Tuesday, 8 May 2018

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE - Lecture Notes, Study Materials and Important questions answers



CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE
- Lecture Notes, Study Materials and Important questions answers




Subject : CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE

Chapter 1 Overview

  1. Concepts and Definition of Computer Security - Answer (click here)
  2. The Challenges of Computer Security - Answer (click here)
  3. The OSI Security Architecture - Answer (click here)
  4. Security Attacks: Passive and Active Attacks - Answer (click here)
  5. Security Services - Answer (click here)
  6. Security Mechanisms - Answer (click here)
  7. A Model For Network Security - Answer (click here)
  8. Classical Encryption Techniques - Answer (click here)

PART ONE SYMMETRIC CIPHERS

Chapter 2 Classical Encryption Techniques

  1. Symmetric Cipher Model - Answer (click here)
  2. Substitution Techniques - Answer (click here)
  3. Transposition Techniques - Answer (click here)
  4. Rotor Machines - Answer (click here)
  5. Steganography - Answer (click here)

Chapter 3 Block Ciphers and the Data Encryption Standard

  1. Block Ciphers and the Data Encryption Standard - Answer (click here)
  2. Block Cipher Principles - Answer (click here)
  3. The Data Encryption Standard - Answer (click here)
  4. A DES(Data Encryption Standard) Example - Answer (click here)
  5. The Strength of DES(Data Encryption Standard) - Answer (click here)
  6. Differential and Linear Cryptanalysis - Answer (click here)
  7. Block Cipher Design Principles - Answer (click here)

Chapter 4 Basic Concepts in Number Theory and Finite Fields

  1. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
  2. Divisibility and the Division Algorithm - Answer (click here)
  3. The Euclidean Algorithm - Answer (click here)
  4. Modular Arithmetic - Answer (click here)
  5. Groups, Rings, and Fields - Answer (click here)
  6. Finite Fields Of The Form GF(p) - Answer (click here)
  7. Polynomial Arithmetic - Answer (click here)
  8. Finite Fields of the Form GF(2n) - Answer (click here)

Chapter 5 Advanced Encryption Standard

  1. Advanced Encryption Standard(AES) - Answer (click here)
  2. Finite Field Arithmetic - Answer (click here)
  3. AES(Advanced Encryption Standard) Structure - Answer (click here)
  4. Advanced Encryption Standard(AES) Transformation Functions - Answer (click here)
  5. AES Key Expansion - Answer (click here)
  6. An Advanced Encryption Standard(AES) Example - Answer (click here)
  7. AES(Advanced Encryption Standard) Implementation - Answer (click here)

Chapter 6 Block Cipher Operation

  1. Block Cipher Operation - Answer (click here)
  2. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer (click here)
  3. Electronic Code Book - Answer (click here)
  4. Cipher Block Chaining(CBC) Mode - Answer (click here)
  5. Cipher Feedback Mode - Answer (click here)
  6. Output Feedback Mode - Answer (click here)
  7. Counter Mode - Answer (click here)
  8. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)

Chapter 7 Pseudorandom Number Generation and Stream Ciphers

  1. Pseudorandom Number Generation and Stream Ciphers - Answer (click here)
  2. Principles of Pseudorandom Number Generation - Answer (click here)
  3. Pseudorandom Number Generators - Answer (click here)
  4. Pseudorandom Number Generation Using a Block Cipher - Answer (click here)
  5. Stream Ciphers - Answer (click here)
  6. RC4 - Answer (click here)
  7. True Random Number Generators - Answer (click here)

PART TWO ASYMMETRIC CIPHERS

Chapter 8 More Number Theory

  1. Introduction to Number Theory - Answer (click here)
  2. Prime Numbers - Answer (click here)
  3. Fermat’s And Euler’s Theorems - Answer (click here)
  4. Testing for Primality - Answer (click here)
  5. The Chinese Remainder Theorem - Answer (click here)
  6. Discrete Logarithms - Answer (click here)

Chapter 9 Public Key Cryptography and RSA

  1. Public-Key Cryptography and RSA - Answer (click here)
  2. Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis - Answer (click here)
  3. The RSA Algorithm - Answer (click here)
  4. Description of the RSA Algorithm - Answer (click here)
  5. The Security of RSA - Answer (click here)

Chapter 10 Other Public Key Cryptosystems

  1. Other Public-Key Cryptosystems - Answer (click here)
  2. Diffie-Hellman Key Exchange - Answer (click here)
  3. Elgamal Cryptographic System - Answer (click here)
  4. Elliptic Curve Arithmetic - Answer (click here)
  5. Elliptic Curve Cryptography - Answer (click here)
  6. Pseudorandom Number Generation Based on an Asymmetric Cipher - Answer (click here)

PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 Cryptographic Hash Functions

