Network Security / Cryptography / Information Security


Unit – 1

Basic Terms of Network Security - Video Link | Blog Link

Network Security Model – Video Link | Blog Link

CIA Triangle (Security Services) – Video Link | Blog Link

Symmetric Cipher Model (Symmetric key cryptography) – Video Link | Blog Link

Asymmetric Cipher Model (Asymmetric key cryptography) – Video Link | Blog Link

Differentiate Symmetric and Asymmetric Key Cryptography – Video Link | Blog Link

Types of Attack: Blog Link

Active Attack – Video Link | Blog Link

Passive Attack – Video Link | Blog Link

Differentiate active attack and passive attack – Video Link | Blog Link

Substitution Cipher:

Caesar cipher – Video Link | Blog Link

Monoalphabetic Cipher – Video Link | Blog Link

Play fair cipher – Video Link | Blog Link

Vigenère Cipher (Polyalphabetic Cipher) – Video Link | Blog Link

One time pad cipher – Video Link | Blog Link

Hill Cipher – Video Link | Blog Link

Differentiate mono alphabetic and poly alphabetic cipher – Video Link | Blog Link

Transposition techniques:

Columnar Transposition Cipher – Video Link | Blog Link

Rail fence cipher (Zigzag Cipher) – Video Link | Blog Link

Differentiate Substitution cipher and Transposition cipher – Video Link | Blog Link

 

Unit – 2

Stream ciphers and Block ciphers – Video Link | Blog Link

Confusion & Diffusion (Frustrated Statistical Analysis or Claud Shannon Properties) – Video Link | Blog Link

Feistel Cipher Structure (to understand DES) – Video Link | Blog Link

Data Encryption Standard (DES) Algorithm – Video Link | Blog Link

DES Example using Animation – Video Link

Strength & Weakness of DES, Avalanche effect in DES – Video Link | Blog Link

Advanced Encryption Standard (AES) Algorithm with structure – Video Link | Blog Link

AES Introduction – Video Link | Blog Link

Plain text convert into 4x4 matrix in AES – Video Link | Blog Link

AES transformation function:

Sub Bytes – Video Link | Blog Link

Shift Rows – Video Link | Blog Link

Mix Column – Video Link | Blog Link

Add Round Key – Video Link | Blog Link

AES Example using Animation – Video Link

Key expansion in AES – Video Link | Blog Link

 

Unit – 3

Multiple encryptions in DES:

Double DES – Video Link | Blog Link

Triple DES – Video Link | Blog Link

Modes of operation in Block cipher & Applications of Block Cipher Modes – Video Link | Blog Link

Electronic Code Book (ECB Mode) – Video Link | Blog Link

Cipher Block Chaining Mode (CBC Mode) – Video Link | Blog Link

Cipher Feedback mode (CFB Mode) – Video Link | Blog Link

Output Feedback mode (OFB Mode) – Video Link | Blog Link

Counter mode (CTR Mode) – Video Link | Blog Link

 

Unit – 4

Public Key Cryptosystems with Applications – Video Link | Blog Link

Requirements and Cryptanalysis – Video Link | Blog Link

RSA algorithm (Explain with example step by step) – Video Link | Blog Link

Diffie-Hellman Key Exchange algorithm (Explain with example) – Video Link | Blog Link

Man-in-Middle attack in Diffie-Hellman – Video Link | Blog Link

Man-in-the Middle attack in DES – Video Link | Blog Link

 

Unit – 5

Introduction of Hash Function, Properties of Hash Function & Simple Hash Function – Video Link | Blog Link

Applications of Hash Function – Video Link | Blog Link

Requirement and Security of Hash Function – Video Link | Blog Link

Hash functions based on Cipher Block Chaining – Video Link | Blog Link

Secure Hash Algorithm (SHA-1) – Video Link | Blog Link

Message Digest (MD - 5) – Video Link | Blog Link

Difference between SHA 1 & MD 5 – Video Link | Blog Link

 

Unit – 6

Message Authentication Codes – Video Link | Blog Link

MAC based on Hash Functions (HMAC) – Video Link | Blog Link

MAC based on Block Ciphers – Video Link | Blog Link

Difference between hash function and MAC – Video Link | Blog Link

 

Unit – 7

Introduction of Digital Signature & its properties – Video Link | Blog Link

Digital Signature Requirements and security – Video Link | Blog Link

El Gamal & Schnorr Digital Signature Scheme – Video Link | Blog Link

Digital Signature Algorithm (Include RSA approach & Digital Signature Standard) – Video Link | Blog Link

 

Unit – 8

Key management and distribution – Video Link | Blog Link

Symmetric key distribution using symmetric Encryption – Video Link | Blog Link

Symmetric key distribution using asymmetric Encryption – Video Link | Blog Link

Distribution of public keys – Video Link | Blog Link

X.509 Certificate Format – Video Link | Blog Link

Obtain & Revoke X.509 Certificate – Video Link | Blog Link

Public key infrastructure (PKI) – Video Link | Blog Link

 

Unit – 9

Remote user authentication with symmetric encryption – Video Link | Blog Link

Kerberos Protocol terminology, requirement & working – Video Link | Blog Link

Kerberos Version 4 – Video Link | Blog Link

Kerberos Version 4 message exchange – Video Link | Blog Link

Kerberos Realm – Video Link | Blog Link

No comments:

Post a Comment