Firewalls
Malicious software – viruses
SYSTEM SECURITY: Intruders
SET
SSL-TLS
Overview of IP security
IP security with key management
PGP
Electronic Mail security
Kerberos
Digital Signature
MAC
Diffie Hellman key exchange
RSA Algorithm
Chinese Remainder Theorem
Fermat‘s and Euler‘s Theorem
primality Testing
Block Cipher mode of operation
Block cipher design principles
DES
Groups
Finite Fields
Model of network security – Security attacks, services and mechanisms – OSI security architecture
Product Cipher
Cryptanalysis
Information Theory
Foundations of modern cryptography: perfect security
Classical Encryption Techniques
Unit 2 RC4