# Cryptography And Network Security

(CryptoSec.AB1.E1)/ISBN:978-1-64459-188-8

This course includes
Lessons
TestPrep
Hand-on Lab

Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.

#### Lessons

28+ Lessons | 130+ Quizzes | 201+ Flashcards | 201+ Glossary of terms

#### TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

#### Hand on lab

33+ LiveLab | 32+ Video tutorials | 44+ Minutes

# Here's what you will learn

### Lessons 1: Information and Network Security Concepts

• Cybersecurity, Information Security, and Network Security
• The OSI Security Architecture
• Security Attacks
• Security Services
• Security Mechanisms
•  Cryptography
• Network Security
• Trust and Trustworthiness
• Standards

### Lessons 2: Introduction to Number Theory

• Divisibility and The Division Algorithm
• The Euclidean Algorithm
• Modular Arithmetic
• Prime Numbers4
• Fermat’s and Euler’s Theorems
• Testing for Primality
• The Chinese Remainder Theorem
• Discrete Logarithms
• Appendix 2A: The Meaning of Mod

### Lessons 3: Classical Encryption Techniques

• Symmetric Cipher Model
• Substitution Techniques
• Transposition Techniques

### Lessons 4: Block Ciphers and the Data Encryption Standard

• The Data Encryption Standard
• A DES Example
• The Strength of DES
• Block Cipher Design Principles

### Lessons 5: Finite Fields

• Groups
• Rings
• Fields
• Finite Fields of the Form GF(p)
• Polynomial Arithmetic
• Finite Fields of the Form GF (2n)

### Lessons 6: Advanced Encryption Standard

• Finite Field Arithmetic
• AES Structure
• AES Transformation Functions
• AES Key Expansion
• An AES Example
• AES Implementation
• Appendix 6A: Polynomials with Coefficients in GF(28)

### Lessons 7: Block Cipher Operation

• Multiple Encryption and Triple DES
• Electronic CodeBook
• Cipher Block Chaining Mode
• Cipher Feedback Mode
• Output Feedback Mode
• Counter Mode
• XTS-AES Mode for Block-Oriented Storage Devices
• Format-Preserving Encryption

### Lessons 8: Random Bit Generation and Stream Ciphers

• Principles of Pseudorandom Number Generation
• Pseudorandom Number Generators
• Pseudorandom Number Generation Using a Block Cipher
• Stream Ciphers
• RC4
• Stream Ciphers Using Feedback Shift Registers
• True Random Number Generators

### Lessons 9: Public-Key Cryptography and RSA

• Principles of Public-Key Cryptosystems
• The RSA Algorithm

### Lessons 10: Other Public-Key Cryptosystems

• Diffie–Hellman Key Exchange
• Elgamal Cryptographic System
• Elliptic Curve Arithmetic
• Elliptic Curve Cryptography

### Lessons 11: Cryptographic Hash Functions

• Applications of Cryptographic Hash Functions
• Two Simple Hash Functions
• Requirements and Security
• Secure Hash Algorithm (SHA)
• SHA-3

### Lessons 12: Message Authentication Codes

• Message Authentication Requirements
• Message Authentication Functions
• Requirements for Message Authentication Codes
• Security of MACs
• MACs Based on Hash Functions: HMAC
• MACs Based on Block Ciphers: DAA and CMAC
• Authenticated Encryption: CCM and GCM
• Key Wrapping
• Pseudorandom Number Generation Using Hash Functions and MACs

### Lessons 13: Digital Signatures

• Digital Signatures
• Elgamal Digital Signature Scheme
• Schnorr Digital Signature Scheme
• Nist Digital Signature Algorithm
• Elliptic Curve Digital Signature Algorithm
• RSA-PSS Digital Signature Algorithm

### Lessons 14: Lightweight Cryptography and Post-Quantum Cryptography

• Lightweight Cryptography Concepts
• Lightweight Cryptographic Algorithms
• Post-Quantum Cryptography Concepts
• Post-Quantum Cryptographic Algorithms

