๐ PEC321 โ Network Security
Osmania University MCA
3 Credits
2025โ2026
โ๏ธ Complete Visual Study Notes โ All 5 Units โ๏ธ
๐ Unit I โ Introduction to Network Security
๐ก๏ธ Security Attributes (CIA + extras)
๐
Confidentiality
Only authorized can read
Confidentiality
Only authorized can read
โ
Integrity
Data not tampered
Integrity
Data not tampered
โก
Availability
System always accessible
Availability
System always accessible
๐ชช
Authenticity
Identity verified
Authenticity
Identity verified
๐
Non-Repudiation
Can't deny actions
Non-Repudiation
Can't deny actions
๐๏ธ
Authorization
Permission granted
Authorization
Permission granted
๐ญ
Anonymity
Identity hidden
Anonymity
Identity hidden
โ๏ธ Types of Attacks
๐ฃ DoS / DDoS
Denial of Service โ Overwhelms server with fake requests so legitimate users can't connect.
DDoS = Distributed (many sources)
Many Bots
โ
Flood Server
โ
๐ด Server Down
๐ญ IP Spoofing
Attacker fakes their IP address to impersonate a trusted host and bypass security filters.
Attacker
IP: X
โ
IP: X
Fake IP
sends: Y
โ
sends: Y
Server
trusts Y
trusts Y
๐ Replay Attack
Attacker captures valid data and retransmits it later to deceive the receiver.
Capture
Packet
โ
Packet
Wait &
Replay
โ
Replay
Server
deceived
deceived
๐ต๏ธ Man-in-the-Middle (MITM)
Attacker intercepts communication between two parties without their knowledge, can read, modify, or inject messages.
๐ฉ Alice
โ
๐ Attacker
(intercepts)
โ
(intercepts)
๐จ Bob
โ Alice thinks she's talking to Bob directly!
๐ฆ General Threats โ Worms, Viruses & Trojans
๐ฆ Virus
Attaches to legitimate files.
Needs human action to spread (opening file).
Corrupts or deletes data.
Example: ILOVEYOU virus
Needs human action to spread (opening file).
Corrupts or deletes data.
Example: ILOVEYOU virus
๐ชฑ Worm
Self-replicating โ no human needed.
Spreads across networks automatically.
Consumes bandwidth & resources.
Example: WannaCry worm
Spreads across networks automatically.
Consumes bandwidth & resources.
Example: WannaCry worm
๐ด Trojan
Disguised as legitimate software.
Creates backdoor for attackers.
Doesn't self-replicate.
Example: RAT (Remote Access Trojan)
Creates backdoor for attackers.
Doesn't self-replicate.
Example: RAT (Remote Access Trojan)
๐ Key difference: Virus needs host file, Worm is standalone, Trojan looks legitimate but is malicious!
๐ Unit II โ Cryptography (Secret & Public Key)
๐ต DES โ Data Encryption Standard
๐ Plaintext
(64-bit)
โ
(64-bit)
๐ Initial
Permutation
โ
Permutation
Lโ Left 32-bit
Rโ Right 32-bit
๐ 16 Feistel Rounds
Rแตขโโ
โ
F(Rแตขโโ, Kแตข)
โ
โ Lแตขโโ
๐ 56-bit key โ 16 subkeys KโโฆKโโ
๐ Swap
โ
๐ Final
Perm
โ
Perm
๐ Cipher
64-bit
64-bit
๐ Symmetric, 56-bit key, 64-bit block, 16 rounds โ now considered WEAK, replaced by AES
๐ข Triple DES (3DES) โ EDE Mode
๐ Plaintext
โ
๐ E(Kโ)
Encrypt
โ
Encrypt
๐ D(Kโ)
Decrypt
โ
Decrypt
๐ E(Kโ)
Encrypt
โ
Encrypt
๐ Ciphertext
๐ 168-bit key (3ร56), backward compatible with DES if Kโ=Kโ=Kโ, used in banking/legacy
