And Information Security - KopyKitab

2y ago
51 Views
10 Downloads
749.63 KB
11 Pages
Last View : 4m ago
Last Download : 2m ago
Upload by : Mia Martinelli
Transcription

Second ITYAccess ControlNon-RepudiationCryptographyand InformationSecurityV.K. Pachghare

Cryptography andInformation SecuritySecond EditionV.K. PACHGHAREAssociate ProfessorDepartment of Computer Engineering and Information TechnologyCollege of Engineering, Pune(An Autonomous Institute of Government of Maharashtra)Delhi-1100922015

CRYPTOGRAPHY AND INFORMATION SECURITY, Second EditionV.K. Pachghare 2015 by PHI Learning Private Limited, Delhi. All rights reserved. No part of this book may bereproduced in any form, by mimeograph or any other means, without permission in writing fromthe publisher.ISBN-978-81-203-5082-3The export rights of this book are vested solely with the publisher.Fifth Printing (Second Edition).January, 2015Published by Asoke K. Ghosh, PHI Learning Private Limited, Rimjhim House, 111, PatparganjIndustrial Estate, Delhi-110092 and Printed by Mudrak, 30-A, Patparganj, Delhi-110091.

Tomy parents,my wife Archanaandmy daughter Samiksha

on. 11.1Security  11.2Elements of Information Security   21.2.1 Confidentiality  21.2.2 Integrity  21.2.3 Availability  21.3Security Policy   31.4Security Techniques    31.5Steps for Better Security   41.6Category of Computer Security   51.7The Operational Model of Network Security   61.8Security Services   61.9Basic Network Security Terminology   71.9.1 Cryptography  71.9.2 Hacking  81.9.3 Encryption  81.9.4 Decryption  81.9.5 Cryptanalysis  91.10 Security Attacks   91.10.1 Passive Attack   91.10.2 Active Attack   10Summary  12Exercises    12Multiple Choice Questions  13v

viContents2.Data Encryption Techniques. 142.1Introduction  142.2Encryption Methods   152.2.1 Symmetric Encryption   152.2.2 Asymmetric Encryption   162.3Cryptography  172.4Substitution Ciphers   172.4.1 The Caesar Cipher   172.4.2 Monoalphabetic Ciphers   182.4.3 Playfair Cipher   192.4.4 The Hill Cipher   222.4.5 Polyalphabetic Ciphers   262.4.6 One-time Pad or Vernam Cipher   282.5Transposition Ciphers   292.5.1 Single Columnar Transposition   302.5.2 Double Columnar Transposition   312.6Cryptanalysis  322.6.1 Enumerate All Short Keywords    322.6.2 Dictionary Attacks   332.7Steganography  342.7.1 Applications    342.7.2 Limitations  35Solved Problems   35Summary  44Exercises  44Multiple Choice Questions   453.Data3.13.23.33.43.53.63.73.83.9Encryption Standards. 47Indroduction  47Block Ciphers   47Block Cipher Modes of Operation   483.3.1 Electronic Code Book (ECB) Mode   483.3.2 Cipher Block Chaining (CBC) Mode   493.3.3 Feedback Mode   513.3.4 Counter Mode   54Feistel Ciphers   56Data Encryption Standard   573.5.1 Working of DES   583.5.2 Cracking DES   64Triple DES   643.6.1 Working of Triple DES   643.6.2 Modes of Operation   65DES Design Criteria   653.7.1 Design of S-box   65Other Block Ciphers   66Differential Cryptanalysis   66

Contentsvii3.10 Linear cryptanalysis   673.11 Weak Keys in DES Algorithms   67Summary  70Exercises  70Multiple Choice Questions   714.Advanced Encryption Standard. 724.1Introduction  724.2Advanced Encryption Standard (AES)   734.3Overview of Rijndael   734.4Key Generation   744.4.1 Round Constant    764.5Encryption  774.5.1 Initial Round   784.5.2 Round 1    794.6Decryption  844.6.1 Initial Round   844.6.2 Round 1    844.7Galois Field of Multiplication   864.8Advantages of AES   884.9Comparison of AES with Other Ciphers   89Solved ltiple Choice Questions  965.Symmetric Ciphers. 975.1Introduction  975.2Blowfish Encryption Algorithm   975.2.1 Key Expansion   985.2.2 Encryption  995.2.3 Blowfish Architecture   1015.2.4 Cryptanalysis of Blowfish   1025.3RC5  1025.3.1 Characteristics of RC5   1035.3.2 Parameters  1045.3.3 Cipher Modes in RC5   1055.4RC4    1065.4.1 Design  1065.4.2 Characteristics  1065.4.3 Algorithms  1065.5RC6  1075.5.1 Parameters of RC6   1085.5.2 Basic Operations    1085.5.3 Working of RC6   1095.6Comparison between RC6 and RC5   109

