Notes of cyber security fundamentals
Unit 1: Cyber Security Fundamentals
Symmetric Cipher model, Substitution techniques, Transposition techniques, Steganography, Block cipher principles, Data Encryption Standard, Confidentiality using symmetric encryption Potential locations for confidentiality attacks, Link versus End-to-End Encryption.
Unit 2: Cyber Security Fundamentals
Public key Cryptosystems Principles, applications and requirements, RSA algorithm Key Management Distribution of Public keys and Secret keys, Diffie-Hellman key exchange. Message Authentication Authentication requirements, Authentication Functions like Message Encryption, Message Authentication code and Hash Function. Requirement for a Hash function, simple hash function, Block chaining techniques, Brute-force attack.