Cargando…

Design and analysis of security protocol for communication /

"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Goyal, Dinesh, 1976- (Editor ), Balamurigan, A. (Editor ), Peng, Sheng-Lung (Editor ), Verma, O. P. (Telecommunications engineer) (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Salem, Massachusetts : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, [2020]
Edición:First edition.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 History and Generations of Security Protocols
  • 1.1 Introduction
  • 1.2 Network Security
  • 1.3 Historical Background of Network Security and Network Timeline
  • 1.4 Internet Architecture and Security Aspects
  • 1.4.1 IPv4 and IPv6 Architecture
  • 1.4.1.1 Structure of IPv4
  • 1.4.1.2 IPv6 Architecture
  • 1.4.2 Attack Through IPv4
  • 1.4.2.1 Internet Attacks Common Methods
  • 1.4.2.2 Internet Security Technology
  • 1.4.3 IPv6 IP Security Issues
  • 1.5 Different Aspects of Security of the Network
  • 1.6 Evolution of Security Protocols for Network
  • 1.6.1 Understanding the Key Components of Network Security
  • 1.6.2 A Deep Defense Strategy
  • 1.6.3 How Does the Next Generation Network Security System Work Best
  • 1.7 Network Security Protocols
  • 1.7.1 Application Layer
  • 1.7.1.1 Good Privacy (PGP)
  • 1.7.1.2 Email/Multipurpose Security (S/MIME)
  • 1.7.1.3 HTTP Secure (S-HTTP)
  • 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer
  • 1.7.1.5 Secure E-Commerce (SET)
  • 1.7.1.6 Kerberos
  • 1.7.2 Transport Layer
  • 1.7.2.1 Secure Sockets Layer (SSL)
  • 1.7.2.2 Transport Layer Security (TLS)
  • 1.7.3 Network Layer
  • 1.7.3.1 Internet Protocol Security (IPSec)
  • 1.7.3.2 Virtual Private Network (VPN)
  • 1.7.4 Data Link Layer
  • 1.7.4.1 Point-to-Point Protocol (PPP)
  • 1.7.4.2 Remote Authentication User Service (RADIO)
  • 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +)
  • 1.8 Current Evolution of Red Security
  • 1.8.1 Hardware Development
  • 1.8.2 Software Development
  • 1.9 Future Security Trends
  • References
  • Chapter 2 Evolution of Information Security Algorithms
  • 2.1 Introduction to Conventional Encryption
  • 2.2 Classical Encryption Techniques
  • 2.2.1 Substitution Based
  • 2.2.1.1 Caesar Cipher
  • 2.2.1.2 Monoalphabetic Cipher
  • 2.2.1.3 Playfair Cipher
  • 2.2.1.4 Polyalphabetic Cipher
  • 2.2.2 Transposition Based
  • 2.2.2.1 Simple Columnar
  • 2.2.2.2 Rail Fence Cipher
  • 2.3 Evolutions of Modern Security Techniques
  • 2.3.1 Stream Cipher Algorithms
  • 2.3.1.1 One Time Pad (OTP)
  • 2.3.1.2 RC-4
  • 2.3.1.3 A5/1
  • 2.3.2 Block Cipher Algorithms
  • 2.3.2.1 Feistel Cipher Structure
  • 2.3.2.2 Data Encryption Standard (DES)
  • 2.3.2.3 Triple Data Encryption Standard (TDES)
  • 2.3.2.4 International Data Encryption Algorithm (IDEA)
  • 2.3.2.5 Blowfish
  • 2.3.2.6 CAST-128
  • 2.4 Conclusion
  • References
  • Practice Set
  • Review Questions and Exercises
  • 3 Philosophy of Security by Cryptostakes Schemes
  • 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
  • 3.2 RSA Algorithm
  • 3.3 Security Analysis of RSA
  • 3.4 Exponentiation in Modular Arithmetic
  • 3.5 Distribution of Public Keys
  • 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
  • 3.7 Discrete Logarithms
  • 3.8 Diffie-Hellman Key Exchange
  • 3.9 Review Exercise
  • References