Cryptographic Algorithms CST 393 KTU CS Honour Notes Semester V -Dr Binu V P
********************************************************
Module-1 (Introduction to the Concepts of Security)
Security Services
Security Mechanisms
Classical Encryption Techniques
Substitution Ciphers-Caesar Cipher
Poly Alphabetic Ciphers- Vigenere Cipher
Module-2 (Symmetric Key Crypto Systems)
Stream Cipher Vs Block CipherTraditional Block Cipher Structure- Fiestel Structure
Block Cipher Modes of Operation
Symmetric Key Distribution using Asymmetric Encryption
Distribution of Public Keys
X509 Certificates
Public Key Infrastructure - PKI
Updating, Storing and Backing Up Keys
Module-3 (Public Key Crypto Systems)
Principles of Public Key Crypto Systems
RSA Algorithm
Attack on RSA
Module-4 (Key Management)
Symmetric Key Distribution using Symmetric EncryptionSymmetric Key Distribution using Asymmetric Encryption
Distribution of Public Keys
X509 Certificates
Public Key Infrastructure - PKI
Updating, Storing and Backing Up Keys
Module – 5 (Authentication)
Authentication Requirements
Authentication Functions
Comments
Post a Comment