Venue: SIC - 301, 3rd Floor, KR building, IITBombay
Timings:
Tuesday2:00pm - 3:25pm
Friday2:00pm - 3:25pm


Course Contents

The contents of the course are listed below.

  • Introduction
    • Cyber Attacks
    • Defense strategies and techniques

  • Computer Networking Primer
    • Introduction to LANs, IPv4, IPv6, ICMP, TCP/UDP, DNS, HTTP, etc.

  • Mathematical Background for Cryptography
    • Modulo Arithmetic
    • GCD (Euclids Algorithm)
    • Algebraic Structures (Groups)
    • Chinese Remainder Theorem

  • Basics of Cryptography
    • Elementary Ciphers (Substitution, Transposition and their Properties)

  • Secret Key Cryptography
    • DES (Data Encryption Standard)
    • MAC (Message Authentication Codes) and other applications
    • Attacks

  • Public Key Cryptography
    • RSA
    • Performance
    • Practical Issues
    • PKCS (Public Key Cryptography Standard)

  • Cryptographic Hash
    • Properties, Applications, Performance
    • Birthday Attack

  • Key Management
    • Digital Certificates
    • PKI (Public Key Infrastructure)

  • Authentication
    • One-Way Authentication
    • Mutual Authentication
    • Dictionary Attacks
    • Centralized Authentication
    • The Needham-Schroeder Protocol
    • Kerberos
  • Non-cryptographic Protocol Vulnerabilities
    • DoS and DDoS
    • Session Highjacking and Spoofing
    • ARP Spoofing and Attacks on DNS

  • Viruses, Worms, and other Malware
    • Virus and Worm Features
    • Internet Scanning Worms
    • Mobile Malware and Botnets

  • Access Control in Operating Systems
    • Discretionary Access Control
    • Mandatory Access Control
    • Role Based Access Control
    • SELinux and Recent Trends