### Lessons 15: Cryptographic Key Management and Distribution

• Symmetric Key Distribution Using Symmetric Encryption
• Symmetric Key Distribution Using Asymmetric Encryption
• Distribution of Public Keys
• X.509 Certificates
• Public-Key Infrastructure

### Lessons 16: User Authentication

• Remote User-Authentication Principles
• Remote User-Authentication Using Symmetric Encryption
• Kerberos
• Remote User-Authentication Using Asymmetric Encryption
• Federated Identity Management

### Lessons 17: Transport-Level Security

• Web Security Considerations
• Transport Layer Security
• HTTPS
• Secure Shell (SSH)

### Lessons 18: Wireless Network Security

• Wireless Security
• Mobile Device Security
• IEEE 802.11 Wireless LAN Overview
• IEEE 802.11i Wireless LAN Security

### Lessons 19: Electronic Mail Security

• Internet Mail Architecture
• Email Formats
• Email Threats and Comprehensive Email Security
• S/MIME
• DNSSEC
• DNS-Based Authentication of Named Entities
• Sender Policy Framework
• Domainkeys Identified Mail
• Domain-Based Message Authentication, Reporting, and Conformance

### Lessons 20: IP Security

• IP Security Overview
• IP Security Policy
• Combining Security Associations
• Internet Key Exchange

### Lessons 21: Network Endpoint Security

• Firewalls
• Intrusion Detection Systems
• Malicious Software
• Distributed Denial of Service Attacks

### Lessons 22: Cloud Security

• Cloud Computing
• Cloud Security Concepts
• Cloud Security Risks and Countermeasures
• Cloud Security as a Service
• An Open-Source Cloud Security Module

### Lessons 23: Internet of Things (IoT) Security

• The Internet of Things
• IoT Security Concepts and Objectives
• An Open-Source IoT Security Module

### Appendix A: Basic Concepts from Linear Algebra

• A.1 Operations on Vectors and Matrices
• A.2 Linear Algebra Operations Over Zn

### Appendix B: Measures of Secrecy and Security

• B.1 Conditional Probability
• B.2 Perfect Secrecy
• B.3 Information and Entropy
• B.4 Entropy and Secrecy
• B.5 Min-Entropy

### Appendix D: Simplified AES

• D.1 Overview
• D.2 S-AES Encryption and Decryption
• D.3 Key Expansion
• D.4 The S-box
• D.5 S-AES Structure

### Appendix E: Mathematical Basis of the Birthday Attack

• E.1 Related Problem
• E.3 Useful Inequality
• E.4 The General Case of Duplications
• E.5 Overlap Between Two Sets

# Hands-on LAB Activities

### Information and Network Security Concepts

• Obtaining Information about an IP Version
• Getting Information about the DNS
• Getting Information about the UDP Ports
• Getting Information about the Current Connection Statistics of UDP
• Getting the UDP Settings
• Getting Information about the TCP Ports
• Getting Information about the Current Connection Statistics of TCP
• Getting the TCP Settings
• Obtaining Information about the Net Firewall Profile
• Obtaining IP Route Information from the IP Routing Table

### Classical Encryption Techniques

• Using OWASP ZAP
• Performing Symmetric Encryption

• Encrypting a File or Folder
• Configuring File and Share Permissions
• Using BitLocker in Windows 10
• Configuring MDT
• Creating a New Partition and Configuring BitLocker
• Implementing AES Encryption

### Public-Key Cryptography and RSA

• Using OpenSSL to Create a Public/Private Key Pair
• Using the RSA Asymmetric Algorithm

### Cryptographic Hash Functions

• Installing Windows Server Backup and Performing Backup of a Folder
• Creating a Backup Schedule
• Creating a Backup Once
• Configuring RAID
• Configuring RAID 5
• Installing the Failover Cluster Feature
• Using the Dependency Viewer

### Cryptographic Key Management and Distribution

• Using Steganography
• Enabling a Keylogger in a Target Machine

### IP Security

• Adding Revision to the Revision History