Applied Cryptography: Course Outline
This course will focus on improving the security of the system using cryptography techniques. Cryptography is the core technology that lies behind the majority of technical security solutions that are currently available.
Course Outline
- Computer Security Concepts ,The OSI Security, Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security
- Symmetric Cipher Model, Substitution Techniques, Transposition Techniques
- Rotor Machines, Steganography
- Block Cipher Principles, The Data Encryption Standard (DES), A DES Example
- The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles
- The Origins AES, AES Structure, AES Round Functions
- Key Management
- AES Key Expansion, An AES Example, AES Implementation
- Multiple Encryption and Triple DES, Electronic Codebook Mode
- Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode
- Principles of Public-Key Cryptosystems, The RSA Algorithm
- Diffie-Hellman Key Exchange, ElGamal Cryptosystem
- Other IS Management Considerations-Implementing IS Management
- Elliptic Curve Arithmetic, Elliptic Curve Cryptography, Pseudorandom Number Generation Based on an Asymmetric Cipher
- Applications of Cryptographic Hash Functions, Two Simple Hash Functions, Requirements and Security
- Symmetric Key Distribution Using Symmetric Encryption and Asymmetric Encryption, Distribution of Public Keys, X.509 Certificates, Public Key Infrastructure
Reference Material
-
-
Cryptography and Network Security by
Call Number: 005.8 STAISBN: 9780136097044Publication Date: 2011 -
-
Cryptography and network security by
Call Number: 005.8 FORISBN: 9780070702080Publication Date: 2010
E-Books (Full Text)
-
by Bhattacharya, Bhargab B. Sur-Kolay, Susmita Nandy, Subhas C.
-
by R. Rowlingson, Robert
Date Published December 2011
Pages 134 -
by Nipkow, T. Grumberg, O. Hauptmann, B.
Date Published May 2012
Pages 396 -
by Jacobs, Jay Rudis, Bob
Date Published January 2014
Pages 353 -
by Shostack, Adam
Date Published February 2014
Pages 626