OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, Model forNetwork Security.
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques
Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles andModes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, DataStructure, Encryption Round.
Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Keyexchange
Authentication Requirement, Authentication Functions, Message Authentication Code, HashFunctions, Digital Signatures, Digital Signature Standard
Kerberos, X.509 Authentication Service
Pretty Good Privacy (PGP), S/MIME
IP Security Overview; IP Security Architecture; Authentication Header; Encapsulating SecurityPayload; Combining Security Associations; Key Management.
Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS);Secure Electronic Transaction (SET)
Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewalland Firewall Configuration