Secure Network Communications

Tutorial

   Part I     Introduction to Cryptography

Contents: 

Recommended literature, basic definitions and terminology, Cryptanalysis: fundamental assumptions, types of attacks, redundancy/entropy of natural language texts, Shannon: principles of confusion and diffusion - substitution and transposition, perfect secrecy - one-time pads, Symmetric or secret-key cyptosystems: block ciphers, electronic code book mode (ECB), cipher block chaining mode (CBC), output feedback mode (OFB), popular block ciphers, digital encryption standard (DES), Feistel networks, advanced encryption standard (AES), stream ciphers (linear feedback registers, RC4).

Distribution Format:

 

   Part II    Public Key Cryptosystems

Contents: 

Secure key distribution problem, public key cryptography, mathematical operations in finite fields, RSA public key cryptosystem, RSA-155 challenge, RSA key generation, RSA encryption and decryption, efficient exponentiation of large numbers, how to find large prime numbers, Diffie-Hellman key-exchange algorithm.

Distribution Format:

 

   Part III   Authentication and Integrity

Contents: 

Message integrity, message digests, popular hash functions (MD5, SHA), keyed hash functions, message authentication codes (MACs), RSA digital signatures, forging documents, the birthday attack against hash functions, challenge/response authentication protocols, certificates, webs of trust, hierarchical chains of trust, X.509 certificate structure, handling by Netscape/Internet Explorer, public key infrastructure (PKI).

Distribution Format:

 

   Part IV  IP Security

Contents: 

Authentication header (AH), encapsulated security payload (ESP), virtual private networks (VPN), transport/tunnel mode, internet key exchange (IKE), Diffie-Hellman key-exchange, perfect forward secrecy, IKE main/quick mode, security associations, VPN products.

Distribution Format:

 

   Part V  Secure Network Applications

Contents: 

Secure e-mail (S/MIME): MIME multipart format, multipart/signed format, PKCS#7 format, mail signing/encryption. Secure sockets layer protocol (SSL): SSL record protocol layer, SSL handshake protocol, transport layer security protocol (TLS), implemented versions (SSL v.2, SSL v.3, TLS 1.0), SSL secured protocols (https, etc.).

Distribution Format:

 

   Part 6  The Elliptic Curve Cryptosystem

Contents: 

What are elliptic curves, what is an algebraic group, point addition and point doubling, 

Distribution Format:

 

 

This five-week course is currently held at the Zurich University of Applied Sciences in
Winterthur, Switzerland.

8.07.2002  info@strongsec.com Tutorials