You are on page 1of 1

Syllabus (Cryptography and Information Security)

1. Introduction to Information Security


2. Overview of Cryptography and Cryptanalysis
3. Ceaser Cipher
4. Monoalphabatic Cipher
5. Playfair Cipher
6. Hill Cipher
7. Vigenere Cipher
8. Vernam Cipher (One-time pad)
9. Transposition Cipher (Rail Fence, Single Column, and Double Column Ciphers)
10. Affine Cipher
11. Euclidean Method for Determining GCD (Integer and Polynomial Both)
12. Extended Euclidean Method for Determining Multiplicative Inverse (Integer and Polynomial Both)
13. Active and Passive Attacks
14. Block Cipher Vs. Stream Cipher
15. Feistel Cipher
16. Shannon’s S-P Networks (Diffusion and Confusion)
17. Simplified-DES, DES, 2DES and 3DES, Meet-in-Middle Attack in 2DES
18. Finite Field (Groups, Rings, Fields)
19. AES (AES Structure, AES Round Function, AES Key Expansion, AES Decryption, AES S-box Design)
20. Block Cipher Modes of Operations
21. Asymmetric or Public Key Cryptosystem with Suitable Diagrams
22. RSA Algorithm with Numerical
23. Diffie Hellman Key Exchange + El Gamal Cryptosystem with Numerical
24. MAC, CMAC and HMAC
25. Hashing Functions: MD5 and SHA-512, SHA-1
26. Digital Signature Algorithm (RSA Approach and Digital Signature Standard)
27. Euler Totient Function, and Fermat Little Theorem with Examples
28. Kerberos (An Authentication Application)
29. Intrusion Detection System
(NIDS & HIDS with Pros and Cons, Signature Based Detection Process, Anomaly Based Detection
Process)
30. IP Security (ESP and AH)
31. Secure Socket Layer (Open SSL)
32. Fundamentals of Firewall

You might also like