Professional Documents
Culture Documents
Network Security and Cryptography DR P Rizwan Ahmed PDF
Network Security and Cryptography DR P Rizwan Ahmed PDF
AND
CRYPTOGRAPHY
Theory and Practice
(Choice Based Credit System (CBCS) Pattern)
(For B. Sc. Computer Science, BCA, M.Sc.(IT), and MCA Courses)
By
Margham Publications
No.24, Rameswaram Road, T- Nager,
Chennai- 600 017 Phone:(044) 2432 2469
Web Site: www.margham.in
E-mail: www.margham.tn@gmail.com
CONTENTS
Preface
Acknowledgement
Chapter 3 Introduction
3.1 Introduction
3.2 OSI Security Architecture
3.3 SECURITY Attacks
3.3.1 passive Attacks
3.3.2 Active ATTACKS
3.3.3 Difference between Passive Attack and Active Attack
3.4 Security Services
3.5 Security Mechanisms
3.6 A Model for Network Security
Summary
Review Question and Problems
4.1 Introduction
4.2 Symmetric Cipher Model
4.3 Classical Encryption Techniques
4.4Substitution Techniques
4.5 Transposition techniques
4.6 Steganography
4.7 Conventional Encryption Algorithm
4.7.1 Data Encryption Standard (DES)
4.7.2 Applications of Cryptography
Summary
Review Question and Problems
6.1 Introduction
6.2 Prime Numbers
6.3 Relatively Prime Numbers
6.4 Fermat’s Theorem
6.5 Euler’s Theorem
6.6 Testing of Primality
6.7 Euclid’s Algorithm
6.8 Chinese Remainder Theorem
Summary
Review Questions and Problems
7.1 Introduction
7.2 Authentication Requirements
7.3 Authentication Functions
7.4 Message Encryption
7.5 Hash Functions
7.5.1 Hash Functions Requirements / Hash Function Properties
7.5.2 Birthday attack
Summary
Review Questions
Chapter 11 Intruders
11.1 Intruders
11.1.1 Hackers
11.1.2 Insider Attacks
11.2 Intrusion Detection
11.3 Password Management
Summary
Review Questions
Chapter 12 Firewalls
12.1 Introduction
12.2 Design Goals of Firewalls
12.3 Limitations of Firewalls
Summary
Review Questions