๐ฉ AES โ Advanced Encryption Standard
๐ Plaintext
128-bit
โ
128-bit
โ Initial
AddRoundKey
โ
AddRoundKey
N
Rounds
โ
Rounds
๐ Ciphertext
๐กSubBytes
S-Box substitution
โ๏ธShiftRows
Cyclic row shifts
๐MixColumns
GF(2โธ) multiply
โAddRoundKey
XOR round key
128-bit โ 10 rounds
192-bit โ 12 rounds
256-bit โ 14 rounds
๐ Current gold standard โ used in WPA2, TLS, file encryption. Much stronger than DES!
๐ Key Distribution Problem & Solutions
โ Problem
How do Alice & Bob share a secret key securely without meeting in person?
If you send key over insecure channel โ attacker intercepts it!
If you send key over insecure channel โ attacker intercepts it!
โ Solutions
1๏ธโฃ Physical exchange (meet in person)
2๏ธโฃ Trusted Key Distribution Center (KDC)
3๏ธโฃ Diffie-Hellman key exchange
4๏ธโฃ Public Key Infrastructure (PKI)
2๏ธโฃ Trusted Key Distribution Center (KDC)
3๏ธโฃ Diffie-Hellman key exchange
4๏ธโฃ Public Key Infrastructure (PKI)
๐ด RSA โ Public Key Cryptography
๐๏ธ Key Generation Steps
โ Choose large primes p and q
โก Compute n = p ร q
โข ฯ(n) = (pโ1)(qโ1)
โฃ Choose e: gcd(e, ฯ) = 1
โค Compute d: dยทe โก 1 (mod ฯ)
โก Compute n = p ร q
โข ฯ(n) = (pโ1)(qโ1)
โฃ Choose e: gcd(e, ฯ) = 1
โค Compute d: dยทe โก 1 (mod ฯ)
๐ข Public Key: (e,n) ๐ Private Key: (d,n)
๐จ Message M
โ
๐ C = Mแต mod n (use Public Key)
โ
๐ Ciphertext C
โ
๐ M = Cแต mod n (use Private Key)
โ
๐จ Original Message M
๐ Asymmetric โ 2 different keys. Security based on difficulty of factoring large numbers. Used in HTTPS, digital signatures.
๐ฃ ECC โ Elliptic Curve Cryptography
๐ What is ECC?
Based on algebraic structure of elliptic curves over finite fields.
Equation: yยฒ = xยณ + ax + b
Provides same security as RSA with much smaller keys!
RSA 2048-bit โ ECC 224-bit ๐ฏ
Equation: yยฒ = xยณ + ax + b
Provides same security as RSA with much smaller keys!
RSA 2048-bit โ ECC 224-bit ๐ฏ
โ Advantages of ECC
๐ Less computation โ ideal for mobile
๐ Smaller key sizes โ faster operations
๐ถ Less bandwidth โ good for IoT
๐ก๏ธ Strong security โ discrete log on EC hard
Used in: Bitcoin, TLS 1.3, SSH
๐ Smaller key sizes โ faster operations
๐ถ Less bandwidth โ good for IoT
๐ก๏ธ Strong security โ discrete log on EC hard
Used in: Bitcoin, TLS 1.3, SSH
๐ Diffie-Hellman Key Exchange
๐ Public: p (prime) and g (generator)
๐ฉ Alice
๐ฒ Secret: a
Compute: A = gแต mod p
๐ค Send A to Bob
๐ฅ Receive B
๐ Key = Bแต mod p
Compute: A = gแต mod p
๐ค Send A to Bob
๐ฅ Receive B
๐ Key = Bแต mod p
A โ
public exchange
โ B
๐ค Shared Secret
S = gแตแต mod p
S = gแตแต mod p
๐จ Bob
๐ฒ Secret: b
Compute: B = gแต mod p
๐ค Send B to Alice
๐ฅ Receive A
๐ Key = Aแต mod p
Compute: B = gแต mod p
๐ค Send B to Alice
๐ฅ Receive A
๐ Key = Aแต mod p
๐ Never transmits the secret! Eavesdropper sees A & B but can't compute gแตแต (discrete log problem). Foundation of TLS!
โ Java Cryptography Extensions (JCE) & Attacks
โ JCE Overview
Java framework providing cryptographic APIs.
