Information Security

Conventional Encryption

Conventional Encryption Model, Steganography, Classical Encryption Techniques

Conventional Encryption Techniques

Simplified Des, Block Cipher Principles, Data Encryption Standards, Differential And Linear Cryptography Principles, Block Cipher Design Principles, Modes Of Operations, Algorithms Like Triple Des, International Data Encryption Algo ithm, Blowfish, Rc5, Cast-128, Rc2, Characteristics Of Advanced Symmetrical Block Cipher, Issues Of Conventional Encryption Like Traffic Distribution, Random Number Generation, Key Distribution

Public Key Cryptography

Principles Of Public-Key Cryptography, RSA Algorithm, Key Management, Elliptic Curve Cryptography, Diffie-Hellman Key Exchange

Number Theory

Prime And Relative Prime Numbers, Modular Arithmetic, Euler’s Theorem, Euclid’s Algorithm, Discrete Logarithm Tics

Message Authentication And Hash Functions

Authentication Requirement, Functions, Message Authentication Code, Hash Functions,Security Of Hash Functions And Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm, Ripemd-160, Hmac

Introduction To E-Commerce

Introduction To E-Commerce, Transactions On E-Commerce, Requirement Of Security On E-Commerce

Network Security

Digital Signatures, Authentication Protocols, Digital Signature Standards, Application Authentication Techniques Like Kerberos, X.509 Directory Authentication Services, Active Directory Service Of Windows NT/Windows 2000

IP Security E-Mail Security

IP Security Overview, Architecture, Authentication Header, Encapsulation Security Payload, Combining Security Association, Key Management, Pretty Good Privacy, S/Mime And Types

Web Security

Web Security Requirement, SSL And Transport Layer Security, Secure Electronic Transactions, Firewall Design Principles, Trusted Systems