INFORMATION SECURITY
CREDITS - 03
1.Introduction, CRYPTO BASICS : Classic Crypto, Simple Substitution Cipher,, Cryptanalysis of a simple substitution, Double Transposition Cipher, One time Pad, Project VENONA, Codebook Cipher.
2.SYMMETRIC KEY CRYPTO : Stream Ciphers, A5/1, RC4, B lock Ciphers, Fiestel Cipher, DES, Triple DES, AES.
3.PUBLIC KEY CRYPTO : Knapsack, RSA, Diffie Hellman, Uses for Public Key Crypto.
4.HASH FUNCTION :
AUTHENTICATION :Authentication Methods, Keys versus Passwords, Biometrics, Two Factor Authentication.
AUTHORIZATION :Access Control Matrix, Multilevel Security Models, Firewalls, Intrusion Detection.
5.SOFTWARE FLAWS AND MALWARE : Software Flaws, Malware, Miscellaneous Software Based Attacks.
6.OPERATING SYSTEM AND SECURITY : Operating System Security Functions, Trusted Operating System, Next Generation Secure Computing Base.
Reference Books :
1.Introduction to Computer Security by Bishop and Venkatramanayya, Pearson Education.
2. Cryptography and Network Security : Principles and Practice by Stallings, PHI.