Supports: AES, DES, RSA, SHA, HMAC
Key classes: Cipher, KeyGenerator, MessageDigest, Signature
Provider model: Sun, BouncyCastle etc.
Supports: AES, DES, RSA, SHA, HMAC
Key classes: Cipher, KeyGenerator, MessageDigest, Signature
Provider model: Sun, BouncyCastle etc.
โ๏ธ Crypto Attacks
๐ Brute Force โ try all keys
๐ Dictionary Attack โ common passwords
๐ค Known Plaintext โ attacker knows P & C
๐ฏ Chosen Plaintext โ attacker chooses P
๐ Timing Attack โ measure execution time
๐ข Birthday Attack โ hash collisions
๐ Dictionary Attack โ common passwords
๐ค Known Plaintext โ attacker knows P & C
๐ฏ Chosen Plaintext โ attacker chooses P
๐ Timing Attack โ measure execution time
๐ข Birthday Attack โ hash collisions
๐ Unit III โ Integrity, Authentication & Non-Repudiation
๐ฃ Hash Functions โ MD5 & SHA
๐ "Hello"
โ
SHA-
256
โ
256
185f8db32921bd46d39f6a43
db8a6ce4a56a2a0de40923cd
(256-bit fixed output)
db8a6ce4a56a2a0de40923cd
(256-bit fixed output)
๐ MD5 vs SHA Comparison
MD5: 128-bit output โ โ ๏ธ BROKEN (collisions found)
SHA-1: 160-bit output โ โ ๏ธ Deprecated
SHA-256: 256-bit output โ โ Secure
SHA-512: 512-bit output โ โ Very Secure
SHA-1: 160-bit output โ โ ๏ธ Deprecated
SHA-256: 256-bit output โ โ Secure
SHA-512: 512-bit output โ โ Very Secure
โก Hash Properties
โ
One-way โ can't reverse hash โ input
โ Deterministic โ same input = same hash
โ Avalanche effect โ 1 bit change โ totally different hash
โ Collision resistant โ no two inputs same hash
โ Deterministic โ same input = same hash
โ Avalanche effect โ 1 bit change โ totally different hash
โ Collision resistant โ no two inputs same hash
๐ Uses: Password storage, file integrity, blockchain, digital certificates, HMAC
๐ MAC โ Message Authentication Code
๐จ Message M
โ
MAC Algorithm
+ Secret Key K
โ
+ Secret Key K
๐ท๏ธ MAC Tag
โ
Send (M + MAC) together
Receiver computes MAC'
โ
Compare MAC' == MAC?
โ
โ
Authentic if equal
HMAC โ Hash-based MAC
HMAC(K,M) = H((Kโopad) || H((Kโipad)||M))
Uses hash function + secret key.
More secure than plain MAC.
Used in: TLS, JWT tokens, APIs
Uses hash function + secret key.
More secure than plain MAC.
Used in: TLS, JWT tokens, APIs
MAC vs Hash vs Encryption
๐ Hash โ integrity only, no key
๐ MAC โ integrity + authentication (shared key)
๐ Encryption โ confidentiality
๐๏ธ Digital Sig โ integrity + non-repudiation
๐ MAC โ integrity + authentication (shared key)
๐ Encryption โ confidentiality
๐๏ธ Digital Sig โ integrity + non-repudiation
โ๏ธ Digital Signature using RSA
๐ค Signing (by Sender)
๐จ Message M
โ
Hash(M) โ digest h
โ
Sign: S = hd mod n
(use Private Key)
โ
(use Private Key)
๐ค Send (M, S)
๐ฅ Verification (by Receiver)
๐ฅ Receive (M, S)
โ
Recover: h' = Se mod n
(use Public Key)
โ
(use Public Key)
Compute Hash(M) โ h
โ
h == h' ? โ
Valid!
