Cryptography and Network Security - Notes
Unit 1: Security Concepts and Cryptography Concepts and Techniques
- Introduction to security: Confidentiality, Integrity, Availability.
- Need for security: Protection against data breaches, loss, and unauthorized access.
- Security approaches: Layered security, risk management.
- Types of attacks: Passive (eavesdropping) and Active (modification, DoS).
- Security services: Authentication, Access Control, Data Integrity.
- Cryptography Techniques:
* Plain Text & Cipher Text
* Substitution Techniques: Caesar Cipher, Monoalphabetic Cipher
* Transposition Techniques: Columnar Transposition
* Symmetric Key Cryptography: Same key for encryption and decryption
* Asymmetric Key Cryptography: Public and private key pair (e.g., RSA)
* Steganography: Hiding information in images/texts
* Key size and range: Larger keys = stronger encryption
Unit 2: Symmetric and Asymmetric Key Ciphers
- Symmetric Key Ciphers:
* Block Cipher Principles
* DES (Data Encryption Standard)
* AES (Advanced Encryption Standard)
* RC5, RC4, Blowfish, IDEA: Various performance and complexity trade-offs.
- Asymmetric Key Ciphers:
* RSA: Based on factorization of large primes.
* ElGamal: Based on discrete logarithms.
Cryptography and Network Security - Notes
* Diffie-Hellman: Secure key exchange.
* Knapsack Algorithm: Based on NP-complete problems (less common today).
Unit 3: Cryptographic Hash Functions, Authentication Codes, Key Management
- Hash Functions: One-way functions, SHA-512 used for message digest.
- Message Authentication Codes:
* HMAC: Hash-based Message Authentication Code
* CMAC: Cipher-based Message Authentication Code
* Digital Signatures: Provide authentication and non-repudiation
- Key Management and Distribution:
* Symmetric and Asymmetric Encryption in key sharing
* Kerberos: Authentication protocol using tickets
* X.509: Certificate-based authentication
* PKI: Public Key Infrastructure used in digital certificates
Unit 4: Transport-level and Wireless Network Security
- Transport-level Security:
* SSL/TLS: Encrypts transport layer traffic
* HTTPS: Secure version of HTTP
* SSH: Secure terminal access over untrusted networks
- Wireless Network Security:
* Mobile Device Security
* IEEE 802.11: Wi-Fi security standards (WEP, WPA, WPA2)
* IEEE 802.11i: Enhanced wireless LAN security (includes AES encryption)
Cryptography and Network Security - Notes
Unit 5: E-Mail Security and Case Studies
- E-Mail Security:
* PGP: Pretty Good Privacy for encrypting emails
* S/MIME: Secure Multipurpose Internet Mail Extensions
* IP Security (IPSec): Secures IP communications through authentication headers and encapsulating
payloads.
* IKE: Internet Key Exchange for negotiating security associations.
- Case Studies:
* Secure Multiparty Computation: Ensures privacy in joint computations.
* Virtual Elections: Secure voting systems.
* Single Sign-On: Login once, access all services.
* Secure Transactions: Online payment security.
* Cross-site Scripting (XSS): Exploits injection flaws in websites.