Cryptography And Network Security

Strengthen your defenses against cyber attacks by learning cryptography and network security principles and practices.

(CryptoSec.AB2) / ISBN : 978-1-64459-605-0
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

We'll break down core network security and cryptography concepts, so you'll understand the foundations of securing information and networks. Uncover how secure communication protocols like TLS/SSL and SSH safeguard data transmission.  You’ll also learn how firewalls and intrusion detection systems work to identify and mitigate threats like DDoS attacks. In addition, explore security considerations of cloud computing and the Internet of Things (IoT) to gain strategies for securing these emerging technologies. Our hands-on virtual labs solidify your understanding of real-world tools for encryption and decryption, network security configuration, and implementing best practices.

Skills You’ll Get

  • Understand core cybersecurity concepts for securing information and networks.
  • Grasp the fundamentals of cryptography and explore various encryption methods.
  • Apply secure communication protocols like TLS/SSL and SSH to safeguard data transmission.
  • Mitigate security challenges specific to wireless networks and email communication.
  • Master essential network security tools and best practices, including firewalls and intrusion detection systems.
  • Navigate the security considerations of cloud computing and the Internet of Things (IoT).
  • Gain hands-on experience with real-world security tools through practical exercises.

1

Information and Network Security Concepts

  • Cybersecurity, Information Security, and Network Security
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  •  Cryptography
  • Network Security
  • Trust and Trustworthiness
  • Standards
2

Introduction to Number Theory

  • Divisibility and The Division Algorithm
  • The Euclidean Algorithm
  • Modular Arithmetic
  • Prime Numbers4
  • Fermat’s and Euler’s Theorems
  • Testing for Primality
  • The Chinese Remainder Theorem
  • Discrete Logarithms
  • Appendix 2A: The Meaning of Mod
3

Classical Encryption Techniques

  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques
4

Block Ciphers and the Data Encryption Standard

  • Traditional Block Cipher Structure
  • The Data Encryption Standard
  • A DES Example
  • The Strength of DES
  • Block Cipher Design Principles
5

Finite Fields

  • Groups
  • Rings
  • Fields
  • Finite Fields of the Form GF(p)
  • Polynomial Arithmetic
  • Finite Fields of the Form GF (2n)
6

Advanced Encryption Standard

  • Finite Field Arithmetic
  • AES Structure
  • AES Transformation Functions
  • AES Key Expansion
  • An AES Example
  • AES Implementation
  • Appendix 6A: Polynomials with Coefficients in GF(28)
7

Block Cipher Operation

  • Multiple Encryption and Triple DES
  • Electronic CodeBook
  • Cipher Block Chaining Mode
  • Cipher Feedback Mode
  • Output Feedback Mode
  • Counter Mode
  • XTS-AES Mode for Block-Oriented Storage Devices
  • Format-Preserving Encryption
8

Random Bit Generation and Stream Ciphers

  • Principles of Pseudorandom Number Generation
  • Pseudorandom Number Generators
  • Pseudorandom Number Generation Using a Block Cipher
  • Stream Ciphers
  • RC4
  • Stream Ciphers Using Feedback Shift Registers
  • True Random Number Generators
9

Public-Key Cryptography and RSA

  • Principles of Public-Key Cryptosystems
  • The RSA Algorithm
10

Other Public-Key Cryptosystems

  • Diffie–Hellman Key Exchange
  • Elgamal Cryptographic System
  • Elliptic Curve Arithmetic
  • Elliptic Curve Cryptography
11

Cryptographic Hash Functions

  • Applications of Cryptographic Hash Functions
  • Two Simple Hash Functions
  • Requirements and Security
  • Secure Hash Algorithm (SHA)
  • SHA-3
12

Message Authentication Codes

  • Message Authentication Requirements
  • Message Authentication Functions
  • Requirements for Message Authentication Codes
  • Security of MACs
  • MACs Based on Hash Functions: HMAC
  • MACs Based on Block Ciphers: DAA and CMAC
  • Authenticated Encryption: CCM and GCM
  • Key Wrapping
  • Pseudorandom Number Generation Using Hash Functions and MACs
13

Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
14

Lightweight Cryptography and Post-Quantum Cryptography

  • Lightweight Cryptography Concepts
  • Lightweight Cryptographic Algorithms
  • Post-Quantum Cryptography Concepts
  • Post-Quantum Cryptographic Algorithms
15

Cryptographic Key Management and Distribution

  • Symmetric Key Distribution Using Symmetric Encryption
  • Symmetric Key Distribution Using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure
16

User Authentication

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
17

Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
18

Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
19

Electronic Mail Security

  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
20

IP Security

  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
21

Network Endpoint Security

  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks
22

Cloud Security

  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module
23

Internet of Things (IoT) Security

  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module
A

Appendix A: Basic Concepts from Linear Algebra

  • A.1 Operations on Vectors and Matrices
  • A.2 Linear Algebra Operations Over Zn
B

Appendix B: Measures of Secrecy and Security

  • B.1 Conditional Probability
  • B.2 Perfect Secrecy
  • B.3 Information and Entropy
  • B.4 Entropy and Secrecy
  • B.5 Min-Entropy
C

Appendix C: Data Encryption Standard

D

Appendix D: Simplified AES

  • D.1 Overview
  • D.2 S-AES Encryption and Decryption
  • D.3 Key Expansion
  • D.4 The S-box
  • D.5 S-AES Structure
E

Appendix E: Mathematical Basis of the Birthday Attack

  • E.1 Related Problem
  • E.2 The Birthday Paradox
  • E.3 Useful Inequality
  • E.4 The General Case of Duplications
  • E.5 Overlap Between Two Sets

1

Classical Encryption Techniques

  • Performing Symmetric Encryption
  • Using Caesar Cipher
2

Block Ciphers and the Data Encryption Standard

  • Using DES
  • Using Advanced Encryption Standard
3

Block Cipher Operation

  • Using Triple DES
4

Public-Key Cryptography and RSA

  • Generating Cryptographic Keys
  • Examining Asymmetric Encryption
5

Other Public-Key Cryptosystems

  • Performing an MITM Attack
6

Cryptographic Hash Functions

  • Observing MD5 Hash Values
  • Understanding SHA Hash Algorithms
7

Digital Signatures

  • Using Digital Signature
8

Cryptographic Key Management and Distribution

  • Examining a Self-Signed Certificate
  • Examining PKI Certificates
9

User Authentication

  • Examining Kerberos Settings
10

Transport-Level Security

  • Analysing HTTPs for Network Security
  • Configuring an SSH Server
11

Electronic Mail Security

  • Exploiting SMTP
  • Configuring a DNS Server
12

IP Security

  • Configuring IPSec
13

Network Endpoint Security

  • Creating a Demilitarized Zone
  • Configuring a Firewall
  • Implementing Intrusion Detection and Prevention
  • Simulating a DoS Attack

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

In computer science, cryptography is the study and practice of maintaining secure communications using mathematical algorithms to disguise the message in the presence of threats.

Cryptography is important because it safeguards individuals and organizations against today’s cyber threats and information theft or loss.

Make Expert-Approved Cryptography and Network Security Notes

Learn advanced cryptography and network security techniques to disguise your sensitive information and fortify your organization’s defenses against notorious cyber attacks.  

$ 433.42

Buy Now
scroll to top