Module 1: 10 hours
A model for Network Security, Classical encryption techniques: Symmetric cipher model, Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polyalphabetic Ciphers, One time pad, Steganography
Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design principles
Text book 1:
Chapter 1: 1.8 Chapter 3: 3.1, 3.2, 3.5 Chapter 4: 4.1, 4.2, 4.3, 4.4, 4.5
Module 2: 10 hours
Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub Generator
Public key cryptography and RSA: Principles of public key cryptosystems-Public key cryptosystems, Applications for public key cryptosystems, Requirements for public key cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm, Computational aspects, The Security of RSA
Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic Curve Encryption/Decryption, Security of Elliptic Curve Cryptography
Text book 1:
Chapter 8: 8.2 Chapter 9: 9.1, 9.2 Chapter 10: 10.1, 10.4
Module 3: 10 hours
Key management fundamentals, Key lengths and lifetimes, Key generation, Key establishment, Key storage, Key usage, Governing key management.
Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key management models, Alternative approaches.
Text book 2:
Chapter 10, Chapter 11
Module 4: 10 hours
Web security consideration, Transport layer security.
IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload, Combining security associations, Internet key exchange.
Text book1:
Chapter 17: 17.1, 17.2 Chapter 20: 20.1, 20.2, 20.3 20.4, 20.5
Module 5: 10 hours
Data Security: Data hiding in Text-Basic features, Applications of data hiding, Watermarking, Intuitive Methods, Simple Digital methods, Data hiding in Text, Innocuous Text, Mimic Functions.
Data hiding in Images: LSB encoding, BPCS Steganography, Lossless data hiding
Textbook 3:
Chapter 10: 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7, 10.8
Chapter 11: 11.1, 11.2, 11.3