๐ Provides Authentication + Integrity + Non-Repudiation! Sender can't deny signing!
๐ DSA โ Digital Signature Algorithm
How DSA Works
Based on discrete logarithm problem.
US Government standard (FIPS 186).
Signature = pair (r, s)
Uses prime p, q, generator g
Private key: x Public key: y = gหฃ mod p
US Government standard (FIPS 186).
Signature = pair (r, s)
Uses prime p, q, generator g
Private key: x Public key: y = gหฃ mod p
RSA vs DSA
RSA: Both encrypt AND sign
DSA: Only for digital signatures
RSA: Slower verification
DSA: Faster signing, slower verification
Both: Used in SSL/TLS certificates
DSA: Only for digital signatures
RSA: Slower verification
DSA: Faster signing, slower verification
Both: Used in SSL/TLS certificates
๐ซต Biometric Authentication
๐ Physiological
Fingerprint ๐๏ธ
Face recognition ๐
Iris scan ๐๏ธ
Retina scan
Hand geometry
Face recognition ๐
Iris scan ๐๏ธ
Retina scan
Hand geometry
๐ถ Behavioral
Keystroke dynamics โจ๏ธ
Voice recognition ๐๏ธ
Signature dynamics โ๏ธ
Gait analysis ๐ถ
Mouse movements
Voice recognition ๐๏ธ
Signature dynamics โ๏ธ
Gait analysis ๐ถ
Mouse movements
โ๏ธ Auth Flow
1. Enroll & store template
2. Scan biometric input
3. Extract features
4. Compare with template
5. Match? โ Grant access
2. Scan biometric input
3. Extract features
4. Compare with template
5. Match? โ Grant access
๐ FAR (False Accept Rate) and FRR (False Reject Rate) are key metrics for biometric systems
๐ Unit IV โ PKI, Smart Cards & Firewalls
๐ PKI โ Public Key Infrastructure
Root CA
๐๏ธ (Trust Anchor)
โ
๐๏ธ (Trust Anchor)
Intermediate CA
๐ข
โ
๐ข
End Entity
Certificate ๐
โ
Certificate ๐
User/Server
๐ฅ๏ธ๐ฉ
๐ฅ๏ธ๐ฉ
๐๏ธ Digital Certificates (X.509)
Certificate contains:
๐ Owner's name & public key
๐ CA's digital signature
๐ Validity period
๐ข Serial number
๐ Subject Alternative Name (SAN)
๐ Owner's name & public key
๐ CA's digital signature
๐ Validity period
๐ข Serial number
๐ Subject Alternative Name (SAN)
๐ข Certifying Authority (CA)
Trusted third party that issues certificates.
Verifies identity before issuing.
Maintains Certificate Revocation List (CRL).
Examples: DigiCert, Let's Encrypt, VeriSign
OCSP โ Online Certificate Status Protocol
Verifies identity before issuing.
Maintains Certificate Revocation List (CRL).
Examples: DigiCert, Let's Encrypt, VeriSign
OCSP โ Online Certificate Status Protocol
๐ POP โ Proof of Possession Key Interface
Proves the user actually possesses the private key corresponding to the public key in the certificate.
Methods: Signature-based POP (sign a challenge), Encryption-based POP (decrypt a challenge), Key agreement POP.
Used in certificate enrollment protocols like CRMF/CMP.
Methods: Signature-based POP (sign a challenge), Encryption-based POP (decrypt a challenge), Key agreement POP.
Used in certificate enrollment protocols like CRMF/CMP.
๐ฅ Firewalls โ System Security
๐ Internet
(Untrusted)
โ
(Untrusted)
๐ฅ
FIREWALL
Block / Allow rules
โ
FIREWALL
Block / Allow rules
๐ Internal
Network (Safe)
Network (Safe)
๐ฆ Packet Filter
Inspects IP headers.
Rules based on src/dest IP, port, protocol.
Stateless โ no connection memory.
Fast but limited!
Rules based on src/dest IP, port, protocol.
Stateless โ no connection memory.
Fast but limited!
๐ Stateful Inspection
Tracks TCP connection state.
