11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Microsoft SDL Threat Modeling Tool• Borland ® TeamInspector Page 8Module 03: Cryptography• Introduction to Cryptography• Encryption• Symmetric Encryption• DES Symmetric Encryption Process• Asymmetric Encryption• Asymmetric Encryption vs. Symmetric Encryption• Decryption• Use of Cryptography• Cryptographic Techniqueso Classic Cryptographic Techniqueso Modern Cryptographic Techniques• Cipher• RSA (Rivest Shamir Adleman)• Example of RSA Algorithm• RSA Attacks• Implementation of RSA in C++• The Diffie-Hellman Key Agreement Standardo The Diffie-Hellman Key Algorithmo Diagrammatical Representation of Diffie-Hellman Key Algorithm• Data Encryption Standard (DES)• DES Overview• Implementation of DES in Java• Rijndael Algorithm• RC4, RC5, RC6, Blowfish Overviewhttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!