UNIT-I Introduction: Security Attacks-Passive Attacks, Active Attacks, Security Services Authentication, Access control, Confidentiality, Integrity, Availability service, Nonrepudiation, Security Mechanisms- Specific Security Mechanisms, Pervasive Security Mechanisms, model for Network Security, Basics of Cryptography - Symmetric Cipher Model, Substitution Techniques- Caesar Cipher, Monoalphabetic Ciphers, Playfair Cipher, Hill Cipher, polyalphabetic Ciphers, One-Time pad. Transposition Techniques-rail fence, Block and Stream Ciphers.
UNIT-II Symmetric Key Cryptography: Fiestel Cipher Structure, Block Cipher Design PrinciplesDesign Criteria, Number of Rounds, Design of Function F, Data Encryption Standard (DES), Strength of DES, Triple DES, International Data Encryption algorithm(IDEA), AESStructure, Transformation functions, Key Expansion, Block Cipher Modes of OperationECB, CBC, OFB,CFB,CTR Modes.
Download material
UNIT-III Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s Theorems-Proof and Examples, Euler’s Totient Function, Primitive root and Discrete Logarithms.Public Key Cryptography: Principles of Public key Cryptosystems-Public-Key Cryptosystems, Applications for Public-Key Cryptosystems, Requirements for Public-Key Cryptography, Public-Key Cryptanalysis, RSA Algorithm: Description of the Algorithm, The Security of RSA, Diffie-Hellman Key Exchange Algorithm, Elgamal encryption & decryption,
Download material
UNIT-IV Cryptographic Hash Functions: Message Authentication Requirements and FunctionsMessage Encryption, Message Authentication Code, Hash Function, Message Authentication Codes (MAC)-Requirements, Hash Functions-Requirements, Applications of MAC and hash functions, Secure Hash Algorithm (SHA-512), HMAC. Digital Signatures: Digital Signature Schemes, Authentication Protocols- Mutual Authentication, One-Way Authentication, Digital Signature Standards-The DSS Approach, The digital Signature Algorithm.
Download material
UNIT-V Authentication Applications: Kerberos: Motivation, Version 4, X.509 Directory Authentication service, E-Mail, PGP, S/MIME. Web Security: Web Security Considerations, Secure Sockets Layer- SSL Architecture, SSL Record Protocol, Change Cipher Spec Protocol, Alert Protocol, Handshake Protocol, Transport Layer Security, Secure Electronic Transactions (SET), Firewalls.
Download material