Encryption and decryption-What is cryptography? –Conventional cryptography -Public key cryptography- How PGP works - Keys- Digital signatures - Digital certificates- Validity and trust - Certificate Revocation - What is a passphrase? - Key splitting - Technical details
The OSI Security Architecture– Security Attacks – Security Services – Security Mechanisms – A Model for Network Security - Classical Encryption Techniques– Symmetric Cipher Model – Substitution Techniques - Transposition Techniques – Rotor Machines - Steganography
Block Cipher Principles – The Data Encryption Standard - The Strength of DES –Advanced Encryption Standard (AES) – Evaluation Criteria for AES – The AES Cipher – Multiple Encryption and Triple DES – Block Cipher Modes of Operation – Stream Ciphers and RC4- modular Arithmetic and Euclidean Algorithm
Placement of Encryption Function – Traffic Confidentiality – Key Distribution – Public key Cryptography and RSA– Principles of Public Key Cryptosystems – The RSA Algorithm- Basic prime numbers and Discrete Logarithms -Key Management – Diffie Hellman Key Exchange.
Authentication Functions – Message Authentication Codes (MAC’s) Functions– Security of Hash Functions and MAC’s Digital Signatures and Authentication Protocols – Digital Signatures – Digital Signature Standard.
Reference Book:
REFERENCE(S) 1. William Stallings. (2014). Cryptography and Network Security Principles and Practices. 6 thedition. Pearson Education. New Delhi. 2. John F. Dooley.(2012). History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Springer. 3. Charlie Kaufman, Radia Perlman, & Mike Speciner. (2017). Network Security Private Communication in a Public World. 2 ndedition. Prentice-Hall of India. New Delhi
Text Book:
TEXT(S) 1. An Introduction to Cryptography, version 8.0. Released Oct. 2002. 2. AtulKahate. (2019). Cryptography and Network Security. 4thedition.Tata McGraw Hill. New Delhi.