![]() ![]() Cryptography and Network Security, Behrouz A. ![]() Cryptography and Network Security, William Stalling, Pearson Education, 2003.ġ. 7 Hrsįirewalls Design Principles, Trusted Systems. MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. ![]() Intruders, Intrusion Detection, Password Management. Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrsĭigital signatures, Authentication Protocols, Digital Signature Standard. Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. Services, mechanisms and attacks, The OSI security architecture, A model for network security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |