Cryptography and Network Security [CSE, ECE Department]

Cryptography and Network Security [CSE, ECE Department]


Cryptography and Network Security




Part 1


1. Cryptography and Network Security - Introduction
2. The OSI Security Architecture
3. Classical CryptoSystems
4. Classical Encryption Techniques
5. Linear Feedback Shift Register (LFSR)
6. Introduction to Number Theory
7. Finite Fields



Part 2


1. Simplified Data Encryption Standard (S-DES)
2. Block Cipher Principles
3. Multiple Encryption & DES
4. Modes of Operation
5. Stream Ciphers
6. RC4
7. Principles of Public Key Cryptography
8. RSA Algorithm



Part 3


1. Diffie-Hellman Key Exchange
2. Elliptic Curve Cryptography
3. Hash Functions
4. Simple Hash Functions
5. Birthday Attacks
6. Security of Hash Functions and Macs
7. Secure Hash Algorithm
8. Digital Signatures
9. Direct Digital Signatures
10. Digital Signature Algorithm(DSA)



Part 4


1. Authentication Applications
2. Kerbero V4 Authentication Dialogue Message Exchange
3. X.509 Certificates
4. Authentication Procedures
5. Electronic Mail Security
6. Public-Key Management
7. S/MIME
8. S/MIME Functionality and Messages



Part 5


1. Intruders
2. Intrusion Detection
3. Password Management
4. Firewalls: design principles, characteristics, Limitations, Types
5. Firewall configurations
6. Trusted systems
7. Viruses And Related Threats
8. Types of Network Viruses
9. Network Virus Countermeasures



CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE by William Stallings





Chapter 1 : Overview


1. Concepts and Definition of Computer Security
2. The Challenges of Computer Security
3. The OSI Security Architecture
4. Security Attacks: Passive and Active Attacks
5. Security Services
6. Security Mechanisms
7. A Model For Network Security
8. Classical Encryption Techniques



PART ONE SYMMETRIC CIPHERS





Chapter 2 : Classical Encryption Techniques


1. Symmetric Cipher Model
2. Substitution Techniques
3. Transposition Techniques
4. Rotor Machines
5. Steganography



Chapter 3 : Block Ciphers and the Data Encryption Standard


1. Block Ciphers and the Data Encryption Standard
2. Block Cipher Principles
3. The Data Encryption Standard
4. A DES(Data Encryption Standard) Example
5. The Strength of DES(Data Encryption Standard)
6. Differential and Linear Cryptanalysis
7. Block Cipher Design Principles



Chapter 4 : Basic Concepts in Number Theory and Finite Fields


1. Basic Concepts in Number Theory and Finite Fields
2. Divisibility and the Division Algorithm
3. The Euclidean Algorithm
4. Modular Arithmetic
5. Groups, Rings, and Fields
6. Finite Fields Of The Form GF(p)
7. Polynomial Arithmetic
8. Finite Fields of the Form GF(2n)



Chapter 5 : Advanced Encryption Standard


1. Advanced Encryption Standard(AES)
2. Finite Field Arithmetic
3. AES(Advanced Encryption Standard) Structure
4. Advanced Encryption Standard(AES) Transformation Functions
5. AES Key Expansion
6. An Advanced Encryption Standard(AES) Example
7. AES(Advanced Encryption Standard) Implementation



Chapter 6 : Block Cipher Operation


1. Block Cipher Operation
2. Multiple Encryption and Triple DES(Data Encryption Standard)
3. Electronic Code Book
4. Cipher Block Chaining(CBC) Mode
5. Cipher Feedback Mode
6. Output Feedback Mode
7. Counter Mode
8. XTS-AES Mode For Block-Oriented Storage Devices



Chapter 7 : Pseudorandom Number Generation and Stream Ciphers


1. Pseudorandom Number Generation and Stream Ciphers
2. Principles of Pseudorandom Number Generation
3. Pseudorandom Number Generators
4. Pseudorandom Number Generation Using a Block Cipher
5. Stream Ciphers
6. RC4
7. True Random Number Generators



PART TWO ASYMMETRIC CIPHERS





Chapter 8 : More Number Theory


1. Introduction to Number Theory
2. Prime Numbers
3. Fermat�s And Euler�s Theorems
4. Testing for Primality
5. The Chinese Remainder Theorem
6. Discrete Logarithms



