First Lecture

First Lecture

First lecture • Introduction to information Security • Why Computer and information Security • Cryptography • Secret key algorithms: DES/AES • Public key algorithms: RSA • One-way hash functions & message digests: MD5, SHA2 The Definition of information Security • The Basic Components • Security Threats and Attacks • Security Policy and Mechanism References • Cryptography and Network Security, by William Stallings, 5rd Edition, Prentice Hall, 2010 Second lecture • Classical and modern cryptography • Overview of Cryptography • Classical Symmetric Cipher • Modern Symmetric Ciphers (DES) • Classification of Cryptography • Secret Key vs. Secret Algorithm • Cryptanalysis Scheme • Unconditional vs. Computational Security • Brute Force Search Symmetric Cipher Model • Requirements • Caesar Cipher • One-Time Pad • Transposition Ciphers • Rail Fence cipher • Product Ciphers Modern Symmetric Ciphers (DES) • Block vs Stream Ciphers • Block Cipher Principles • Substitution-Permutation Ciphers • Confusion and Diffusion • Feistel Cipher Structure • DES (Data Encryption Standard) Third lecture • Introduction to Practical Cryptography • Stream Ciphers Properties Building Blocks Competitions Examples Uses • Encryption of streaming data • Random bit generation Stream cipher • Speed • Initialization • Keystream generation • Resources – memory, power, cpu • Hardware, software suitability • Stream Ciphers – Approaches • Feedback Shift Register • Stream Cipher Examples • RC4 • A5/1 • A5/3 • LILI • Sober • Trivium • Lex Lecture five • Data Encryption Standard(DES) • DES Background • The Algorithm • Keylength Weakness • S-box Construction • Future of DES • Modes of Operation • Message Authentication Lecture six Advanced Encryption Standard AES • Rijndael • GF(256) • ByteSub • ShiftRow • MixColumn • Key Schedule • Decrypting Rijndael Lecture seven RSA Cryptography • RSA Cryptography: Motivation • RSA Cryptography: Mathematical Principles • RSA Cryptography: The Basic System • RSA Cryptography: Square and Multiply • RSA Cryptography: General Security • RSA Cryptography: The Factoring Problem • RSA Cryptography: Key Length and Complexity • RSA Cryptography: Digital Signatures • RSA Cryptography: Attacks • RSA Cryptography: Weak Message Attacks • RSA Cryptography: Short Exponent Attack • RSA Cryptography: Side Channel Attacks Lecture Eight • Key management • Key Establishment • Symmeric key approaches • Key distribution problem • Key distribution center protocols • Authenticated and key agreement protocols Lecture nine Digital Signatures & Authentication Protocols • Digital Signature Properties • Direct Digital Signatures • Arbitrated Digital Signatures • Authentication Protocols • Replay Attacks • Using Symmetric Encryption • Using Public-Key Encryption • One-Way AuthenticationUsing Public-Key Encryption • Digital Signature Algorithm (DSA) Lecture Ten • IT System Services Life cycle • Communication encryption encrypting communications channels Link –by- Link Encryption End-by End Encryption encrypting data for storage Lecture 11 • IP Security • Benefits of IPSec • IP Security architecture • IPSec Services • Key Management Oakley Protocol ISAKMP Protocol Lecture 12 • Electronic Mail Security • Pretty Good Privacy (PGP) • PGP Operation:Confidentiality & Authentication • PGP Operation – Compression • PGP Operation – Email Compatibility • PGP Message Format • PGP Key Management • S/MIME (Secure/Multipurpose Internet Mail Extensions) Lecture 13 • Secure Electronic Transaction • Credit Cards on the Internet • Credit Card Protocols • SET Business Requirements • SET Transactions • Key Technologies of SET • Dual Signature for SET • SET Supported Transactions Lecture 14 • The secure socket layer(SSL) Layer. • Location of SSL in the TCP/IP protocol stack. • SSL Phases Handshake protocol Record protocol Lecture 15 • Firewalls • What is a Firewall? • Classification of Firewall • Firewalls – Packet Filters • Firewall Gateways • Application-Level Filtering • Firewalls - Circuit Level Gateway • Dynamic Packet Filters • Distributed Firewalls .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    22 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us