Professional Documents
Culture Documents
SECURITY MODELS
An organization can take several approaches to implement its security model. These approaches are
summarized as follows.
No Security: In this simplest case, the approach could be a decision to implement no security at all.
Security through obscurity: In this model, a system is secure simply because nobody knows about its
existence and contents. This approach cannot work for too long, as there are many ways an attacker can
come to know about it.
Hot Security: In this scheme, the security for each host is enforced individually. This is a very safe
approach, but the trouble is that it cannot scale well. The complexity and diversity of modern
sites/organizations makes the task even harder.
NETWORK SECURITY: Host security is tough to achieve as organizations grow and become more
diverse. In Network security technique, the focus is to control network access to various hosts and their
services, rather than individual host security. This is a very efficient and scalable model.
PRIMALITY TESTING
Given a number n, how can we determine if n is a prime? The answer is that we need to see if
the number is divisible by all primes less than n. This method is inefficient, but it is a good start.
Example 1: Is 97 a prime?
Solution
PRIME FACTORIZATION
To factor a number n is to write it as a product of other numbers.
n=a*b*c
Or, 100 = 5 * 5 * 2 * 2
Prime factorization of a number n is writing it as a product of prime numbers.
143 = 11 * 13
Any integer a>1 can be factored as product of powers of primes i.e. a=p1 a1 × p2 a2 × … × pkak
where p1, p2, pk are prime numbers and a1, a2, …ak are integers.
Example 1: 91 = 7 × 13,
3600 = 24 × 32 × 52,
11011 = 7 × 112 × 13
An integer is then specified by all non-zero exponents. Thus,
MODULO OPERATOR
The modulo operator is shown as mod. The second input (n) is called the modulus. The output r
is called the residue.
Euler’s phi-function, φ (n), which is sometimes called the Euler’s totient function plays a very
important role in cryptography.
Example 1
We can use the third rule: φ (10) = φ (2) × φ (5) = 1 × 4 = 4, because 2 and 5 are
primes.
Example 3