Introduction to simple Cryptosystems and their Cryptanalysis
Shift, Substitution, Affine, Vigenere, Hill, Permutation and stream ciphers.
Shannon’s Theory
Elementary Probability theory, entropy, perfect secrecy, unicity distance.
Block Ciphers and Advance Encryption Standard
Chaining; Substitution-permutation networks, Feistel networks; Linear cryptanalysis of an SPN.
Cryptographic hash functions
Security requirements, collisions; Security uses: passwords, message and data integrity, notaries; MD5, SHA; Message authentication codes; Birthday attack.
The RSA Cryptosystems
Primes, GCDs and the Extended Euclidean Algorithm, modular exponentiation and inverses, Euler totient function, Euler’s theorem, Introduction to public-key cryptography;
RSA: basic implementation details.
Digital signature schemes
E1Gamal, DSA; Elliptic Curve DSA; One-time Signatures, Undeniable Signatures Zero-Knowledge proofs, Bit communication; Pseudorandom number generation.
Network communication concepts.
Network overview, specific networking protocols, transmission media and networking hardware.
Optimizing and fine tuning for performance
Ways to speed up an existing server, Stress testing techniques. Threat of computer crimes.
Network security issues
Techniques to increase security, Internet related security issues.
Trouble shooting and preventive maintenance
Basic element of troubleshooting, hardware troubleshooting tools, Software troubleshooting tools, Diagnosing real world problems, Troubleshooting the physical network, Troubleshooting WANS.