You are on page 1of 7

CRYPTOGRAPHY AND NETWORK

SECURITY PRINCIPLES AND PRACTICE


Lecture Notes, Study Materials and Important questions answers

Subject : CRYPTOGRAPHY AND NETWORK


SECURITY PRINCIPLES AND PRACTICE
Chapter 1 Overview
1. Concepts and Definition of Computer Security - Answer (click here)
2. The Challenges of Computer Security - Answer (click here)
3. The OSI Security Architecture - Answer (click here)
4. Security Attacks: Passive and Active Attacks - Answer (click here)
5. Security Services - Answer (click here)
6. Security Mechanisms - Answer (click here)
7. A Model For Network Security - Answer (click here)
8. Classical Encryption Techniques - Answer (click here)

PART ONE SYMMETRIC CIPHERS


Chapter 2 Classical Encryption Techniques
1. Symmetric Cipher Model - Answer (click here)
2. Substitution Techniques - Answer (click here)
3. Transposition Techniques - Answer (click here)
4. Rotor Machines - Answer (click here)
5. Steganography - Answer (click here)

Chapter 3 Block Ciphers and the Data Encryption Standard


1. Block Ciphers and the Data Encryption Standard - Answer (click here)
2. Block Cipher Principles - Answer (click here)
3. The Data Encryption Standard - Answer (click here)
4. A DES(Data Encryption Standard) Example - Answer (click here)
5. The Strength of DES(Data Encryption Standard) - Answer (click here)
6. Differential and Linear Cryptanalysis - Answer (click here)
7. Block Cipher Design Principles - Answer (click here)

Chapter 4 Basic Concepts in Number Theory and Finite Fields


1. Basic Concepts in Number Theory and Finite Fields - Answer (click here)
2. Divisibility and the Division Algorithm - Answer (click here)
3. The Euclidean Algorithm - Answer (click here)
4. Modular Arithmetic - Answer (click here)
5. Groups, Rings, and Fields - Answer (click here)
6. Finite Fields Of The Form GF(p) - Answer (click here)
7. Polynomial Arithmetic - Answer (click here)
8. Finite Fields of the Form GF(2n) - Answer (click here)

Chapter 5 Advanced Encryption Standard


1. Advanced Encryption Standard(AES) - Answer (click here)
2. Finite Field Arithmetic - Answer (click here)
3. AES(Advanced Encryption Standard) Structure - Answer (click here)
4. Advanced Encryption Standard(AES) Transformation Functions - Answer
(click here)
5. AES Key Expansion - Answer (click here)
6. An Advanced Encryption Standard(AES) Example - Answer (click here)
7. AES(Advanced Encryption Standard) Implementation - Answer (click here)

Chapter 6 Block Cipher Operation


1. Block Cipher Operation - Answer (click here)
2. Multiple Encryption and Triple DES(Data Encryption Standard) - Answer
(click here)
3. Electronic Code Book - Answer (click here)
4. Cipher Block Chaining(CBC) Mode - Answer (click here)
5. Cipher Feedback Mode - Answer (click here)
6. Output Feedback Mode - Answer (click here)
7. Counter Mode - Answer (click here)
8. XTS-AES Mode For Block-Oriented Storage Devices - Answer (click here)

Chapter 7 Pseudorandom Number Generation and Stream


Ciphers
1. Pseudorandom Number Generation and Stream Ciphers - Answer (click
here)
2. Principles of Pseudorandom Number Generation - Answer (click here)
3. Pseudorandom Number Generators - Answer (click here)
4. Pseudorandom Number Generation Using a Block Cipher - Answer (click
here)
5. Stream Ciphers - Answer (click here)
6. RC4 - Answer (click here)
7. True Random Number Generators - Answer (click here)

PART TWO ASYMMETRIC CIPHERS


Chapter 8 More Number Theory
1. Introduction to Number Theory - Answer (click here)
2. Prime Numbers - Answer (click here)
3. Fermat’s And Euler’s Theorems - Answer (click here)
4. Testing for Primality - Answer (click here)
5. The Chinese Remainder Theorem - Answer (click here)
6. Discrete Logarithms - Answer (click here)

Chapter 9 Public Key Cryptography and RSA


1. Public-Key Cryptography and RSA - Answer (click here)
2. Principles of Public-Key Cryptosystems and its Applications,
Requirements, Cryptanalysis - Answer (click here)
3. The RSA Algorithm - Answer (click here)
4. Description of the RSA Algorithm - Answer (click here)
5. The Security of RSA - Answer (click here)

Chapter 10 Other Public Key Cryptosystems


1. Other Public-Key Cryptosystems - Answer (click here)
2. Diffie-Hellman Key Exchange - Answer (click here)
3. Elgamal Cryptographic System - Answer (click here)
4. Elliptic Curve Arithmetic - Answer (click here)
5. Elliptic Curve Cryptography - Answer (click here)
6. Pseudorandom Number Generation Based on an Asymmetric Cipher -
Answer (click here)

