Introduction to Computer Security: Basic Concepts - Threat Models- Common Security Goals. Cryptography and Cryptographic Protocols including Encryption, Authentication, Message Authentication Codes, Hash Functions, One-way Functions, Public-key Cryptography, Secure Channels, Zero Knowledge in Practice Cryptographic Protocols and their Integration into Distributed Systems and other Applications - Authentication: Overview – Requirements - Functions-Protocols – Applications –Kerberos – X.509 Directory Services.
Electronic Mail Security: Email Architecture – Security –Pretty Good Policy Variations – Operational Descriptions – PGP Session Keys Key Rings – Key management – Message Exchange formats – Trust Model - IP Security:Introduction to IP - IP security Overview- Pros and Cons – IP Sec Applications – IP Security Architecture – IPSec Services - Authentication Header -Encapsulating Security Payload –
IPSec Modes - Combining Security Associations - Key Management.
Web Security: Web Security Requirements- Secure Sockets Layer Objectives – Versions –Certificates – Protocols – Transport Level Security - Secure Electronic Transaction Entities –Certificates – DS Verification