Network Security and Cryptography Notes Full
Network Security and Cryptography Notes Full
UNIT 1
- Security Attacks: Actions that compromise the security of information. Attacks are mainly categorized as:
- Passive Attacks: Aim to learn or make use of information without affecting system resources. Examples:
- Active Attacks: Involve modification of the data stream or creation of false statements. Examples: masquerade,
- Security Mechanisms: Tools and protocols that implement security services, like encryption, digital signatures,
firewalls, etc.
- Basic Techniques:
- Symmetric Encryption: Same key for encryption and decryption (e.g., DES).
3. Computational Complexity
4. Finite Fields
- A set with a finite number of elements where arithmetic operations are defined.
5. Number Theory
- Study of integers, especially prime numbers.
- Important concepts: modular arithmetic, Euclidean algorithm, Euler's theorem, Fermat's Little Theorem.
- DES: 64-bit block cipher using 56-bit keys and 16 rounds. Vulnerable to brute-force attacks.
- AES: Operates on 128-bit blocks using 128, 192, or 256-bit keys. Highly secure and fast.
- Uses public key for encryption and private key for decryption.
- Based on hard mathematical problems like integer factorization (RSA), discrete logarithms (ElGamal), or elliptic curves
(ECC).
- Uses XOR, modular addition, and multiplication to confuse and diffuse the data.
9. Strength of IDEA
11. Cryptanalysis
UNIT 2
2. DES
3. Triple DES
5. Attacks on Protocols
- Common in SSL/TLS.
9. Key Management
UNIT 3
3. Weak Authentication
5. Hash Functions
8. Authentication Applications
9. Kerberos
12. S/MIME
UNIT 4
1. System Security
4. Firewalls
5. Malicious Software
8. Trusted Systems
9. Virus Countermeasures