Security services (confidentiality, integrity, authentication, non-repudiation), Classical ciphers (Caesar, Vigenère, Playfair, Hill), Cryptanalysis techniques (frequency analysis, known-plaintext attacks), Block vs....
Security services (confidentiality, integrity, authentication, non-repudiation), Classical ciphers (Caesar, Vigenère, Playfair, Hill), Cryptanalysis techniques (frequency analysis, known-plaintext attacks), Block vs. stream ciphers, Shannon's principles of confusion and diffusion, Modes of block cipher operation (ECB, CBC, CFB, OFB, CTR), Initialization vectors and nonce usage.
Data Encryption Standard (DES) algorithm and cryptanalysis (differential, linear), Advanced Encryption Standard (AES) - Rijndael structure, S-boxes, key expansion, rounds structure, Block cipher modes security analysis, Key management challenges in symmetric cryptography, Key derivation functions and key stretching, Practical symmetric cipher selection criteria.
Modular arithmetic, prime generation, Fermat/Euler theorems, Greatest Common Divisor algorithms, RSA cryptosystem (key generation, encryption/decryption, security proofs), Diffie-Hellman key exchange and man-in-the-middle attacks, Digital Signature Algorithm (DSA), Elliptic Curve Cryptography (ECC) fundamentals and advantages over RSA.
Cryptographic hash function properties (collision resistance, preimage resistance), MD5 weaknesses and SHA-family algorithms, HMAC construction and security proofs, Message authentication codes (MACs), Digital signatures and non-repudiation, PKI concepts (certificates, CAs, CRLs), X.509 certificate format and validation.
Transport Layer Security (TLS/SSL) handshake and cipher suites, IPsec architecture (AH, ESP, IKE), VPN protocols and tunnel modes, Email security (PGP, S/MIME), Kerberos authentication and ticket granting, Common network attacks (MITM, replay, session hijacking), Secure protocol design principles and cryptographic agility.