NETWORK SECURITY AND
CRYPTOGRAPHY
G.HarshaVardhan
3rd year-CSE
SRM University,
Chennai.
Mobile no: 9791095378
ABSTRACT:
Network security is a complicated subject, historically
onlyincreasingnumber of people need to understand the
However, as more and more people become ``wired'', tackled
by well-trained andexperienced experts. Basics of security in a
networked world. Thisdocument was written with the basic
computer user and information systems manager inmind,
explaining the concepts needed to read through the hype in
the marketplace andunderstand risks and how to deal with
them. So it is very important for all the users to getfamiliar with
various aspects of Network Security. In the article basics of
Network Security are discussed. With the millions of Internet
users able to pass information fromthe network, the security of
business networks is a major concern. The very nature of
theInternet makes it vulnerable to attack. The hackers and virus
writers try to attack theInternet and computers connected to
the Internet. With the growth in business use of theInternet,
network security is rapidly becoming crucial to the
development of the Internet.Many business set up firewalls to
control access to their networks by persons using the Internet
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
150
ISBN: 378-26-138420-01
Introduction:
For the first few decades of their existence, computer networks were
primarily used by university researchers for sending e-mail and by
corporate employees for sharing printers. Under these conditions,
security did not get a lot of attention. But now, as millions of ordinary
citizens are using networks for banking, shopping, and filing their tax
returns, network security is looming on the horizon as a potentially
massive problem.
The requirements of information security within an organization have
undergone two major changes in the last several decades.Before
the widespread use of data processing equipment ,the security of
information felt to be valuable to an organization was provided
primarily by physical and administrative means .
.with the introduction of computer the need for automated tools for
protecting files and other information stored on the computer
became an evident .this is especially the case for a shared system
such as time sharing system and the need is even more acute for
systems that can be accessed for a public telephone or a data
network. The generic name for the collection of tools to protect data
and to thwart hackers is “computer security”.
Network security:
Security is a broad topic and covers a multitude of sins. In its simplest
form, it is concerned with making sure that nosy people cannot
read, or worse yet, secretly modify messages intended for other
recipients. It is concerned with people trying to access remote
services that they are not authorized to use. Most security problems
are intentionally caused by malicious people trying to gain some
benefit, get attention, or to harm someone. Network security
problems can be divided roughly into four closely intertwined areas:
secrecy, authentication, nonrepudiation, and integrity control.
Secrecy, also called confidentiality, has to do with keeping
information out of the hands of unauthorized users. This is what
usually comes to mind when people think about network security.
Authentication deals with determining whom you are talking to
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
151
ISBN: 378-26-138420-01
before revealing sensitive information or entering into a business
deal. Nonrepudiation deals with signatures.
Secracy: Only the sender and intended receiver should be able to
understand the contents of the transmitted message. Because
eavesdroppers may intercept the message, this necessarily requires
that the message besomehow encrypted (disguise data) so that an
intercepted message can not be decrypted (understood) by an
interceptor. This aspect of secrecy is probably the most commonly
perceived meaning of the term "securecommunication." Note,
however, that this is not only a restricted definition of secure
communication , but a rather restricted definition of secrecy as well.
Authentication :Both the sender and receiver need to confirm the
identity of other party involved in the communication - to confirm
that the other party is indeed who or what they claim to be. Face-to-
face human communication solves this problem easily by visual
recognition. When communicating entities exchange
messages over a medium where they can not "see" the other party,
authentication is not so simple. Why, for instance, should you
believe that a received email containing a text string saying that
the email came from a friend of yours indeed came from that
friend? If someone calls on the phone claiming to be your bank
and asking for your account number, secret PIN, and account
balances for verification purposes, would you give
that information out over the phone? Hopefully not.
Message Integrity: Even if the sender and receiver are able to
authenticate each other, they also want to insure
that the content of their communication is not altered, either
malicously or by accident, in transmission.
