Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
31Activity
×

Table Of Contents

Selective-Field Confidentiality
Traffic Flow Confidentiality
Connection Integrity with Recovery
Connection Integrity without Recovery
Selective-Field Connection Integrity
Connectionless Integrity
Selective-Field Connectionless Integrity
Nonrepudiation, Origin
Nonrepudiation, Destination
Interruption
Modification
Fabrication
A useful categorization of these attacks is in terms of
Passive attack
Symmetric and public key algorithms
A MODEL FOR NETWORK SECURITY
MODEL FOR NETWORK ACCESS SECURITY
Cryptography
single key (or) conventional encryption
encryption
Cryptanalysis
There are various types of cryptanalytic attacks based on the amount of
STEGANOGRAPHY
CLASSICAL ENCRYPTION TECHNIQUES
I .SUBSTITUTION TECHNIQUES
(ii)Playfair cipher
Strength of playfair cipher
(iii)Polyalphabetic ciphers
(iv)Vigenere cipher
One Time Pad Cipher
II .TRANSPOSITION TECHNIQUES
SIMPLIFIED DATA ENCRYPTION STANDARD (S-DES)
The encryption algorithm involves five functions:
The Function fk
The Switch Function
BLOCK CIPHER PRINCIPLES
with block cipher
Feistel cipher structure
Fig: Classical Feistel Network
Fig: Feistel encryption and decryption
DATA ENCRYPTION STANDARD (DES)
PRINCIPLES OF PUBLIC KEY CRYPTOGRAPHY
Public key cryptosystems
Fig: encryption
Fig: authentication
Requirements for public key cryptography
Public key cryptanalysis
RSA Algorithm
The RSA algorithm is summarized below
Key Generation
Encryption
Decryption
Security of RSA
Factoring Problem
Timing attacks
KEY MANAGEMENT
Distribution of Public Keys
Public Announcement
Publicly Available Directory
Public-Key Authority
Public-Key Certificates
DIFFIE-HELLMAN KEY EXCHANGE
Fig: Diffie Hellman Key exchange
Message encryption
MESSAGE AUTHENTICATION CODE (MAC)
Requirements for MAC
MAC based on DES
KERBEROS
A simple authentication dialogue
A more secure authentication dialogue
Once per user logon session:
Once per type of service:
Once per service session:
V4 Authentication Dialogue Message Exchange
Kerberos version 5
Differences between version 4 and 5
The version 5 authentication dialogue
ELECTRONIC MAIL SECURITY
PRETTY GOOD PRIVACY (PGP)
Operational description
1. Authentication
2. Confidentiality
Confidentiality and authentication
3. Compression
4. e-mail compatibility
5. Segmentation and reassembly
Cryptographic keys and key rings
1. Session key generation
2. Key identifiers
3. Key rings
PGP message generation
1. signing the message
2. encrypting the message
1. decrypting the message
2. Authenticating the message
Introduction
Email Security
Authenticity
Integrity
0 of .
Results for:
No results containing your search query
P. 1
Unit 1

Unit 1

Ratings:

5.0

(1)
|Views: 16,710|Likes:
Published by Livingston Sathya

More info:

Published by: Livingston Sathya on May 28, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

01/17/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 21 are not shown in this preview.
You're Reading a Free Preview
Pages 25 to 62 are not shown in this preview.

Activity (31)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Musfirah Syeda liked this
Priya Sajith liked this
Tuấn Khanh liked this
Nandini Priyanga liked this
Salma Moustafa liked this
Nandini Priyanga liked this
Priya Sajith liked this
ch_pavanimca liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->