  1. Cryptographic Hash Functions - Answer (click here)
  2. Applications of Cryptographic Hash Functions - Answer (click here)
  3. Two Simple Hash Functions - Answer (click here)
  4. Requirements and Security - Answer (click here)
  5. Hash Functions Based on Cipher Block Chaining - Answer (click here)
  6. Secure Hash Algorithm (SHA) - Answer (click here)
  7. SHA-3 - Answer (click here)

Chapter 12 Message Authentication Codes

  1. Message Authentication Codes - Answer (click here)
  2. Message Authentication Requirements - Answer (click here)
  3. Message Authentication Functions - Answer (click here)
  4. Requirements For Message Authentication Codes - Answer (click here)
  5. Security of MACS - Answer (click here)
  6. MACS Based on Hash Functions: HMAC - Answer (click here)
  7. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
  8. Authenticated Encryption: CCM and GCM - Answer (click here)
  9. Pseudorandom Number Generation Using Hash Functions and MACS - Answer (click here)

Chapter 13 Digital Signatures

  1. Digital Signatures - Answer (click here)
  2. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
  3. ELGAMAL Digital Signature Scheme - Answer (click here)
  4. Schnorr Digital Signature Scheme - Answer (click here)
  5. Digital Signature Standard - Answer (click here)

PART FOUR MUTUAL TRUST

Chapter 14 Key Management and Distribution

  1. Key Management and Distribution - Answer (click here)
  2. Symmetric Key Distribution Using Symmetric Encryption - Answer (click here)
  3. Symmetric Key Distribution Using Asymmetric Encryption - Answer (click here)
  4. Distribution of Public Keys - Answer (click here)
  5. X.509 Certificates - Answer (click here)
  6. Public-Key Infrastructure - Answer (click here)

Chapter 15 User Authentication Protocols

  1. User Authentication - Answer (click here)
  2. Remote User-Authentication Principles - Answer (click here)
  3. Remote User-Authentication Using Symmetric Encryption - Answer (click here)
  4. Kerberos - Answer (click here)
  5. Remote User Authentication Using Asymmetric Encryption - Answer (click here)
  6. Federated Identity Management - Answer (click here)

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 Transport Level Security

  1. Transport-Level Security - Answer (click here)
  2. Web Security Considerations - Answer (click here)
  3. Secure Socket Layer and Transport Layer Security - Answer (click here)
  4. Transport Layer Security - Answer (click here)
  5. HTTPS - Answer (click here)
  6. Secure Shell (SSH) - Answer (click here)

Chapter 17 Wireless Network Security

    1. Wireless Network Security - Answer (click here)
    2. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components - Answer (click here)
    3. IEEE 802.11i Wireless LAN Security - Answer (click here)
    4. Wireless Application Protocol Overview - Answer (click here)
    5. Wireless Transport Layer Security - Answer (click here)
    6. WAP End-to-End Security - Answer (click here)

    Chapter 18 Electronic Mail Security

    1. Electronic Mail Security - Answer (click here)
    2. Pretty Good Privacy - Answer (click here)
    3. S/MIME - Answer (click here)
    4. DomainKeys Identified Mail - Answer (click here)

    Chapter 19 IP Security

    1. IP Security(IPsec) - Answer (click here)
    2. IP Security Overview - Answer (click here)
    3. IP Security Policy - Answer (click here)
    4. Encapsulating Security Payload - Answer (click here)
    5. Combining Security Associations - Answer (click here)
    6. Internet Key Exchange - Answer (click here)
    7. Cryptographic Suites - Answer (click here)

    PART SIX SYSTEM SECURITY

    Chapter 20 Intruders

    1. Intruders - Answer (click here)
    2. Intruders: Behavior Patterns and Techniques - Answer (click here)
    3. Intrusion Detection - Answer (click here)
    4. Password Management - Answer (click here)

    Chapter 21 Malicious Software

    1. Malicious Software - Answer (click here)
    2. Types of Malicious Software - Answer (click here)
    3. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
    4. Computer Virus Countermeasures - Answer (click here)
    5. Computer or Network Worms - Answer (click here)
    6. Distributed Denial of Service Attacks - Answer (click here)
    7. Firewalls - Answer (click here)

    Chapter 22 Firewalls

    1. The Need for Firewalls - Answer (click here)
    2. Firewall Characteristics and limitations - Answer (click here)
    3. Types of Firewalls - Answer (click here)
    4. Firewall Basing - Answer (click here)
    5. Firewall Location and Configurations - Answer (click here)

    PART SEVEN LEGAL AND ETHICAL ISSUES

    Chapter 23 Legal and Ethical Issues

    1. Legal And Ethical Aspects - Answer (click here)
    2. Cybercrime and Computer Crime - Answer (click here)
    3. Types of Computer Crime - Answer (click here)
    4. Intellectual Property - Answer (click here)
    5. Network and Computer Privacy - Answer (click here)
    6. Ethical Issues - Network or Computer - Answer (click here)

    No comments:

    Post a Comment