Maintains connection table.
More secure than packet filter.
Knows if packet is NEW or ESTABLISHED
Maintains connection table.
More secure than packet filter.
Knows if packet is NEW or ESTABLISHED
๐ฅ๏ธ Application Gateway
Works at application layer.
Acts as proxy server.
Deep packet inspection.
Understands HTTP, FTP, SMTP etc.
Acts as proxy server.
Deep packet inspection.
Understands HTTP, FTP, SMTP etc.
๐ก๏ธ VPN โ Virtual Private Network
๐ User
(Home)
โ
(Home)
๐ Encrypted
Tunnel
โ
Tunnel
๐ VPN
Server
โ
Server
๐ข Corporate
Network
Network
VPN Protocols
๐ต IPSec โ network layer, strong encryption
๐ข SSL/TLS โ application layer, web-based
๐ OpenVPN โ open source, flexible
๐ฃ WireGuard โ modern, fast, simple
๐ข SSL/TLS โ application layer, web-based
๐ OpenVPN โ open source, flexible
๐ฃ WireGuard โ modern, fast, simple
VPN Modes
๐ค Remote Access โ user to network
๐ข Site-to-Site โ network to network
๐ฑ Client VPN โ device to server
Tunneling: encapsulates encrypted packets inside normal packets
๐ข Site-to-Site โ network to network
๐ฑ Client VPN โ device to server
Tunneling: encapsulates encrypted packets inside normal packets
๐ณ Smart Cards & Zero Knowledge Protocols
๐ณ Smart Card Anatomy
Contains: Microprocessor + Memory (ROM/RAM/EEPROM)
๐ก Contact or contactless interface
๐ Stores cryptographic keys securely
๐ก๏ธ Tamper-resistant hardware
Types: EMV cards, SIM cards, ID cards, transit cards
๐ก Contact or contactless interface
๐ Stores cryptographic keys securely
๐ก๏ธ Tamper-resistant hardware
Types: EMV cards, SIM cards, ID cards, transit cards
๐ณ Card
Inserted
โ
Inserted
Mutual
Auth
โ
Auth
โ
Access
Granted
Granted
๐ง Zero Knowledge Proof (ZKP)
Prover convinces Verifier they know a secret without revealing the secret!
๐ฎ Classic example: Peggy knows path in a cave, Victor verifies without seeing the path.
Properties:
โ Completeness โ honest prover always convinces
โ Soundness โ cheater can't fool verifier
โ Zero-Knowledge โ no info leaked
Used in: Smart cards, zkSNARKs, blockchain privacy
๐ฎ Classic example: Peggy knows path in a cave, Victor verifies without seeing the path.
Properties:
โ Completeness โ honest prover always convinces
โ Soundness โ cheater can't fool verifier
โ Zero-Knowledge โ no info leaked
Used in: Smart cards, zkSNARKs, blockchain privacy
โ๏ธ Attacks on Smart Cards
โก Power Analysis (SPA/DPA)
Measures power consumption to extract keys
Measures power consumption to extract keys
โฑ๏ธ Timing Attack
Measures time to execute operations to infer secrets
Measures time to execute operations to infer secrets
๐ง Fault Injection
Induces errors via voltage glitches, laser, EM fields
Induces errors via voltage glitches, laser, EM fields
๐ Unit V โ Applications of Network Security
๐ซ Kerberos Authentication Protocol
Ticket-based authentication โ no passwords sent over network!
Step 1: AS Exchange
๐ค Client โ AS (Auth Server)
Send: Username
Receive: TGT (Ticket Granting Ticket)
encrypted with client's password hash
Send: Username
Receive: TGT (Ticket Granting Ticket)
encrypted with client's password hash
Step 2: TGS Exchange
๐ค Client โ TGS (Ticket Granting Server)
Send: TGT + requested service
Receive: Service Ticket (ST)
encrypted with service's key
Send: TGT + requested service
Receive: Service Ticket (ST)
encrypted with service's key
Step 3: Client-Server
๐ค Client โ Application Server
Send: Service Ticket (ST)
Server decrypts โ verifies
โ Access Granted!
