Topics:
History, overview, and principles
Relevant tools, standards, and/or engineering constraints
Data security and integrity
Vulnerabilities and exploitation
Resource protection models
Secret and public key cryptography
Message authentication codes
Network and web security
Authentication
Trusted computing
Side-channel attacks
PPT of surveys of Impact and degree of severeness of following since inception to today: (Without definition )
Virus
Worm
Trap Doors
Logic Bombs
Mail Bombing
Zombie
Trojan Horse
Password Cracking
Denial of service attacks
Impersonation
Packet Replay
Packet Modification
Eavesdropping
Social Engineering
Intrusion Attacks
Network Spoofing
Presentation and Assigment Topics:
Efficient basic number-theoretic algorithms: greatest common divisor, multiplicative inverse mod n, and raising to powers mod n.
Public-key cryptosystem and Estimation of complexity of its security
cryptographic protocols
cryptographic primitives.
Fundamental ideas of public-key cryptography.
Working of AES and it's Varients
Public-key cryptography works.
Working and Use of private- and public-key algorithms.
Authentication protocols.
Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
capabilities and limitations of the means of cryptography that are conveniently available to the general public. More...
1.Introduction to Cryptography
Fundamental concepts of Information cryptologist, Symmetric Cryptography & Correctness Property ;Kerchof's Principle,One - Time Pad,,Secret Sharing,Perfect Cipher,Mono alphabetic Substitution Cipher,Lorenz Cipher Machine Modern Symmetric Ciphers.
2 Application of Symmetric Ciphers:
Application of Symmetric Ciphers,Generating Random Keys,Pseudo Random Number Generator (PRNG), Modes of Operation {Electronic Code book Mode (ECB), Cipher Block Chaining Mode (CBC),Counter Mode (CTR) , CBC versus CTR,Cipher Feedback Mode (CFB), Output Feedback Mode (OFB) ,CBC versus CFB, Parallel Decryption Modes}
Key,Size,Expected Safe time, Importance of delay between unsuccessful login, optimum key size Strong Passwords,Dictionary Attacks,Salted Password Scheme.Hash Chain, S/Key Password Scheme .
Symmetric key based algorithms( AES,IDEA,Twofish, Blowfish,RC6,3DES,DES) annd their Performance analysis
3 Key Distribution:Key Distribution
Network security: authentication, basics of public key and private key cryptography, digital signatures and certificates, firewalls