Chapter 1

Introduction and Classical Ciphers

Computer, information, and network security; cryptography; cryptosystem; classical ciphers; security threats and attacks.

Chapter 2

Symmetric Ciphers

Feistel structure; substitution-permutation networks; DES, Double DES, Triple DES; finite fields.

Chapter 3

Asymmetric Ciphers

Number theory, Fermat, Euler, primality testing, discrete log; RSA and public-key systems.

Chapter 4

Cryptographic Hash Functions and Digital Signatures

Message authentication; MAC; hash functions; digital signatures and applications.

Chapter 5

Authentication

Authentication systems; password-based methods; challenge-response; biometrics; Needham-Schroeder.

Chapter 6

Network Security and Public Key Infrastructure

Network security overview; X.509 certificates; PKI trust models; email security.

Chapter 7

Malicious Logic

Viruses, worms, Trojan horses, DoS; intrusion detection; intruder types.