Extensions to the checksumming techniques that we encountered in
reliable transport and data link protocols
Nonrepudiation: Nonrepudiation deals with signatures
Having established what we mean by secure communication, let us
next consider exactly what is meant by an "insecurechannel." What
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
152
ISBN: 378-26-138420-01
information does an intruder have access to, and what actions can
be taken on the transmitted data?
Figure illustrates the scenario
Alice, the sender, wants to send data to Bob, the receiver. In order
to securely exchange data, while meeting the
requirements of secrecy, authentication, and message integrity,
Alice and Bob will exchange both control message anddata
messages (in much the same way that TCP senders and receivers
exchange both control segments and data
segments). All, or some of these message will typically be encrypted.
A passive intruder can listen to and record the
control and data messages on the channel; an active intruder can
remove messages from the channel and/or itself add messages into
the channel.
Network Security Considerations in the Internet :-
Before delving into the technical aspects of network security in the
following sections, let's conclude our introduction by relating our
fictitious characters - Alice, Bob, and Trudy - to "real world" scenarios
in today's Internet
. Let's begin with Trudy, the network intruder. Can a "real world"
network intruder really listen to and record passively receives all
data-link-layer frames passing by the device's network interface. In a
broadcast environment
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
153
ISBN: 378-26-138420-01
such as an Ethernet LAN, this means that the packet sniffer receives
all frames being transmitted from or to all hostson the local area
network. Any host with an Ethernet card can easily serve as a packet
sniffer, as the Ethernet interface card needs only be set to
"promiscuous mode" to receive all passing Ethernet frames. These
frames can then be passed on to application programs that extract
application-level data. For example, in the telnet scenario , the login
password prompt sent from A to B, as well as the password entered
at B are "sniffed" at host C. Packet sniffing is a double-edged sword -
it can be invaluable to a network administrator for network
monitoring and management but also used by the unethical
hacker. Packet-sniffing software is freely available at various WWW
sites, and as commercial products.
Cryptography:- Cryptography comes from the Greek words for
''secret writing.'' It has a long and colorful history going back
thousands of years. Professionals make a distinction between ciphers
and codes. A cipher is a character-for-character or bit-for-bit
transformation, without regard to the linguistic structure of the
message. In contrast, a code replaces one word with another word
or symbol. Codes are not used any more, although they have a
glorious history
The messages to be encrypted, known as the plaintext, are
transformed by a function that is parameterized by a key. The output
of the encryption process, known as the ciphertext, is then
transmitted, often by messenger or radio. We assume that the
enemy, or intruder, hears and accurately copies down the complete
ciphertext. However, unlike the intended recipient, he does not
know what the decryption key is and so cannot decrypt the
ciphertext easily. Sometimes the intruder can not only listen to the
communication channel (passive intruder) but can also record
messages and play them back later, inject his own messages, or
modify legitimate messages before they get to the receiver (active
intruder). The art of breaking ciphers, called cryptanalysis, and the
art devising them (cryptography) is collectively known as cryptology.
It will often be useful to have a notation for relating plaintext,
ciphertext, and keys. We will use C = EK(P) to mean that the
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
154
ISBN: 378-26-138420-01
encryption of the plaintext P using key K gives the ciphertext C.
Similarly, P = DK(C) represents the decryption of C to get the
plaintext again.
Two Fundamental Cryptographic Principles:
Redundancy
The first principle is that all encrypted messages must contain some
redundancy, that is, information not needed to understand the
message.
Cryptographic principle 1: Messages must contain some
redundancy
Freshness
Cryptographic principle 2: Some method is needed to foil replay
attacks
One such measure is including in every message a timestamp valid
only for, say, 10 seconds. The receiver can then just keep messages
around for 10 seconds, to compare newly arrived messages to
previous ones to filter out duplicates. Messages older than 10
seconds can be thrown out, since any replays sent more than 10
seconds later will be rejected as too old.
Symmetric key Encryption model:
Beyond that ,the security of conventional encryption depends on
the secracy of the key ,not the secrecy of the algorithm. We do not
need to keep the algorithm secret, we need to keep only the secret
key.
The fact that the algorithm need not be kept secret means that
manufactures can and have developed low cost chip