viiiContents5.7IDEA  1105.7.1 Working of IDEA    1115.7.2 Decryption  1145.7.3 Security  115Solved 8Multiple Choice Questions   1296.Number Theory. 1306.1Introduction  1306.2Prime Numbers   1306.2.1 Relative Prime Numbers   1316.3Modular Arithmetic   1316.3.1 Properties  1326.4Fermat’s Theorem   1346.4.1 An Application of Fermat’s Little Theorem and Congruence   1366.5Euler’s Theorem    1386.5.1 The General Formula to Compute (n)  1396.6Euclidean Algorithm   1436.6.1 Extended Euclidean Algorithm   1456.7Primality Test   1516.7.1 Naïve Methods   1516.7.2 Probabilistic Tests   1526.7.3 Fermat Primality Test   1526.7.4 Miller–Rabin Primality Test   1536.7.5 Agrawal, Kayal and Saxena Primality Test (AKS Test)   1536.8Chinese Remainder Theorem   1546.9Discrete Logarithms   1586.9.1 Index Calculus Algorithm   159Summary  160Exercises  160Multiple Choice Questions   1617.Public Key Cryptosystems. 1627.1Introduction  1627.2Public Key Cryptography   1637.2.1 Authentication, Secrecy and Confidentiality   1657.2.2 Key Length and Encryption Strength    1687.2.3 Applications of Public Key Cryptography   1687.2.4 Strength and Weakness of Public Key    1697.2.5 Comparison of Asymmetric Encryption and SymmetricEncryption  1697.3RSA Algorithm   1697.3.1 Working of RSA   1697.3.2 Key Length   1727.3.3 Security  172

ContentsixSolved Problems   173Summary  176Exercises  177Multiple Choice Questions   1778.Key Management. 1788.1Introduction  1788.2Key Distribution   1788.2.1 Public Announcement   1798.2.2 Publicly Available Directory    1798.2.3 Public Key Authority    1808.2.4 Public Key Certificates   1818.3Diffie–Hellman Key Exchange   1828.3.1 Description  1838.3.2 Security  1858.3.3 Man-in-the-Middle Attack   1858.3.4 Authentication  1868.4Elliptic Curve Arithmetic   1868.4.1 Elliptic Curve Groups Over Real Numbers   1878.4.2 Elliptic Curve Addition: A Geometric Approach   1878.4.3 Elliptic Curve Addition: An Algebraic Approach   1908.4.4 Elliptic Curve Groups over FP  1908.4.5 Arithmetic in an Elliptic Curve Group over FP  1918.4.6 Elliptic Curve Groups over F2n    1928.4.7 Arithmetic in an Elliptic Curve Group over F2m    1928.5Elliptic Curve Cryptography (ECC)   1938.5.1 Elliptic Curve Diffie–Hellman   1938.5.2 Key Establishment Protocol   1938.6Elliptic Curve Security and Efficiency   1948.7Zero-Knowledge Proof    1958.7.1 Cave Story   196Solved 1Multiple Choice Questions  2019.Authentication. 2029.1Introduction  2029.1.1 Objectives    2029.1.2 Measurements    2039.2Authentication Methods   2049.2.1 Password-based Authentication Method   2049.2.2 Two-factor Authentication Method   2069.2.3 Biometric Authentication Method   2069.2.4 Extensible Authentication Protocol (EAP)   2089.3Message Digest   2109.3.1 MD2  210

Cryptography And Information Security30%OFFPublisher : PHI LearningISBN : 9788120350823Author : V. K. PachghareType the URL : http://www.kopykitab.com/product/7655Get this eBook

Cryptography and Information Security and Second Edition V.K. Pachghare Authentication Confidentiality Integrity Non-Repudiation Access Control SECURITY. Delhi-110092 2015 Cryptography and Information Security Second Edition V.K. PACHGHARE Associate Professor Department of Computer Engineering and Information Technology

Related Documents:

List of E-Books Available in Digital Library, Through KopyKitab To open any book from the department wise book list provided below, Login/signup bitdurg.kopykitab.com website by entering your first name and . Product Design: Creativity, Concepts and Usability PHI Learning 9788120344273 1

KopyKitab Preface xv Preface to the First Edition xix 1. INTRODUCTION 1–19 1.1 Functional Subsystems of Organizations 1 1.1.1 Definition 2 1.2 Systems Concept of Production4 1.3 Types of Production System7 1.3.1 Flow Shop7 1.3.2 Job Shop 8 1.3.3 Batch Manufacturing 8 1.3.4 The Project 8 1.4 Productivity 8 1.5 Strategic Management 10

Attending an AO briefing given by the Chief Information Security Officer. 4.1.2 Information Systems Security Managers (ISSM), Information Systems Security Officers (ISSO) Individuals currently serving as an Information Systems Security Manager (ISSM) and Information Systems Security Officer (ISSO) are also identified in GSA's FISMA inventory.

AVG Internet Security 9 ESET Smart Security 4 F-Secure Internet Security 2010 Kaspersky Internet Security 2011 McAfee Internet Security Microsoft Security Essentials Norman Security Suite Panda Internet Security 2011 Sunbelt VIPRE Antivirus Premium 4 Symantec Norton Internet Security 20

security controls (second edition), ISO/IEC 27002:2013 Information technology - Security techniques - Information security incident . In information security management, the "Security Operations" functional area includes the deployment of proper security protection and safeguards to reduce the

organization level helps react to security situations better. A security model is a formal description of a security policy, which in turn captures the security requirements of an enterprise and describes the steps that must be taken to achieve security. The goal of implementing a security model is to provide information assurance. FCPB security

3 CONTENTS Notation 10 Preface 12 About the Author 18 PART ONE: BACKGROUND 19 Chapter 1 Computer and Network Security Concepts 19 1.1 Computer Security Concepts 21 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 32 1.6 Fundamental Security Design Principles 34 1.7 Attack Surfaces and Attack Trees 37

1) DNA is made up of proteins that are synthesized in the cell. 2) Protein is composed of DNA that is stored in the cell. 3) DNA controls the production of protein in the cell. 4) The cell is composed only of DNA and protein. 14) The diagram below represents a portion of an organic molecule. This molecule controls cellular activity by directing the