Computer Security

Text Book

Computer Networks A Top-Down Approach. James F. Kurose and Keith W. Ross , 6th Edition.

Syllabus

WeekDateCovered TopicsComments
12/10Course organization 
216/10Definitions
Security Services
Security Mechanism
Terminology and Background
Basic Cryptographic Algorithms
Classical model of encryption
Modular Arithmetic
323/10
30/10
Greatest Common Divisor(GCD).
Least Common Multiple (LCM).
Multiplicative Inverse
The forms of Encryption
46/11 and 9/11Keyless Transposition Ciphers:
Keyless Transposition Ciphers:
Columnar Transposition Ciphers.
Substitution cipher
Monoalphabetic Ciphers.
723/11Additive Cipher
Caesar Cipher
Multiplicative Ciphers
52/11 and 9/11Affine Ciphers
Polyalphabetic Ciphers
Autokey Cipher
Playfair Key Matrix
67/12 and 14/12Hill Cipher
One-Time Pad
 
8-/- and -/-Stream cipher
Block ciphers
Ciphers vs. Block ciphers
97/3 and 13/3Encryption and Decryption with Stream Ciphers
Shift Register-Based Stream Ciphers
Linear Feedback Shift Registers (LFSR)
1021/3The Data Encryption Standard (DES) and Alternatives
Introduction to DES


1128/3AES 
1221/3
134/4
1411/4 and 18/4 
15 
16  

Leave a Reply

Your email address will not be published. Required fields are marked *

bookmark
required required
web