implementations of data encryption algorithms. these chips are
widely available and incorporated in to a number of products.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
155
ISBN: 378-26-138420-01
Substitution Ciphers
In a substitution cipher each letter or group of letters is replaced by another letter
or group of letters to disguise it. One of the oldest known ciphers is the Caesar
cipher, attributed to Julius Caesar. In this
method, a becomes D, b becomes E, c becomes F, ... , and z becomes C. For
example, attack becomes DWWDFN.
The next improvement is to have each of the symbols in the plaintext, say, the 26
letters for simplicity, map onto some other letter. For example,
plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z
ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M
Transposition Ciphers:Substitution ciphers preserve the order of the
plaintext symbols but disguise them. Transposition ciphers, in contrast, reorder
the letters but do not disguise them depicts a common transposition cipher, the
columnar transposition.
M E G A B U C K
7 4 5 1 2 8 3 6
W E L C O M E T PLAIN TEXT: WELCOME TO SAfire-2K8,CHIRALA,
O S A f i r e 2 PRAKASAM, AP.
K 8 C H I R A L CIPHER TEXT: CfHAOiIKEeASES8PALACRPT2LA
A P R A K A S A WOKAMMRRA
M A P
The cipher is keyed by a word or phrase not containing any repeated letters. In
this example, MEGABUCK is the key. The purpose of the key is to number the
columns, column 1 being under the key letter closest to the start of the alphabet,
and so on. The plaintext is written horizontally, in rows, padded to fill the matrix if
need be. The ciphertext is read out by columns, starting with the column whose
key letter is the lowest.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
156
ISBN: 378-26-138420-01
Public key algorithm:
While there may be many algorithms and keys that have this
property, the RSA algorithm (named after its founders, Ron Rivest, Adi
Shamir, and Leonard Adleman) has become almost synonymous
with public keycryptography.
In order to choose the public and private keys, one must do the
following:
Choose two large prime numbers, p and q. How large should p and
q be? The larger the values, the
more difficult it is to break RSA but the longer it takes to perform the
encoding and decoding. RSA
Laboratories recommends that the product of p and q be on the
order of 768 bits for personal use and
1024 bits for corporate use .
Compute n = pq and z = (p-1)(q-1).
Choose a number, e, less than n, which has no common factors
(other than 1) with z. (In this case, e
and z are said to be relatively prime). The letter 'e' is used since this
value will be used in encryption.
Find a number, d, such that ed -1 is exactly divisible (i.e., with no
remainder) by z. The letter 'd' is
used because this value will be used in decryption. Put another way,
given e, we choose d such that the
integer remainder when ed is divided by z is 1. (The integer
remainder when an integer x is divided by
the integer n, is denoted x mod n).
The public key that Bob makes available to the world is the pair of
numbers (n,e); his private key is the
pair of numbers (n,d).
key distribution: For symmetric key cryptograghy , the trusted
intermediary is called a Key Distribution Center (KDC), which is a
single, trusted network entity with whom one has established a
shared secret key. We will see that one can use the KDC to
obtain the shared keys needed to communicate securely with all
other network entities. For public key cryptography, the trusted
intermediary is called a Certification Authority (CA). A certification
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
157
ISBN: 378-26-138420-01
authority certifies that a public key belongs to a particular entity (a
person or a network entity). For a certified public key, if one can
safely trust the CA that the certified the key, then one can be sure
about to whom the public key belongs. Once a public key is
certified, then it can be distributed from just about anywhere,
including a public key server, a personal Web page or a diskette.
security in the layers:
Before getting into the solutions themselves, it is worth spending a
few moments considering where in the protocol stack network
security belongs. There is probably no one single place. Every layer
has something to contribute.
physical layer:In the physical layer wiretapping can be foiled by
enclosing transmission lines in sealed tubes containing gas at high
pressure. Any attempt to drill into a tube will release some gas,
reducing the pressure and triggering an alarm. Some military systems
use this technique.
Data link layer:In this layer, packets on a point-to-point line can be
encrypted as they leave one machine and decrypted as they enter
another. All the details can be handled in the data link layer, with
higher layers oblivious to what is going on. This solution breaks down
when packets have to traverse multiple routers, however, because
packets have to be decrypted at each router, leaving them
vulnerable to attacks from within the router.
Network layer:In this layer, firewalls can be installed to keep good
packets and bad packets out. IP security also functions in this layer.
