network Security
2. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
3. IEEE 802.11i Wireless LAN Security
4. Wireless Application Protocol Overview
5. Wireless Transport Layer Security
6. WAP End-to-End Security
Chapter 18 : Electronic Mail Security
1. Electronic Mail Security
2. Pretty Good Privacy
3. S/MIME
4. DomainKeys Identified Mail
Chapter 19 : IP Security
1. IP Security(IPsec)
2. IP Security Overview
3. IP Security Policy
4. Encapsulating Security Payload
5. Combining Security Associations
6. Internet Key Exchange
7. Cryptographic Suites
PART SIX SYSTEM SECURITY
Chapter 20 : Intruders
1. Intruders
2. Intruders: Behavior Patterns and Techniques
3. Intrusion Detection
4. Password Management
Chapter 21 : Malicious Software
1. Malicious Software
2. Types of Malicious Software
3. Computer Viruses: Nature, Classification, Virus Kits
4. Computer Virus Countermeasures
5. Computer or Network Worms
6. Distributed Denial of Service Attacks
7. Firewalls
Chapter 22 : Firewalls
1. The Need for Firewalls
2. Firewall Characteristics and limitations
3. Types of Firewalls
4. Firewall Basing
5. Firewall Location and Configurations
PART SEVEN LEGAL AND ETHICAL ISSUES
Chapter 23 : Legal and Ethical Issues
1. Legal And Ethical Aspects
2. Cybercrime and Computer Crime
3. Types of Computer Crime
4. Intellectual Property
5. Network and Computer Privacy
6. Ethical Issues - Network or Computer
Comments
Post a Comment