Send: Service Ticket (ST)
Server decrypts โ verifies
โ Access Granted!
๐ค Client
โ
๐๏ธ AS
Auth Server
โ
Auth Server
๐ซ TGS
Ticket Server
โ
Ticket Server
๐ฅ๏ธ App
Server
Server
๐ Kerberos uses symmetric key crypto (AES). Uses timestamps to prevent replay attacks. Default in Windows AD!
๐ SSL / TLS โ Web Security Protocol
๐ค TLS Handshake
1๏ธโฃ Client Hello โ supported ciphers, random
2๏ธโฃ Server Hello โ chosen cipher, certificate
3๏ธโฃ Client verifies certificate (CA chain)
4๏ธโฃ Key Exchange (RSA or DH)
5๏ธโฃ Both compute session key
6๏ธโฃ Finished โ encrypted channel ready! ๐
2๏ธโฃ Server Hello โ chosen cipher, certificate
3๏ธโฃ Client verifies certificate (CA chain)
4๏ธโฃ Key Exchange (RSA or DH)
5๏ธโฃ Both compute session key
6๏ธโฃ Finished โ encrypted channel ready! ๐
๐ TLS Protocol Stack
Application (HTTP, FTP, SMTP)
โ
TLS Record Layer (encrypt/decrypt)
โ
TLS Handshake Protocol
โ
TCP / IP Transport
๐ SSL 3.0 is deprecated! Use TLS 1.2 or TLS 1.3. HTTPS = HTTP over TLS. Provides confidentiality + authentication + integrity!
๐ IPSec โ IP Security Protocol
๐ฆ IPSec Protocols
AH (Authentication Header)
โ Provides Integrity + Authentication
โ No encryption of payload
ESP (Encapsulating Security Payload)
โ Provides Confidentiality + Integrity + Auth
โ Encrypts the payload
โ Provides Integrity + Authentication
โ No encryption of payload
ESP (Encapsulating Security Payload)
โ Provides Confidentiality + Integrity + Auth
โ Encrypts the payload
๐ IPSec Modes
Transport Mode:
โ Encrypts only payload
โ Original IP header preserved
โ Used for host-to-host
Tunnel Mode:
โ Encrypts entire IP packet
โ New IP header added
โ Used for VPNs (gateway-to-gateway)
โ Encrypts only payload
โ Original IP header preserved
โ Used for host-to-host
Tunnel Mode:
โ Encrypts entire IP packet
โ New IP header added
โ Used for VPNs (gateway-to-gateway)
Original
IP Packet
โ
IP Packet
IKE
Key Exchange
โ
Key Exchange
SA
(Security Assoc.)
โ
(Security Assoc.)
ESP/AH
Applied
โ
Applied
๐ Secure
Packet
Packet
๐ณ Electronic Payments, E-Cash & Micro Payments
๐ป E-Commerce Payment
Customer โ Merchant โ Payment Gateway โ Bank
Uses SSL/TLS for transmission.
Credit card details encrypted.
3D Secure (3DS) for extra auth.
PCI-DSS compliance required.
Uses SSL/TLS for transmission.
Credit card details encrypted.
3D Secure (3DS) for extra auth.
PCI-DSS compliance required.
๐ฐ E-Cash (Digital Cash)
Electronic equivalent of physical cash.
Anonymous โ like real cash!
Uses blind signatures (Chaum protocol).
Bank issues signed digital coins.
Can't trace who spent which coin.
Anonymous โ like real cash!
Uses blind signatures (Chaum protocol).
Bank issues signed digital coins.
Can't trace who spent which coin.
๐ช Micro Payments
Very small transactions (< $1).
Need low overhead protocols.
Examples: Pay-per-article, streaming bits.
Protocols: HashCash, PayWord, MicroMint.
Also: Lightning Network (Bitcoin)
Need low overhead protocols.
Examples: Pay-per-article, streaming bits.
Protocols: HashCash, PayWord, MicroMint.