In the transport layer, entire connections can be encrypted, end to
end, that is, process to process. For maximum security, end-to-end
security is required . Finally, issues such as user authentication and
nonrepudiation can only be handled in the application layer.
Since security does not fit neatly into any layer
Secure Internet Commerce :
SET (Secure Electronic Transactions) is a protocol specifically
designed to secure payment-card transactions over the Internet. It
was originally developed by Visa International and MasterCard
International in February 1996 with participation from leading
technology companies around the world .SET Secure Electronic
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
158
ISBN: 378-26-138420-01
Transaction LLC (commonly referred to as SET Co) was established in
December 1997 as a legal entity to manage and promote the
global adoption of SET
1. Bob indicates to Alice that he is interested in making a credit card
purchase.
2. Alice sends the customer an invoice and a unique transaction
identifier.
3. Alice sends Bob the merchant's certificate which includes the
merchant's public key. Alice also sends the certificate for her bank,
which includes the bank's public key. Both of these certificates are
encrypted with the private key of a certifying authority.
4. Bob uses the certifying authority's public key to decrypt the two
certificates. Bob now has Alice's public key and the bank's public
key.
5. Bob generates two packages of information: the order information
(OI) package and the purchase instructions (PI) package. The OI,
destined for Alice, contains the transaction identifier and brand of
card being used; it does not include Bob's card number. The PI,
destined for Alice's bank, contains the transaction identifier, the
card number and the purchase amount agreed to Bob. The OI
and PI are dual encrypted: the OI is encrypted with Alice's public
key; the PI is encrypted with Alice's bank's public key. (We are
bending the truth here in order to see the big picture. In reality, the
OI and PI are encrypted with a customer-merchant session key
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
159
ISBN: 378-26-138420-01
and a customer-bank session key.) Bob sends the OI and the PI to
Alice.
6.Alice generates an authorization request for the card payment
request, which includes the transaction identifier.
7.Alice sends to her bank a message encrypted with the bank's
public key. (Actually, a session key is used.) This message includes the
authorization request, the PI package received from Bob, and Alice's
certificate
.
8.Alice's bank receives the message and unravels it. The bank
checks for tampering. It also make sure that the transaction identifier
in the authorization request matches the one in Bob's PI package.
9.Alice's bank then sends a request for payment authorization to
Bob's payment-card bank through traditional bank-card channels --
just as Alice's bank would request authorization for any normal
payment-card transaction.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
160
ISBN: 378-26-138420-01
One of the key features of SET is the non-exposure of the credit
number to the merchant. This feature is
provided in Step 5, in which the customer encrypts the credit card
number with the bank's key.
Encrypting the number with the bank's key prevents the merchant
from seeing the credit card. Note that
the SET protocol closely parallels the steps taken in a standard
payment-card transaction. To handle all
the SET tasks, the customer will have a so-called digital wallet that
runs the client-side of the SET
protocol and stores customer payment-card information (card
number, expiration date, etc.)
Conclusion:
All the three techniques discussed in this presentation i.e. network
security; cryptography andfirewalls are most widely used and
implemented networks security tools. Each of them had itsown
significance in its own mode. For example, a single
organization or establishment tomaintain privacy of
information within itself can use cryptography. These methods
are beingused to provide confidentiality required by the
network. There is a lot of scope for thedevelopment in this
field. Digital signatures are one of the latest developments in
the field of c ry p t o g r a p hy . Wi t h t h e in c r e a s e i n
n u mb e r o f c o m p u te rs , a nd t he u s a g e
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
161
ISBN: 378-26-138420-01
o f c o mp u te r s worldwide the demand for network security is
increasing exponentially. This has led to thedevelopment of
major companies like Symantec Corporation, MacAfee etc.
So this field is putting up a big employment potential for the
young generation of today. And not to forget,there is no end to
the complexity of this subject, which means that any amount of
research willnot go futile for the world of computers.
BOOKS:Computer networking: A Top-Down Approach Featuring the
Internet-JamesF.Kurose, Keith W.Ross.
Networks for Computer Scientists and Engineers: Youlu Zheng, Shakil
Akhtar.
WEBSITES:
www.iec.org/online-
http://ftp.research.att.com/dist/internetsecurity/-
http://www.jjtc.com/stegdoc/
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
162
ISBN: 378-26-138420-01

