Unit 5 | 33.Firewalls

                     Firewalls

Unit 5 | 32.Malicious software – viruses

                         Malicious software – viruses

Unit 5 | 31.SYSTEM SECURITY: Intruders

                     SYSTEM SECURITY: Intruders

Unit 5 | 30.Web Security

             SET

             SSL-TLS

Unit 5 | 29.IP security

            Overview of IP security        

             IP security with key management

Unit 5 | 28.PGP

                 PGP

Unit 5 | 27.Electronic Mail security

                 Electronic Mail security 

Unit 4 | 26.Authentication applications – Kerberos

             Kerberos

Unit 4 | 24.Digital signature and authentication protocols – DSS

             Digital Signature

Unit 4 | 22.Authentication requirement – Authentication function – MAC – Hash function

                 MAC

Unit 3 | 19.Diffie Hellman key exchange

                     Diffie Hellman key exchange 

Unit 3 | 18.ASYMMETRIC KEY CIPHERS: RSA cryptosystem

                 RSA Algorithm

Unit 3 | 17.Chinese Remainder Theorem

             Chinese Remainder Theorem 

Unit 3 | 16.Fermat and Euler's theorom

             Fermat‘s and Euler‘s Theorem

Unit 3 | 15.MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –Factorization

             primality Testing

Unit 2 | 12.Block cipher mode of operation

             Block Cipher mode of operation

Unit 2 | 12.Block cipher design principles

            

                 Block cipher design principles 

Unit 2 | 11.SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES

                 DES

Unit 2 | 10.Groups, Rings, Fields- Finite fields


                            Groups

                            Finite Fields

Unit 1 | 3. Model of network security – Security attacks, services and mechanisms – OSI security architecture

Model of network security – Security attacks, services and mechanisms – OSI security architecture  

Unit 1 | 7. Product Cipher

Product Cipher 

Unit 1 | 7. Cryptanalysis

Cryptanalysis 

Unit 1 | 6. Information theory

Information Theory 

Unit 1 | 5. Foundations of modern cryptography: perfect security

Foundations of modern cryptography: perfect security 

Unit 1 | 4. Classical Encryption Techniques

 Classical Encryption Techniques

Unit 2 RC4

Unit 2 RC4