Introduction to Computer Security: Basic Concepts – Threat Models- Common Security Goals. Cryptography and Cryptographic Protocols including Encryption, Authentication, Message Authentication Codes, Hash Functions, One-way Functions, Public-key Cryptography, Secure Channels, Zero Knowledge in Practice Cryptographic Protocols and their Integration into Distributed Systems and other Applications – Authentication: Overview – Requirements – Functions-Protocols – Applications –Kerberos – X.509 Directory Services.
Electronic Mail Security: Email Architecture – Security –Pretty Good Policy Variations – Operational Descriptions – PGP Session Keys Key Rings – Key management – Message Exchange formats – Trust Model – IP Security:Introduction to IP – IP security Overview- Pros and Cons – IP Sec Applications – IP Security Architecture – IPSec Services – Authentication Header -Encapsulating Security Payload –
IPSec Modes – Combining Security Associations – Key Management.
Web Security: Web Security Requirements- Secure Sockets Layer Objectives – Versions –Certificates – Protocols – Transport Level Security – Secure Electronic Transaction Entities –Certificates – DS Verification