Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

NETWORK SECURITY

AND
CRYPTOGRAPHY
Theory and Practice
(Choice Based Credit System (CBCS) Pattern)
(For B. Sc. Computer Science, BCA, M.Sc.(IT), and MCA Courses)

By

Dr. P.Rizwan Ahmed, MCA., M.Sc.,M.A.,M.Phil.,Ph.D


Head of the Department
Department of Computer Applications &
PG Department of Information Technology
Mazharul Uloom College, Ambur - 635 802
Vellore Dist. Tamil Nadu.

Margham Publications
No.24, Rameswaram Road, T- Nager,
Chennai- 600 017 Phone:(044) 2432 2469
Web Site: www.margham.in
E-mail: www.margham.tn@gmail.com
CONTENTS

Preface
Acknowledgement

Chapter – 1 Computer Networks


1.1 Introduction
1.2 Communication media
1.3 Computer Network
1.4 Goals of Computer Networks
1.5 Components of Network
1.6 Uses of Computer Networks
1.7 Network Hardware
1.7.1 Transmission Technologies / Network Technology
1.7.1.1 Broadcast Networks
1.7.1.2 Point to Point Networks
1.7.2 Network Topologies
1.7.2.1 Bus Topology
1.7.2.2Star Topology
1.7.2.3 Ring Topology
1.7.2.4 Mesh Topology

1.7.2.5 Tree Topology


1.7.3 Categories of Networks
1.7.3.1 Local Area Network (LAN)
1.7.3.2 Metropolitan Area Network (MAN)

1.7.3.3 Wide Area Network (WAN)


1.7.4 Difference between LAN and MAN and WAN
1.7.5 Wireless Networks
1.7.6 Home Networks
1.8 Network Software
1.8.1 Protocol hierarchies
1.8.2 Design Issues for the layers
1.8.3 Connection Oriented and Connectionless Services
1.8.3.1 Connection Oriented
1.8.3.2 Connectionless
1.8.4 Differentiate between connection oriented and connectionless services
1.9 Reference Models
1.10 TCP/IP Reference Model
1.11 Difference between OSI Reference Model and TCP/IP Reference Model
1.12 Example Networks
1.12.1 Internet
1.12.2 ARPANET
1.12.3 NSFNET
1.12.4 Connection-Oriented Networks: X.25, Frame Relay, and ATM
1.12.4.1 X.25 Networks
1.12.4.2 Frame Relay
1.12.4.3 ATM (Asynchronous Transfer Mode) / B-ISDN
1.12.4.4 ATM Reference Model
1.12.4.5 Benefits / Advantages of ATM
1.13 Ethernet
1.14 Networking Standards
Summary
Review Questions and Problems

Chapter 2 Physical Layer


2.1 Basis for Data Communication
2.2 Theoretical Basis for Data Communication
2.3 Applications of Data Communications
2.4 Transmission Media
2.4.1 Guided Transmission Media
2.4.1.1 Twisted Pair
2.4.1.2 Coaxial Cable
2.4.1.3 Fiber Optic Cable
2.4.2 Wireless Transmission / Unguided Transmission Media
2.4.2.1 Radio Transmission
2.4.2.2 Microwave Transmission
2.4.2.3 Infrared
2.4.2.4 Satellites Communications
2.5 Difference between Guided and Unguided Media
Summary
Review Question and Problems

Chapter 3 Introduction

3.1 Introduction
3.2 OSI Security Architecture
3.3 SECURITY Attacks
3.3.1 passive Attacks
3.3.2 Active ATTACKS
3.3.3 Difference between Passive Attack and Active Attack
3.4 Security Services
3.5 Security Mechanisms
3.6 A Model for Network Security
Summary
Review Question and Problems

Chapter 4 Conventional Encryption Model

4.1 Introduction
4.2 Symmetric Cipher Model
4.3 Classical Encryption Techniques
4.4Substitution Techniques
4.5 Transposition techniques
4.6 Steganography
4.7 Conventional Encryption Algorithm
4.7.1 Data Encryption Standard (DES)
4.7.2 Applications of Cryptography
Summary
Review Question and Problems

Chapter 5 Public Key Cryptography

5.1 Principles of Public Key Cryptosystems


5.2 RSA Algorithm
5.3 Key Management
5.4 Diffie-Hellman Key Exchange
Summary
Review Questions and Problems

Chapter 6 Introduction to Number Theory

6.1 Introduction
6.2 Prime Numbers
6.3 Relatively Prime Numbers
6.4 Fermat’s Theorem
6.5 Euler’s Theorem
6.6 Testing of Primality
6.7 Euclid’s Algorithm
6.8 Chinese Remainder Theorem
Summary
Review Questions and Problems

Chapter 7 Message Authentication

7.1 Introduction
7.2 Authentication Requirements
7.3 Authentication Functions
7.4 Message Encryption
7.5 Hash Functions
7.5.1 Hash Functions Requirements / Hash Function Properties
7.5.2 Birthday attack
Summary
Review Questions

Chapter 8 SHA and Digital Signature

8.1 Secure Hash Algorithm


8.1.1 SHA-512 Logic
8.1.2 SHA-512 Overview
8.1.3 SHA-512 Compression Function
8.1.4 SHA-512 Round Function
8.2 Digital Signature
8.2.1 Direct Digital Signature
8.2.2 Arbitrated Digital Signature
8.3 Authentication Protocols
8.4 Digital Signature Standard (DSS)
8.5 Kerberos
Summary
Review Questions

Chatper-9 Electronic mail Security

9.1 Pretty Good Privacy (PGP)


9.2 S/MIME
Summary
Review Questions
Chapter 10 IP Security Overview

10.1 IP Security Overview


10.1.1 Need for IPSec
10.1.1 Benefits of IPSec
10.2 IP Security Architecture
Summary
Review Questions

Chapter 11 Intruders

11.1 Intruders
11.1.1 Hackers
11.1.2 Insider Attacks
11.2 Intrusion Detection
11.3 Password Management
Summary
Review Questions

Chapter 12 Firewalls

12.1 Introduction
12.2 Design Goals of Firewalls
12.3 Limitations of Firewalls
Summary
Review Questions

APPENDIX A ; Past University Question Papers.

APPENDIX B : Multiple Choice Questions

APPENDIX C : Two marks Question and Answer

APPENDIX D : Prime Numbers between 1 and 1000

You might also like