Cryptography and Network Security

  1. Digital Signatures and Authentication Protocols
    1. Digital Signatures
      1. Properties of Digital Signatures
        1. Authentication
          1. Signer Identity Verification
          2. Integrity
            1. Message Integrity Assurance
            2. Non-repudiation
              1. Undeniable Proof
            3. Digital Signature Schemes
              1. Signature Generation
                1. Private Key Usage
                  1. Message Processing
                  2. Signature Verification
                    1. Public Key Usage
                      1. Verification Algorithm
                    2. Security Requirements
                      1. Existential Unforgeability
                        1. Chosen Message Attacks
                          1. Adaptive Attacks
                          2. The Digital Signature Standard (DSS)
                            1. Digital Signature Algorithm (DSA)
                              1. Parameter Generation
                                1. Prime Selection
                                  1. Generator Selection
                                  2. Key Generation
                                    1. Private Key Selection
                                      1. Public Key Computation
                                      2. Signing Process
                                        1. Random Number Generation
                                          1. Signature Computation
                                          2. Verification Process
                                            1. Signature Validation
                                          3. Elliptic Curve DSA (ECDSA)
                                            1. Elliptic Curve Parameters
                                              1. Key Generation
                                                1. Signing and Verification
                                              2. RSA Signatures
                                                1. RSA-PSS
                                                  1. Probabilistic Signature Scheme
                                                    1. Salt Generation
                                                    2. PKCS#1 v1.5 Signatures
                                                      1. Deterministic Padding
                                                        1. Security Considerations
                                                    3. Public Key Infrastructure (PKI)
                                                      1. PKI Components
                                                        1. Certificate Authorities
                                                          1. Registration Authorities
                                                            1. Certificate Repositories
                                                              1. Certificate Revocation Systems
                                                              2. Digital Certificates
                                                                1. X.509 Certificate Standard
                                                                  1. Certificate Structure
                                                                    1. Version
                                                                      1. Serial Number
                                                                        1. Signature Algorithm
                                                                          1. Issuer
                                                                            1. Validity Period
                                                                              1. Subject
                                                                                1. Subject Public Key Info
                                                                                  1. Extensions
                                                                                  2. Certificate Fields
                                                                                    1. Mandatory Fields
                                                                                      1. Optional Fields
                                                                                        1. Extension Fields
                                                                                      2. Certificate Types
                                                                                        1. End Entity Certificates
                                                                                          1. CA Certificates
                                                                                            1. Cross-certificates
                                                                                          2. Certificate Authorities (CAs)
                                                                                            1. CA Hierarchy
                                                                                              1. Root CAs
                                                                                                1. Intermediate CAs
                                                                                                  1. Subordinate CAs
                                                                                                  2. Role and Responsibilities
                                                                                                    1. Identity Verification
                                                                                                      1. Certificate Issuance
                                                                                                        1. Certificate Management
                                                                                                        2. Certificate Issuance Process
                                                                                                          1. Certificate Request
                                                                                                            1. Identity Verification
                                                                                                              1. Certificate Generation
                                                                                                                1. Certificate Distribution
                                                                                                              2. Certificate Revocation
                                                                                                                1. Revocation Reasons
                                                                                                                  1. Key Compromise
                                                                                                                    1. CA Compromise
                                                                                                                      1. Affiliation Changed
                                                                                                                        1. Superseded
                                                                                                                        2. Certificate Revocation Lists (CRLs)
                                                                                                                          1. CRL Structure
                                                                                                                            1. CRL Distribution
                                                                                                                              1. CRL Processing
                                                                                                                              2. Online Certificate Status Protocol (OCSP)
                                                                                                                                1. OCSP Request/Response
                                                                                                                                  1. Real-time Status Checking
                                                                                                                                    1. OCSP Stapling
                                                                                                                                  2. Trust Models
                                                                                                                                    1. Hierarchical Trust Model
                                                                                                                                      1. Web of Trust Model
                                                                                                                                        1. Hybrid Trust Models
                                                                                                                                      2. Entity Authentication
                                                                                                                                        1. Authentication Factors
                                                                                                                                          1. Something You Know
                                                                                                                                            1. Something You Have
                                                                                                                                              1. Something You Are
                                                                                                                                              2. Authentication Protocols
                                                                                                                                                1. Challenge-Response Protocols
                                                                                                                                                  1. Nonce-based Challenges
                                                                                                                                                    1. Timestamp-based Protocols
                                                                                                                                                    2. Mutual Authentication
                                                                                                                                                      1. Bidirectional Verification
                                                                                                                                                        1. Protocol Examples
                                                                                                                                                        2. One-Way Authentication
                                                                                                                                                          1. Unidirectional Verification
                                                                                                                                                            1. Use Cases
                                                                                                                                                          2. Kerberos
                                                                                                                                                            1. Kerberos Architecture
                                                                                                                                                              1. Authentication Server
                                                                                                                                                                1. Ticket Granting Server
                                                                                                                                                                  1. Service Servers
                                                                                                                                                                  2. Kerberos Protocol Overview
                                                                                                                                                                    1. Initial Authentication
                                                                                                                                                                      1. Ticket Granting
                                                                                                                                                                        1. Service Access
                                                                                                                                                                        2. Ticket Granting System
                                                                                                                                                                          1. Ticket Structure
                                                                                                                                                                            1. Ticket Lifetime
                                                                                                                                                                              1. Ticket Renewal
                                                                                                                                                                              2. Security Features
                                                                                                                                                                                1. Mutual Authentication
                                                                                                                                                                                  1. Single Sign-On
                                                                                                                                                                                    1. Replay Protection
                                                                                                                                                                                    2. Kerberos Versions
                                                                                                                                                                                      1. Kerberos v4
                                                                                                                                                                                        1. Kerberos v5
                                                                                                                                                                                          1. Security Improvements