More Related Content

PDF
End end-security
PDF
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
PDF
Achieving data integrity by forming the digital signature using RSA and SHA-1...
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Privacy Enhanced Online Payment System
PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
PDF
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
End end-security
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Achieving data integrity by forming the digital signature using RSA and SHA-1...
International Refereed Journal of Engineering and Science (IRJES)
Privacy Enhanced Online Payment System
Literature Survey: Secure transmitting of data using RSA public key implement...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...

What's hot (20)

PDF
Security of rabin p key encapsulation mechanism
DOC
Summer report crypto
PDF
Survey Paper: Cryptography Is The Science Of Information Security
PPTX
Security services and mechanisms
PDF
Efficient Data Security for Mobile Instant Messenger
PDF
CNS Solution
PDF
Cryptographic Algorithms For Secure Data Communication
PDF
Efficient Data Security for Mobile Instant Messenger
PDF
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
PDF
CryptoQR System based on RSA
PPTX
Efficient authentication for mobile and pervasive computing
PPTX
Digital signatures and e-Commerce
DOC
Networksecurity1 1
PDF
Modified RSA-based algorithm: a double secure approach
PDF
Network security unit 1,2,3
PDF
Bt0088 cryptography and network security2
PDF
Mattias eriksson
DOCX
Efficient authentication for mobile and pervasive computing
PDF
Ransomware protection in loT using software defined networking
DOCX
Seminar report on symmetric key
Security of rabin p key encapsulation mechanism
Summer report crypto
Survey Paper: Cryptography Is The Science Of Information Security
Security services and mechanisms
Efficient Data Security for Mobile Instant Messenger
CNS Solution
Cryptographic Algorithms For Secure Data Communication
Efficient Data Security for Mobile Instant Messenger
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
CryptoQR System based on RSA
Efficient authentication for mobile and pervasive computing
Digital signatures and e-Commerce
Networksecurity1 1
Modified RSA-based algorithm: a double secure approach
Network security unit 1,2,3
Bt0088 cryptography and network security2
Mattias eriksson
Efficient authentication for mobile and pervasive computing
Ransomware protection in loT using software defined networking
Seminar report on symmetric key
Ad

Viewers also liked (19)

PDF
new resume old
PPTX
File 5 removed 1 word 1
PDF
Iaetsd gesture
PDF
Iaetsd implementation of aho corasick algorithm
PDF
Iaetsd implementation of chaotic algorithm for secure image
PPTX
File 5 removed 4 slides 1
PDF
Samsung Enterprise Forum (Москва, 2014)
PDF
Iaetsd organizing the trust model in peer-to-peer system using
PDF
Iaetsd literature review on generic lossless visible watermarking &
PDF
Iaetsd heuristics to detect and extract license plates
PDF
Invitation client
PDF
Kp rail visionevent_18nov2015
PDF
Iaetsd preparation of w.p.s for stainless steel (ni, cr, mo, nu) welding
PDF
Iaetsd manet a reliable network in disaster areas
PPTX
File 5 removed 1 word from 5 slides 1
PPTX
File 5 removed 1 word 2
PPTX
Noche buena para para ti, hermano amado
PDF
Iaetsd near field
PPTX
Capítulo 12. Estrategias competitivas
new resume old
File 5 removed 1 word 1
Iaetsd gesture
Iaetsd implementation of aho corasick algorithm
Iaetsd implementation of chaotic algorithm for secure image
File 5 removed 4 slides 1
Samsung Enterprise Forum (Москва, 2014)
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd heuristics to detect and extract license plates
Invitation client
Kp rail visionevent_18nov2015
Iaetsd preparation of w.p.s for stainless steel (ni, cr, mo, nu) welding
Iaetsd manet a reliable network in disaster areas
File 5 removed 1 word from 5 slides 1
File 5 removed 1 word 2
Noche buena para para ti, hermano amado
Iaetsd near field
Capítulo 12. Estrategias competitivas
Ad

Similar to Iaetsd network security and (19)

PPTX
Secure communication in Networking
PPT
CTO-CybersecurityForum-2010-RonWilliams
PDF
Review on variants of Security aware AODV
DOCX
Report on Network Security And Privacy
PDF
A01450131
PDF
E-Commerce security
PPTX
network security ppt.pptx
PPTX
Iot(security)
PDF
Nt1310 Unit 6 Powerpoint
PDF
Communications Technologies
PDF
Network Security
PPTX
Iot Security
DOC
Social Engg. Assignment it17 final (1)
DOC
E-commerce Security
PPTX
network_security_ppt[1].pptx
PPTX
cybersecurity
PPTX
Information Security and Privacy-Unit-2.pptx
PPTX
network security ppt.pptx
Secure communication in Networking
CTO-CybersecurityForum-2010-RonWilliams
Review on variants of Security aware AODV
Report on Network Security And Privacy
A01450131
E-Commerce security
network security ppt.pptx
Iot(security)
Nt1310 Unit 6 Powerpoint
Communications Technologies
Network Security
Iot Security
Social Engg. Assignment it17 final (1)
E-commerce Security
network_security_ppt[1].pptx
cybersecurity
Information Security and Privacy-Unit-2.pptx
network security ppt.pptx

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
PDF
iaetsd Software defined am transmitter using vhdl
PDF
iaetsd Health monitoring system with wireless alarm
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
PDF
iaetsd Economic analysis and re design of driver’s car seat
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
PDF
Fabrication of dual power bike
PDF
Blue brain technology
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
PDF
iirdem Surveillance aided robotic bird
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
iaetsd Robots in oil and gas refineries
PDF
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iaetsd Shared authority based privacy preserving protocol
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Robots in oil and gas refineries
iaetsd Modeling of solar steam engine system using parabolic

