design and analysis of algorithms

Computer Security and Cryptography - I

Course Description

The state of the art in cyber security, Vulnerabilities and Attacks, Defense Mechanisms, Guiding Principles of sound security practice.
Cryptography - symmetric versus asymmetric key encryption. Case studies - DES, RSA.
The cryptographic hash and its uses. Digital signatures, digital certificates and the Public Key Infrastructure. The discrete logarithm and its applications.
Basic authentication protocols. Needham-Schroeder and Kerberos protocols. Transport Layer Security (TLS/SSL).
Protocol vulnerabilities, ARP spoofing, Denial of service (DoS/DDoS) and pharming attacks.Application vulnerabilities, Buffer overflow, cross-site scripting and SQL injection attacks.
Malware case studies.Intrusion detection/prevention strategies.Different types and levels of Access Control, Firewalls.

Course Objective

The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography.

Ask a Question

My Questions

Comment