Design and analysis of security protocol for communication /
"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security p...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey : Salem, Massachusetts :
John Wiley & Sons, Inc. ; Scrivener Publishing LLC,
[2020]
|
Edición: | First edition. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 History and Generations of Security Protocols
- 1.1 Introduction
- 1.2 Network Security
- 1.3 Historical Background of Network Security and Network Timeline
- 1.4 Internet Architecture and Security Aspects
- 1.4.1 IPv4 and IPv6 Architecture
- 1.4.1.1 Structure of IPv4
- 1.4.1.2 IPv6 Architecture
- 1.4.2 Attack Through IPv4
- 1.4.2.1 Internet Attacks Common Methods
- 1.4.2.2 Internet Security Technology
- 1.4.3 IPv6 IP Security Issues
- 1.5 Different Aspects of Security of the Network
- 1.6 Evolution of Security Protocols for Network
- 1.6.1 Understanding the Key Components of Network Security
- 1.6.2 A Deep Defense Strategy
- 1.6.3 How Does the Next Generation Network Security System Work Best
- 1.7 Network Security Protocols
- 1.7.1 Application Layer
- 1.7.1.1 Good Privacy (PGP)
- 1.7.1.2 Email/Multipurpose Security (S/MIME)
- 1.7.1.3 HTTP Secure (S-HTTP)
- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer
- 1.7.1.5 Secure E-Commerce (SET)
- 1.7.1.6 Kerberos
- 1.7.2 Transport Layer
- 1.7.2.1 Secure Sockets Layer (SSL)
- 1.7.2.2 Transport Layer Security (TLS)
- 1.7.3 Network Layer
- 1.7.3.1 Internet Protocol Security (IPSec)
- 1.7.3.2 Virtual Private Network (VPN)
- 1.7.4 Data Link Layer
- 1.7.4.1 Point-to-Point Protocol (PPP)
- 1.7.4.2 Remote Authentication User Service (RADIO)
- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +)
- 1.8 Current Evolution of Red Security
- 1.8.1 Hardware Development
- 1.8.2 Software Development
- 1.9 Future Security Trends
- References
- Chapter 2 Evolution of Information Security Algorithms
- 2.1 Introduction to Conventional Encryption
- 2.2 Classical Encryption Techniques
- 2.2.1 Substitution Based
- 2.2.1.1 Caesar Cipher
- 2.2.1.2 Monoalphabetic Cipher
- 2.2.1.3 Playfair Cipher
- 2.2.1.4 Polyalphabetic Cipher
- 2.2.2 Transposition Based
- 2.2.2.1 Simple Columnar
- 2.2.2.2 Rail Fence Cipher
- 2.3 Evolutions of Modern Security Techniques
- 2.3.1 Stream Cipher Algorithms
- 2.3.1.1 One Time Pad (OTP)
- 2.3.1.2 RC-4
- 2.3.1.3 A5/1
- 2.3.2 Block Cipher Algorithms
- 2.3.2.1 Feistel Cipher Structure
- 2.3.2.2 Data Encryption Standard (DES)
- 2.3.2.3 Triple Data Encryption Standard (TDES)
- 2.3.2.4 International Data Encryption Algorithm (IDEA)
- 2.3.2.5 Blowfish
- 2.3.2.6 CAST-128
- 2.4 Conclusion
- References
- Practice Set
- Review Questions and Exercises
- 3 Philosophy of Security by Cryptostakes Schemes
- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
- 3.2 RSA Algorithm
- 3.3 Security Analysis of RSA
- 3.4 Exponentiation in Modular Arithmetic
- 3.5 Distribution of Public Keys
- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
- 3.7 Discrete Logarithms
- 3.8 Diffie-Hellman Key Exchange
- 3.9 Review Exercise
- References