|
|
Venue: | SIC - 301, 3rd Floor, KR building, IITBombay
|
Timings: |
Tuesday | 2:00pm - 3:25pm |
Friday | 2:00pm - 3:25pm |
|
Course Contents
The contents of the course are listed below.
- Introduction
- Cyber Attacks
- Defense strategies and techniques
- Computer Networking Primer
- Introduction to LANs, IPv4, IPv6, ICMP, TCP/UDP, DNS, HTTP, etc.
- Mathematical Background for Cryptography
- Modulo Arithmetic
- GCD (Euclids Algorithm)
- Algebraic Structures (Groups)
- Chinese Remainder Theorem
- Basics of Cryptography
- Elementary Ciphers (Substitution, Transposition and their Properties)
- Secret Key Cryptography
- DES (Data Encryption Standard)
- MAC (Message Authentication Codes) and other applications
- Attacks
- Public Key Cryptography
- RSA
- Performance
- Practical Issues
- PKCS (Public Key Cryptography Standard)
- Cryptographic Hash
- Properties, Applications, Performance
- Birthday Attack
- Key Management
- Digital Certificates
- PKI (Public Key Infrastructure)
- Authentication
- One-Way Authentication
- Mutual Authentication
- Dictionary Attacks
- Centralized Authentication
- The Needham-Schroeder Protocol
- Kerberos
- Non-cryptographic Protocol Vulnerabilities
- DoS and DDoS
- Session Highjacking and Spoofing
- ARP Spoofing and Attacks on DNS
- Viruses, Worms, and other Malware
- Virus and Worm Features
- Internet Scanning Worms
- Mobile Malware and Botnets
- Access Control in Operating Systems
- Discretionary Access Control
- Mandatory Access Control
- Role Based Access Control
- SELinux and Recent Trends
|