Introduction to Cyber Security - Types of Attacks, Goals for Security, Security threat and vulnerability, Cyber security models (the CIA triad, the star model). Classical encryption techniques substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block ciphers - Modern Block Ciphers: Block ciphers principles, Shannon’s theory of confusion and diffusion. Data encryption standard (DES), Strength of DES, Idea of differential cryptanalysis, block cipher modes of operations.
Principals of public key crypto systems, RSA algorithm, security of RSA. Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange, Public key distribution, Introduction to SSL.
Message Authentication Codes: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions,
Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm.
Introduction to Cyber Crime and security: Cyber Crimes, types of Cyber Crime, hacking, attack vectors, Cross Site Scripting (XSS), XSS Consequences. Cyber Space and criminal behaviour, traditional problems associated with Cyber Crime, Introduction to Incident Response, Digital Forensics - Phishing.