GATE ECE - Important Keywords

Network Services
Security Mechanisms
Security attacks
Open Systems Interconnection model
OSI security architecture
Network security model
security model
Classical Encryption techniques
Encryption techniques
Symmetric cipher model
transposition techniques
steganography
FINITE FIELDS AND NUMBER THEORY:
Groups
Rings
Fields
Modular arithmetic
Euclids algorithm
algorithm
Finite fields
Polynomial Arithmetic
Prime numbers
Fermats theorem
Eulers theorem
Testing for primality
primality Test
Chinese remainder theorem
remainder theorem
Discrete logarithms
logarithms
Data Encryption Standard
Encryption Standard
Block cipher principles
Block cipher principles
block cipher modes of operation
Advanced Encryption Standard
AES
Triple DES Blowfish RC5 algorithm
Blowfish
RC5 algorithm
Public key cryptography
cryptography
public key cryptosystems
cryptosystems
RSA algorithm
Key management
Diffie Hellman
Key exchange
Elliptic curve arithmetic
curve arithmetic
Arithmetic curve
Elliptic curve cryptography
curve cryptography
cryptography curve
Authentication requirement
Authentication function
MAC Hash function
hash function Secutity
MAC hash
Digest algorithm
Message Digest algorithm 5
MD5 hash
secure hash algorithm
SHA hash
Authentication Code
Hashed Message Authentication Code
HMAC hash
cipher based message authentication code
CMAC
message authentication code
Digital signature
signature
authentication protocols
protocols authentication
Decision support system
DSS
ELGamal and Schnorr signature
Authentication applications
Kerberos
X509 Authentication services
Authentication services
Internet Firewalls
Trusted System
Roles of Firewalls
Firewalls
Firewall related terminology
terminology in firewall
firewall terminology
Types of Firewalls
Firewalls types
Firewall designs
Secure Electronic Transaction
SET
Electronic Transaction
ECommerce Transactions
Transactions
Intruder
Intrusion detection system
detection system
Virus threats
Counter measures
Firewalls design principles
Trusted systems
cryptography and security in practical Implementation
practical Implementation
Email Security
Email Security Services
Security Services
Email attacks
keys privacy
source authentication
Message Integrity
Nonrepudiation
Pretty Good Privacys
PDP
Multipurpose Internet Mail Extensions
MIME
Mail Extensions
Internet Protocol
IP Security
Internet Protocol Security
IPSec IP
IPv6 Authentication Header
Authentication Header
Encapsulation Security Payload
ESP
Security Payload
Internet Key Exchange
IKE
Phases of IKE
Internet Security Association and Key Management Protocol
ISAKMP
Web Security
Secure Sockets Layer
SSL
Sockets Layer
Transport Layer Security
TLS
Security layer
computing the keys
keys computing
Key Management Protocol
Management Protocol
Key protocol
client authentication
public key infrastructure
PKI
key infrastructure
PKI as deployed by SSL
SSL Attacks fixed in v3
Secure Sockets Layer
SSL
Sockets Layer
Exportability
Encoding Secure Electronic Transaction
SET
Any Queries, please contact us @ 09677117110 or mail to NPTEL.Bodhbridge@btechguru.com
Distributed under Creative Commons Attribution-Share Alike - CC BY-SA.
Back to top
View Cart & Pay (0)