Also: Lightning Network (Bitcoin)
๐ SET โ Secure Electronic Transaction
๐ญ SET Participants
๐ค Cardholder โ buyer
๐ช Merchant โ seller
๐ฆ Issuer โ cardholder's bank
๐๏ธ Acquirer โ merchant's bank
๐ CA โ issues digital certificates
๐ณ Payment Gateway โ connects networks
๐ช Merchant โ seller
๐ฆ Issuer โ cardholder's bank
๐๏ธ Acquirer โ merchant's bank
๐ CA โ issues digital certificates
๐ณ Payment Gateway โ connects networks
๐ SET Security Features
โ
Dual Signature โ merchant sees order, bank sees payment info (neither sees both!)
โ Cardholder authentication via certificate
โ Merchant authentication via certificate
โ DES for bulk encryption
โ RSA for key exchange
โ Cardholder authentication via certificate
โ Merchant authentication via certificate
โ DES for bulk encryption
โ RSA for key exchange
๐ข Case Studies โ .NET & J2EE Security
๐ท .NET Security Model
Code Access Security (CAS) โ controls what code can do
Role-Based Security โ user roles & permissions
Cryptography: System.Security.Cryptography namespace
AES, RSA, SHA, HMAC built-in
ASP.NET: Forms auth, Windows auth, SSL
Claims-based identity โ modern approach
Role-Based Security โ user roles & permissions
Cryptography: System.Security.Cryptography namespace
AES, RSA, SHA, HMAC built-in
ASP.NET: Forms auth, Windows auth, SSL
Claims-based identity โ modern approach
โ J2EE Security Model
JAAS โ Java Authentication & Authorization Service
JSSE โ Java Secure Socket Extension (SSL/TLS)
JCE โ Java Cryptography Extension
Declarative Security โ in deployment descriptor
Programmatic Security โ in code
Servlet containers handle authentication
JSSE โ Java Secure Socket Extension (SSL/TLS)
JCE โ Java Cryptography Extension
Declarative Security โ in deployment descriptor
Programmatic Security โ in code
Servlet containers handle authentication
๐ Master Quick Reference Table
| Topic | Unit | Key Points | Use Case |
|---|---|---|---|
| ๐ต DES | II | Symmetric, 56-bit key, 16 Feistel rounds | โ ๏ธ Legacy only |
| ๐ข 3DES | II | EDE mode, 168-bit, 3ร DES operations | Banking (legacy) |
| ๐ฉ AES | II | Symmetric, 128/192/256-bit, 128-bit block | โ WPA2, TLS, files |
| ๐ด RSA | II | Asymmetric, public/private key pair | โ HTTPS, email |
| ๐ฃ ECC | II | Asymmetric, smaller keys, elliptic curves | โ Mobile, IoT, TLS 1.3 |
| ๐ Diffie-Hellman | II | Key exchange, discrete log problem | โ TLS handshake |
| ๐ฃ SHA-256/MD5 | III | Hash function, one-way, fixed output | โ Passwords, blockchain |
| ๐ MAC/HMAC | III | Message authentication + integrity | โ API auth, JWT |
| โ๏ธ Digital Sig RSA/DSA | III | Non-repudiation + authentication | โ Certs, contracts |
| ๐ PKI/CA | IV | Certificate hierarchy, X.509 | โ HTTPS everywhere |
| ๐ฅ Firewall | IV | Packet filter / Stateful / App gateway | โ Network protection |
| ๐ณ Smart Card/ZKP | IV | Tamper-resistant, zero knowledge proofs | โ Banking, ID cards |
| ๐ซ Kerberos | V | Ticket-based auth, AS+TGS+Service | โ Windows AD, SSO |
| ๐ SSL/TLS | V | Handshake โ session key โ encrypted channel | โ All HTTPS traffic |
| ๐ IPSec | V | AH + ESP, Transport/Tunnel mode | โ VPNs, site-to-site |
| ๐ SET | V | Dual signature, e-commerce security | E-commerce |
โ๏ธ Osmania University MCA โ PEC321 Network Security โ 2025-2026 ๐