Network Security
☞ BASIC CONCEPTS☞ TYPES OF SECURITY ATTACKS
☞ SECURITY SERVICES
☞ SUBSTITUTION TECHNIQUES- Monoalphabetic and ceser cipher with example
☞ PLAYFAIR CIPHER WITH EXAMPLE (SUBSTITUTION TECHNIQUE)
☞ Substitution Techniques-Hill cipher
☞ Modes of operations
☞ Network Security- Feistel cipher/ strucutre
☞ DES (Data Encryption standard) ALGORITHM
☞ IDEA (International Data Encryption Standard)
☞ AES (ADVANCED ENCRYPTION STANDARD)
☞ BLOWFISH ALGORITHM
☞ CAST 128 ALGORITHM
☞ INTRODUCTION TO NUMBER THOERY
☞ FERMAT'S THEOREM WITH SOLVED EXAMPLES
☞ EULER'S THEOREM and EULER'S TOTIENT FUNCTION with examples
☞ CHINESE REMAINDER THEOREM WITH EXAMPLES
☞ Principles of public key cryptography
☞ RSA ALGORITHM
☞ DIFFIE HELLMAN KEY EXCHANGE
☞ ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE
☞ TYPES OF AUTHENTICATION
☞ SHA-512 (Cryptographic hash functions)