Knowledge of theoretical principles and technology of Network Security
Knowledge of cryptography principles and most important and used schemas
Knowledge of currently used security protocols
Knowledge of the technologies and algorithms need to most important network services linked to network security
Knowledge of the security design methods
Ability to correctly configure a network services using state of the art devices
The course is arranged into a series of lectures and some open discussions about the main topics.
Kerckoff, Security Attacks, Security Services, Security Mechanisms
Substitution Techniques, Transposition Techniques, Rotor Machines (Enigma)
Block Ciphers and the Data Encryption Standard: Block Cipher Principles, The Data Encryption Standard, The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles. The AES Cipher, Multiple Encryption and Triple DES 175
Block Cipher Modes of Operation, ECB, CBC, FCB, OFB, CTR
Stream Ciphers and RC4 189
Key Distribution Random Number Generation, Public-Key Encryption and Hash Functions
Public-Key Cryptography and RSA, Principles of Public-Key Cryptosystems, The RSA Algorithm
Key Management; Other Public-Key Cryptosystems, Diffie-Hellman Key Exchange
Message Authentication and Hash Functions, Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions
Digital Signatures and Authentication Protocols
Network Security Applications, Kerberos, Electronic Mail Security, Pretty Good Privacy, S/MIME
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload
Secure Socket Layer and Transport Layer Security
Viruses and Related Threats
Security Standards
Cryptography and Network Security,
William Stallings
Publisher: Prentice Hall