• Complain

NARAYANAMOORTHI - TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers

Here you can read online NARAYANAMOORTHI - TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers
  • Author:
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

NARAYANAMOORTHI: author's other books


Who wrote TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers? Find out the surname, the name of the author of the book and a list of all author's works by series.

TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Cryptography and Network Security

CONTENTS UNIT I OSI SECURITY ARCHITECTURE UNIT II BLOCK CIPHERS AND - photo 1
CONTENTS
UNIT I
OSI SECURITY ARCHITECTURE
UNIT II
BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD (DES)
UNIT III
NUMBER THEORY
UNIT IV
AUTHENTICATION REQUIREMENTS
UNIT V
ELECTRONIC MAIL SECURITY
Unit I

THE OSI SECURITY ARCHITECTURE

The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows:

Security attack: Any action that compromises the security of information owned by an organization.

Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.

SECURITY ATTACKS

A useful means of classifying security attacks, is in terms of passive attacks and active attacks . A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resources or affect their operation.

PASSIVE ATTACKS

Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis.

The release of message contents is easily understood (Figure 1.1a). A telephone conversation, an electronic mail message, and a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.

Figure 11 Passive Attacks A second type of passive attack traffic - photo 2

Figure 1.1. Passive Attacks

A second type of passive attack, traffic analysis, is subtler (Figure 1.1b). Suppose that we had a way of masking the contents of messages or other information traffic so that opponents, even if they captured the message, could not extract the information from the message. The common technique for masking contents is encryption. If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged.

Passive attacks are very difficult to detect because they do not involve any alteration of the data. Typically, the message traffic is not sent and received in an apparently normal fashion and the sender nor receiver is aware that a third party has read the messages or observed the traffic pattern.

ACTIVE ATTACKS

Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service.

A masquerade takes place when one entity pretends to be a different entity (Figure 1.2a). A masquerade attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges.

Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect (Figure 1.2b).

Modification of messages simply means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect (Figure 1.2c). For example, a message meaning "Allow John Smith to read confidential file accounts" is modified to mean "Allow Fred Brown to read confidential file accounts."

The denial of service prevents or inhibits the normal use or management of communications facilities (Figure 1.2d). This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.

Figure 12 Active Attacks SECURITY SERVICES AUTHENTICATION The - photo 3

Figure 12 Active Attacks SECURITY SERVICES AUTHENTICATION The - photo 4

Figure 12 Active Attacks SECURITY SERVICES AUTHENTICATION The - photo 5

Figure 1.2. Active Attacks

SECURITY SERVICES
AUTHENTICATION

The assurance that the communicating entity is the one that it claims to be.

Peer Entity Authentication

Used in association with a logical connection to provide confidence in the identity of the entities connected.

Data Origin Authentication

In a connectionless transfer, provides assurance that the source of received data is as claimed.

ACCESS CONTROL

The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do).

DATA CONFIDENTIALITY

The protection of data from unauthorized disclosure.

Connection Confidentiality

The protection of all user data on a connection.

Connectionless Confidentiality

The protection of all user data in a single data block

Selective-Field Confidentiality

The confidentiality of selected fields within the user data on a connection or in a single data block.

Traffic Flow Confidentiality

The protection of the information that might be derived from observation of traffic flows.

DATA INTEGRITY

The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay).

Connection Integrity with Recovery

Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted.

Connection Integrity without Recovery

As above, but provides only detection without recovery.

Selective-Field Connection Integrity

Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connectionless Integrity
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers»

Look at similar books to TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers»

Discussion, reviews of the book TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.