infyni

Cryptography & Network Security

Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries

Live Course

Duration: 12 Hours

Enrolled: 0

Offered by: infyni

Live Course
$22 50% off

$11

Coming Soon Notify Me

About Course

Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. We normally refer cryptography to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations from algorithms to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation and digital signing and verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

  • Topics
  • Instructor
  • Security trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security. Classical Encryption Techniques , Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor Machines, Steganography. Block Ciphers and the Data Encryption Standard: Block Cipher Principles, The Data Encryption Standard (DES), The Strength of DES, Symmetric Ciphers (continued): Basic Concepts in Number Theory and Finite Fields: Groups, Rings, and Fields, Modular Arithmetic,The Origins AES, Evaluation criteria for AES, the AES Cipher. Stream cipher: Stream ciphers and RC4. Confidentiality Placement of encryption function, traffic confidentiality, key distribution.
  • Kerberos, X.509 Authentication services, Public key infrastructure. Electronic mail security: PGP, S/MIME. Overview of IP Security. Web Security: Web security considerations, SSL and TLS, Secure electronic transaction. System Security, Intruders, Intrusion detection, password management, viruses and related threats, virus countermeasures, Firewall design principles, and trusted systems.