KEMBAR78
Cryptography and Network Security Notes | PDF | Cryptography | Encryption
0% found this document useful (0 votes)
42 views3 pages

Cryptography and Network Security Notes

The document outlines key concepts in cryptography and network security, covering security principles, types of attacks, and various cryptographic techniques including symmetric and asymmetric key ciphers. It discusses hash functions, authentication codes, key management, and transport-level security protocols like SSL/TLS and HTTPS. Additionally, it addresses email security methods and presents case studies on secure multiparty computation, virtual elections, and online transaction security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views3 pages

Cryptography and Network Security Notes

The document outlines key concepts in cryptography and network security, covering security principles, types of attacks, and various cryptographic techniques including symmetric and asymmetric key ciphers. It discusses hash functions, authentication codes, key management, and transport-level security protocols like SSL/TLS and HTTPS. Additionally, it addresses email security methods and presents case studies on secure multiparty computation, virtual elections, and online transaction security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cryptography and Network Security - Notes

Unit 1: Security Concepts and Cryptography Concepts and Techniques

- Introduction to security: Confidentiality, Integrity, Availability.

- Need for security: Protection against data breaches, loss, and unauthorized access.

- Security approaches: Layered security, risk management.

- Types of attacks: Passive (eavesdropping) and Active (modification, DoS).

- Security services: Authentication, Access Control, Data Integrity.

- Cryptography Techniques:

* Plain Text & Cipher Text

* Substitution Techniques: Caesar Cipher, Monoalphabetic Cipher

* Transposition Techniques: Columnar Transposition

* Symmetric Key Cryptography: Same key for encryption and decryption

* Asymmetric Key Cryptography: Public and private key pair (e.g., RSA)

* Steganography: Hiding information in images/texts

* Key size and range: Larger keys = stronger encryption

Unit 2: Symmetric and Asymmetric Key Ciphers

- Symmetric Key Ciphers:

* Block Cipher Principles

* DES (Data Encryption Standard)

* AES (Advanced Encryption Standard)

* RC5, RC4, Blowfish, IDEA: Various performance and complexity trade-offs.

- Asymmetric Key Ciphers:

* RSA: Based on factorization of large primes.

* ElGamal: Based on discrete logarithms.


Cryptography and Network Security - Notes

* Diffie-Hellman: Secure key exchange.

* Knapsack Algorithm: Based on NP-complete problems (less common today).

Unit 3: Cryptographic Hash Functions, Authentication Codes, Key Management

- Hash Functions: One-way functions, SHA-512 used for message digest.

- Message Authentication Codes:

* HMAC: Hash-based Message Authentication Code

* CMAC: Cipher-based Message Authentication Code

* Digital Signatures: Provide authentication and non-repudiation

- Key Management and Distribution:

* Symmetric and Asymmetric Encryption in key sharing

* Kerberos: Authentication protocol using tickets

* X.509: Certificate-based authentication

* PKI: Public Key Infrastructure used in digital certificates

Unit 4: Transport-level and Wireless Network Security

- Transport-level Security:

* SSL/TLS: Encrypts transport layer traffic

* HTTPS: Secure version of HTTP

* SSH: Secure terminal access over untrusted networks

- Wireless Network Security:

* Mobile Device Security

* IEEE 802.11: Wi-Fi security standards (WEP, WPA, WPA2)

* IEEE 802.11i: Enhanced wireless LAN security (includes AES encryption)


Cryptography and Network Security - Notes

Unit 5: E-Mail Security and Case Studies

- E-Mail Security:

* PGP: Pretty Good Privacy for encrypting emails

* S/MIME: Secure Multipurpose Internet Mail Extensions

* IP Security (IPSec): Secures IP communications through authentication headers and encapsulating

payloads.

* IKE: Internet Key Exchange for negotiating security associations.

- Case Studies:

* Secure Multiparty Computation: Ensures privacy in joint computations.

* Virtual Elections: Secure voting systems.

* Single Sign-On: Login once, access all services.

* Secure Transactions: Online payment security.

* Cross-site Scripting (XSS): Exploits injection flaws in websites.

You might also like