First lecture • Introduction to information Security • Why Computer and information Security • Cryptography • Secret key algorithms: DES/AES • Public key algorithms: RSA • One-way hash functions & message digests: MD5, SHA2
The Definition of information Security
• The Basic Components • Security Threats and Attacks • Security Policy and Mechanism References
• Cryptography and Network Security, by William Stallings, 5rd Edition, Prentice Hall, 2010
Second lecture
• Classical and modern cryptography • Overview of Cryptography • Classical Symmetric Cipher • Modern Symmetric Ciphers (DES)
• Classification of Cryptography • Secret Key vs. Secret Algorithm • Cryptanalysis Scheme • Unconditional vs. Computational Security • Brute Force Search Symmetric Cipher Model
• Requirements • Caesar Cipher • One-Time Pad • Transposition Ciphers • Rail Fence cipher • Product Ciphers Modern Symmetric Ciphers (DES)
• Block vs Stream Ciphers • Block Cipher Principles • Substitution-Permutation Ciphers • Confusion and Diffusion • Feistel Cipher Structure • DES (Data Encryption Standard) Third lecture
• Introduction to Practical Cryptography • Stream Ciphers Properties Building Blocks Competitions Examples Uses • Encryption of streaming data • Random bit generation
Stream cipher
• Speed • Initialization • Keystream generation • Resources – memory, power, cpu • Hardware, software suitability • Stream Ciphers – Approaches • Feedback Shift Register • Stream Cipher Examples • RC4 • A5/1 • A5/3 • LILI • Sober • Trivium • Lex
Lecture five
• Data Encryption Standard(DES) • DES Background • The Algorithm • Keylength Weakness • S-box Construction • Future of DES • Modes of Operation • Message Authentication Lecture six Advanced Encryption Standard AES • Rijndael • GF(256) • ByteSub • ShiftRow • MixColumn • Key Schedule • Decrypting Rijndael Lecture seven RSA Cryptography
• RSA Cryptography: Motivation • RSA Cryptography: Mathematical Principles • RSA Cryptography: The Basic System • RSA Cryptography: Square and Multiply • RSA Cryptography: General Security • RSA Cryptography: The Factoring Problem • RSA Cryptography: Key Length and Complexity • RSA Cryptography: Digital Signatures
• RSA Cryptography: Attacks • RSA Cryptography: Weak Message Attacks • RSA Cryptography: Short Exponent Attack • RSA Cryptography: Side Channel Attacks
Lecture Eight
• Key management • Key Establishment • Symmeric key approaches • Key distribution problem • Key distribution center protocols • Authenticated and key agreement protocols Lecture nine Digital Signatures & Authentication Protocols • Digital Signature Properties • Direct Digital Signatures • Arbitrated Digital Signatures • Authentication Protocols • Replay Attacks • Using Symmetric Encryption • Using Public-Key Encryption • One-Way AuthenticationUsing Public-Key Encryption • Digital Signature Algorithm (DSA) Lecture Ten • IT System Services Life cycle • Communication encryption encrypting communications channels Link –by- Link Encryption End-by End Encryption encrypting data for storage Lecture 11
• IP Security • Benefits of IPSec • IP Security architecture • IPSec Services • Key Management Oakley Protocol ISAKMP Protocol Lecture 12
• Electronic Mail Security • Pretty Good Privacy (PGP) • PGP Operation:Confidentiality & Authentication • PGP Operation – Compression • PGP Operation – Email Compatibility • PGP Message Format • PGP Key Management • S/MIME (Secure/Multipurpose Internet Mail Extensions) Lecture 13
• Secure Electronic Transaction • Credit Cards on the Internet • Credit Card Protocols • SET Business Requirements • SET Transactions • Key Technologies of SET • Dual Signature for SET • SET Supported Transactions Lecture 14
• The secure socket layer(SSL) Layer. • Location of SSL in the TCP/IP protocol stack. • SSL Phases Handshake protocol Record protocol
Lecture 15
• Firewalls • What is a Firewall? • Classification of Firewall • Firewalls – Packet Filters • Firewall Gateways • Application-Level Filtering • Firewalls - Circuit Level Gateway • Dynamic Packet Filters • Distributed Firewalls