boothiop.blogg.se

Cryptography and network security notes
Cryptography and network security notes




Forouzan, Cryptography and Network Security, Tata McGraw-Hill. Firewalls-Packet filters- Application Level Gateway- Encrypted tunnels.

  • Web Security: Web Security considerations- secure Socket Layer and Transport layer Security- Secure electronic transaction.
  • IP Security: Architecture- authentication Header- Encapsulating Security payload- Combining Security associations- Key management.
  • Network security: Electronic Mail Security: Pretty good privacy- S/MIME.
  • Authentication requirements- Authentication functions- Message authentication codes- Hash functions- SHA -1, MD5, Security of Hash functions and MACs- Authentication protocols-Digital signatures-Digital signature standards.
  • RSA algorithm- Key Management - Diffie-Hellman Key Exchange, Elliptic curve cryptography.
  • Public key Cryptography: - Principles of Public key Cryptography Systems, Number theory- Fundamental Theorem of arithmetic, Fermat’s Theorem, Euler’s Theorem, Euler’s Totient Function, Extended Euclid’s Algorithm, Modular arithmetic.
  • cryptography and network security notes

    AES: Basic Structure- Primitive operation- Inverse Cipher- Key Expansion, Rounds, Inverse Rounds. IDEA: Primitive operations- Key expansions- One round, Odd round, Even Round- Inverse keys for decryption.

    cryptography and network security notes

    Block Cipher Design principles- Block Cipher modes of operations. Simplified DES- Block Cipher principles- The Data Encryption Standard, Strength of DES- Differential and linear Cryptanalysis.

  • Symmetric Cipher Models- Substitution techniques- Transposition techniques- Rotor machines-Steganography.
  • Subject Overview Video by Ms.Sreelakshmi.





  • Cryptography and network security notes