Chapter 9 : Public Key Cryptography and RSA


1. Public-Key Cryptography and RSA
2. Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis
3. The RSA Algorithm
4. Description of the RSA Algorithm
5. The Security of RSA



Chapter 10 : Other Public Key Cryptosystems


1. Other Public-Key Cryptosystems
2. Diffie-Hellman Key Exchange
3. Elgamal Cryptographic System
4. Elliptic Curve Arithmetic
5. Elliptic Curve Cryptography
6. Pseudorandom Number Generation Based on an Asymmetric Cipher



PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS





Chapter 11 : Cryptographic Hash Functions


1. Cryptographic Hash Functions
2. Applications of Cryptographic Hash Functions
3. Two Simple Hash Functions
4. Requirements and Security
5. Hash Functions Based on Cipher Block Chaining
6. Secure Hash Algorithm (SHA)
7. SHA-3



Chapter 12 : Message Authentication Codes


1. Message Authentication Codes
2. Message Authentication Requirements
3. Message Authentication Functions
4. Requirements For Message Authentication Codes
5. Security of MACS
6. MACS Based on Hash Functions: HMAC
7. MACS Based on Block Ciphers: DAA And CMAC
8. Authenticated Encryption: CCM and GCM
9. Pseudorandom Number Generation Using Hash Functions and MACS



Chapter 13 : Digital Signatures


1. Digital Signatures
2. Digital Signatures: Properties, Attacks and Forgeries
3. ELGAMAL Digital Signature Scheme
4. Schnorr Digital Signature Scheme
5. Digital Signature Standard



PART FOUR MUTUAL TRUST





Chapter 14 : Key Management and Distribution


1. Key Management and Distribution
2. Symmetric Key Distribution Using Symmetric Encryption
3. Symmetric Key Distribution Using Asymmetric Encryption
4. Distribution of Public Keys
5. X.509 Certificates
6. Public-Key Infrastructure



Chapter 15 : User Authentication Protocols


1. User Authentication
2. Remote User-Authentication Principles
3. Remote User-Authentication Using Symmetric Encryption
4. Kerberos
5. Remote User Authentication Using Asymmetric Encryption
6. Federated Identity Management



PART FIVE NETWORK AND INTERNET SECURITY





Chapter 16 : Transport Level Security


1. Transport-Level Security
2. Web Security Considerations
3. Secure Socket Layer and Transport Layer Security
4. Transport Layer Security
5. HTTPS
6. Secure Shell (SSH)



Chapter 17 : Wireless Network Security


1. Wireless Network Security
2. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components
3. IEEE 802.11i Wireless LAN Security
4. Wireless Application Protocol Overview
5. Wireless Transport Layer Security
6. WAP End-to-End Security



Chapter 18 : Electronic Mail Security


1. Electronic Mail Security
2. Pretty Good Privacy
3. S/MIME
4. DomainKeys Identified Mail



Chapter 19 : IP Security


1. IP Security(IPsec)
2. IP Security Overview
3. IP Security Policy
4. Encapsulating Security Payload
5. Combining Security Associations
6. Internet Key Exchange
7. Cryptographic Suites



PART SIX SYSTEM SECURITY





Chapter 20 : Intruders


1. Intruders
2. Intruders: Behavior Patterns and Techniques
3. Intrusion Detection
4. Password Management



Chapter 21 : Malicious Software


1. Malicious Software
2. Types of Malicious Software
3. Computer Viruses: Nature, Classification, Virus Kits
4. Computer Virus Countermeasures
5. Computer or Network Worms
6. Distributed Denial of Service Attacks
7. Firewalls



Chapter 22 : Firewalls


1. The Need for Firewalls
2. Firewall Characteristics and limitations
3. Types of Firewalls
4. Firewall Basing
5. Firewall Location and Configurations



PART SEVEN LEGAL AND ETHICAL ISSUES





Chapter 23 : Legal and Ethical Issues


1. Legal And Ethical Aspects
2. Cybercrime and Computer Crime
3. Types of Computer Crime
4. Intellectual Property
5. Network and Computer Privacy
6. Ethical Issues - Network or Computer



Comments