EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• Microsoft SDL Threat Modeling Tool• Borland ® TeamInspector Page 8Module 03: Cryptography• Introduction to Cryptography• Encryption• Symmetric Encryption• DES Symmetric Encryption Process• Asymmetric Encryption• Asymmetric Encryption vs. Symmetric Encryption• Decryption• Use of Cryptography• Cryptographic Techniqueso Classic Cryptographic Techniqueso Modern Cryptographic Techniques• Cipher• RSA (Rivest Shamir Adleman)• Example of RSA Algorithm• RSA Attacks• Implementation of RSA in C++• The Diffie-Hellman Key Agreement Standardo The Diffie-Hellman Key Algorithmo Diagrammatical Representation of Diffie-Hellman Key Algorithm• Data Encryption Standard (DES)• DES Overview• Implementation of DES in Java• Rijndael Algorithm• RC4, RC5, RC6, Blowfish Overviewhttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>