Professional Documents
Culture Documents
Chapter 1
1. Elements of Information Security
2. Operational Model of Network Security
3. Security Attacks
Chapter 2
1. Encryption Methods
2. Substitution Ciphers and their types
3. Transposition Ciphers
4. Steganography
Chapter 3
1. Block Ciphers Modes of Operations
2. DES
3. Triple DES
Chapter 4
1. AES
2. Key Generation
3. Encryption and Decryption
Chapter 5
1. Blowfish Encryption Algorithm
2. RC5
3. RC4
4. RC6
5. Compare between RC6 and RC5
6. IDEA