This chapter covers about the application security practices that should be applied in verification and deployment phase.
6 posts tagged with "20CS54I"
View All TagsChapter 05 - 20CS54I
This chapter covers SDLC, SSDLC, life cycle models, Microsoft's practices in accordance to SSDLC, and security requirements in software development, also covers Threat modeling.
Chapter 03 - 20CS54I
Please note that all my notes are referenced from my college notes. As a result, you might find them a little confusing in terms of their order. However, this is intentional to maintain consistency with the notes provided by the college.
Diffie Hellman Key Exchange
This is a cryptographic key exchange algorithm that is used to securely trasmit a shared secret key between two parties over a insecure channel This is not a cipher
OSI Model - A High Level Overview
OSI stands for Open system interconnection which was introduced by ISO in 1976 i think so. This is a conceptual model that contains several layers that has protocols and things being used. The main part of such like OSI or TCP/IP is to streamline the process and explain how data is transmitted between two devices.... Khalas, that is what this model is. An abstract model that describes how data is going and for this each layer has rules that govern how data is sent and in what format
Chapter 02 - 20CS54I
History Of Cryptography
Humans have two basic needs when we take about communication. One is the need to communicate selectively, to communicate and share information. These two basic needs while communicating gave rise to coding and encrypting the messages in such a way that only intended people could have access to the information.
Concepts we should be familiar with
What is a cipher ??
A Cipher is a algorithm for performing encryption and decryption - a series of well defined steps that can be followed as a procedure
What is cryptography ??
Cryptography is the practice and study of techniques for secure communications between two parties
What is Transposition cipher ??
Here the units of the plaintext are rearranged or shuffled without changing the actual letters themselves using a key
What is a substitution cipher ??
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.