PART THREE CRYPTOGRAPHIC DATA INTEGRITY


ALGORITHMS
Chapter 11 Cryptographic Hash Functions
1. Cryptographic Hash Functions - Answer (click here)
2. Applications of Cryptographic Hash Functions - Answer (click here)
3. Two Simple Hash Functions - Answer (click here)
4. Requirements and Security - Answer (click here)
5. Hash Functions Based on Cipher Block Chaining - Answer (click here)
6. Secure Hash Algorithm (SHA) - Answer (click here)
7. SHA-3 - Answer (click here)

Chapter 12 Message Authentication Codes


1. Message Authentication Codes - Answer (click here)
2. Message Authentication Requirements - Answer (click here)
3. Message Authentication Functions - Answer (click here)
4. Requirements For Message Authentication Codes - Answer (click here)
5. Security of MACS - Answer (click here)
6. MACS Based on Hash Functions: HMAC - Answer (click here)
7. MACS Based on Block Ciphers: DAA And CMAC - Answer (click here)
8. Authenticated Encryption: CCM and GCM - Answer (click here)
9. Pseudorandom Number Generation Using Hash Functions and MACS -
Answer (click here)

Chapter 13 Digital Signatures


1. Digital Signatures - Answer (click here)
2. Digital Signatures: Properties, Attacks and Forgeries - Answer (click here)
3. ELGAMAL Digital Signature Scheme - Answer (click here)
4. Schnorr Digital Signature Scheme - Answer (click here)
5. Digital Signature Standard - Answer (click here)

PART FOUR MUTUAL TRUST


Chapter 14 Key Management and Distribution
1. Key Management and Distribution - Answer (click here)
2. Symmetric Key Distribution Using Symmetric Encryption - Answer (click
here)
3. Symmetric Key Distribution Using Asymmetric Encryption - Answer
(click here)
4. Distribution of Public Keys - Answer (click here)
5. X.509 Certificates - Answer (click here)
6. Public-Key Infrastructure - Answer (click here)
Chapter 15 User Authentication Protocols
1. User Authentication - Answer (click here)
2. Remote User-Authentication Principles - Answer (click here)
3. Remote User-Authentication Using Symmetric Encryption - Answer (click
here)
4. Kerberos - Answer (click here)
5. Remote User Authentication Using Asymmetric Encryption - Answer
(click here)
6. Federated Identity Management - Answer (click here)

PART FIVE NETWORK AND INTERNET SECURITY


Chapter 16 Transport Level Security
1. Transport-Level Security - Answer (click here)
2. Web Security Considerations - Answer (click here)
3. Secure Socket Layer and Transport Layer Security - Answer (click here)
4. Transport Layer Security - Answer (click here)
5. HTTPS - Answer (click here)
6. Secure Shell (SSH) - Answer (click here)

Chapter 17 Wireless Network Security


1. Wireless Network Security - Answer (click here)
2. IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol
Architecture, Network Components - Answer (click here)
3. IEEE 802.11i Wireless LAN Security - Answer (click here)
4. Wireless Application Protocol Overview - Answer (click here)
5. Wireless Transport Layer Security - Answer (click here)
6. WAP End-to-End Security - Answer (click here)

Chapter 18 Electronic Mail Security


1. Electronic Mail Security - Answer (click here)
2. Pretty Good Privacy - Answer (click here)
3. S/MIME - Answer (click here)
4. DomainKeys Identified Mail - Answer (click here)

Chapter 19 IP Security
1. IP Security(IPsec) - Answer (click here)
2. IP Security Overview - Answer (click here)
3. IP Security Policy - Answer (click here)
4. Encapsulating Security Payload - Answer (click here)
5. Combining Security Associations - Answer (click here)
6. Internet Key Exchange - Answer (click here)
7. Cryptographic Suites - Answer (click here)

PART SIX SYSTEM SECURITY


Chapter 20 Intruders
1. Intruders - Answer (click here)
2. Intruders: Behavior Patterns and Techniques - Answer (click here)
3. Intrusion Detection - Answer (click here)
4. Password Management - Answer (click here)

Chapter 21 Malicious Software


1. Malicious Software - Answer (click here)
2. Types of Malicious Software - Answer (click here)
3. Computer Viruses: Nature, Classification, Virus Kits - Answer (click here)
4. Computer Virus Countermeasures - Answer (click here)
5. Computer or Network Worms - Answer (click here)
6. Distributed Denial of Service Attacks - Answer (click here)
7. Firewalls - Answer (click here)

Chapter 22 Firewalls
1. The Need for Firewalls - Answer (click here)
2. Firewall Characteristics and limitations - Answer (click here)
3. Types of Firewalls - Answer (click here)
4. Firewall Basing - Answer (click here)
5. Firewall Location and Configurations - Answer (click here)

PART SEVEN LEGAL AND ETHICAL ISSUES


Chapter 23 Legal and Ethical Issues
1. Legal And Ethical Aspects - Answer (click here)
2. Cybercrime and Computer Crime - Answer (click here)
3. Types of Computer Crime - Answer (click here)
4. Intellectual Property - Answer (click here)
5. Network and Computer Privacy - Answer (click here)
6. Ethical Issues - Network or Computer - Answer (click here)

You might also like