First lecture • Introduction to information Security • Why Computer and information Security • • Secret algorithms: DES/AES • Public key algorithms: RSA • One-way hash functions & message digests: MD5, SHA2

The Definition of information Security

• The Basic Components • Security Threats and Attacks • Security Policy and Mechanism References

• Cryptography and Network Security, by William Stallings, 5rd Edition, Prentice Hall, 2010

Second lecture

• Classical and modern cryptography • Overview of Cryptography • Classical Symmetric Cipher • Modern Symmetric Ciphers (DES)

• Classification of Cryptography • Secret Key vs. Secret Algorithm • Scheme • Unconditional vs. Computational Security • Brute Force Search Symmetric Cipher Model

• Requirements • Caesar Cipher • One-Time Pad • Transposition Ciphers • Rail Fence cipher • Product Ciphers Modern Symmetric Ciphers (DES)

• Block vs Stream Ciphers • Principles • Substitution-Permutation Ciphers • Confusion and Diffusion • Feistel Cipher Structure • DES (Data Standard) Third lecture

• Introduction to Practical Cryptography • Stream Ciphers  Properties  Building Blocks  Competitions  Examples  Uses • Encryption of streaming data • Random bit generation

Stream cipher

• Speed • Initialization • Keystream generation • Resources – memory, power, cpu • Hardware, software suitability • Stream Ciphers – Approaches • Feedback Shift Register • Examples • RC4 • A5/1 • A5/3 • LILI • Sober • Trivium • Lex

Lecture five

• Data Encryption Standard(DES) • DES Background • The Algorithm • Keylength Weakness • S-box Construction • Future of DES • Modes of Operation • Message Authentication Lecture six Advanced Encryption Standard AES • Rijndael • GF(256) • ByteSub • ShiftRow • MixColumn • • Decrypting Rijndael Lecture seven RSA Cryptography

• RSA Cryptography: Motivation • RSA Cryptography: Mathematical Principles • RSA Cryptography: The Basic System • RSA Cryptography: Square and Multiply • RSA Cryptography: General Security • RSA Cryptography: The Factoring Problem • RSA Cryptography: Key Length and Complexity • RSA Cryptography: Digital Signatures

• RSA Cryptography: Attacks • RSA Cryptography: Weak Message Attacks • RSA Cryptography: Short Exponent Attack • RSA Cryptography: Side Channel Attacks

Lecture Eight

• Key management • Key Establishment • Symmeric key approaches • Key distribution problem • Key distribution center protocols • Authenticated and key agreement protocols Lecture nine Digital Signatures & Authentication Protocols • Properties • Direct Digital Signatures • Arbitrated Digital Signatures • Authentication Protocols • Replay Attacks • Using Symmetric Encryption • Using Public-Key Encryption • One-Way AuthenticationUsing Public-Key Encryption • Digital Signature Algorithm (DSA) Lecture Ten • IT System Services Life cycle • Communication encryption  encrypting communications channels  Link –by- Link Encryption  End-by End Encryption  encrypting data for storage Lecture 11

• IP Security • Benefits of IPSec • IP Security architecture • IPSec Services • Key Management  Oakley Protocol  ISAKMP Protocol Lecture 12

• Electronic Mail Security • Pretty Good Privacy (PGP) • PGP Operation:Confidentiality & Authentication • PGP Operation – Compression • PGP Operation – Email Compatibility • PGP Message Format • PGP Key Management • S/MIME (Secure/Multipurpose Internet Mail Extensions) Lecture 13

• Secure Electronic Transaction • Credit Cards on the Internet • Credit Card Protocols • SET Business Requirements • SET Transactions • Key Technologies of SET • Dual Signature for SET • SET Supported Transactions Lecture 14

• The secure socket layer(SSL) Layer. • Location of SSL in the TCP/IP protocol stack. • SSL Phases Handshake protocol Record protocol

Lecture 15

• Firewalls • What is a Firewall? • Classification of Firewall • Firewalls – Packet Filters • Firewall Gateways • Application-Level Filtering • Firewalls - Circuit Level Gateway • Dynamic Packet Filters • Distributed Firewalls