Recently uploaded (20)

PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Design Guidelines and solutions for Plastics parts
PPTX
Current and future trends in Computer Vision.pptx
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
introduction to high performance computing
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
Amdahl’s law is explained in the above power point presentations
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Module 8- Technological and Communication Skills.pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Soil Improvement Techniques Note - Rabbi
Abrasive, erosive and cavitation wear.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Design Guidelines and solutions for Plastics parts
Current and future trends in Computer Vision.pptx
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
introduction to high performance computing
Categorization of Factors Affecting Classification Algorithms Selection
Fundamentals of safety and accident prevention -final (1).pptx
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Amdahl’s law is explained in the above power point presentations

Iaetsd network security and

  • 1. NETWORK SECURITY AND CRYPTOGRAPHY G.HarshaVardhan 3rd year-CSE SRM University, Chennai. Mobile no: 9791095378 ABSTRACT: Network security is a complicated subject, historically onlyincreasingnumber of people need to understand the However, as more and more people become ``wired'', tackled by well-trained andexperienced experts. Basics of security in a networked world. Thisdocument was written with the basic computer user and information systems manager inmind, explaining the concepts needed to read through the hype in the marketplace andunderstand risks and how to deal with them. So it is very important for all the users to getfamiliar with various aspects of Network Security. In the article basics of Network Security are discussed. With the millions of Internet users able to pass information fromthe network, the security of business networks is a major concern. The very nature of theInternet makes it vulnerable to attack. The hackers and virus writers try to attack theInternet and computers connected to the Internet. With the growth in business use of theInternet, network security is rapidly becoming crucial to the development of the Internet.Many business set up firewalls to control access to their networks by persons using the Internet INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 150 ISBN: 378-26-138420-01
  • 2. Introduction: For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem. The requirements of information security within an organization have undergone two major changes in the last several decades.Before the widespread use of data processing equipment ,the security of information felt to be valuable to an organization was provided primarily by physical and administrative means . .with the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident .this is especially the case for a shared system such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network. The generic name for the collection of tools to protect data and to thwart hackers is “computer security”. Network security: Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authorized to use. Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone. Network security problems can be divided roughly into four closely intertwined areas: secrecy, authentication, nonrepudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 151 ISBN: 378-26-138420-01
  • 3. before revealing sensitive information or entering into a business deal. Nonrepudiation deals with signatures. Secracy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message, this necessarily requires that the message besomehow encrypted (disguise data) so that an intercepted message can not be decrypted (understood) by an interceptor. This aspect of secrecy is probably the most commonly perceived meaning of the term "securecommunication." Note, however, that this is not only a restricted definition of secure communication , but a rather restricted definition of secrecy as well. Authentication :Both the sender and receiver need to confirm the identity of other party involved in the communication - to confirm that the other party is indeed who or what they claim to be. Face-to- face human communication solves this problem easily by visual recognition. When communicating entities exchange messages over a medium where they can not "see" the other party, authentication is not so simple. Why, for instance, should you believe that a received email containing a text string saying that the email came from a friend of yours indeed came from that friend? If someone calls on the phone claiming to be your bank and asking for your account number, secret PIN, and account balances for verification purposes, would you give that information out over the phone? Hopefully not. Message Integrity: Even if the sender and receiver are able to authenticate each other, they also want to insure that the content of their communication is not altered, either malicously or by accident, in transmission. Extensions to the checksumming techniques that we encountered in reliable transport and data link protocols Nonrepudiation: Nonrepudiation deals with signatures Having established what we mean by secure communication, let us next consider exactly what is meant by an "insecurechannel." What INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 152 ISBN: 378-26-138420-01
  • 4. information does an intruder have access to, and what actions can be taken on the transmitted data? Figure illustrates the scenario Alice, the sender, wants to send data to Bob, the receiver. In order to securely exchange data, while meeting the requirements of secrecy, authentication, and message integrity, Alice and Bob will exchange both control message anddata messages (in much the same way that TCP senders and receivers exchange both control segments and data segments). All, or some of these message will typically be encrypted. A passive intruder can listen to and record the control and data messages on the channel; an active intruder can remove messages from the channel and/or itself add messages into the channel. Network Security Considerations in the Internet :- Before delving into the technical aspects of network security in the following sections, let's conclude our introduction by relating our fictitious characters - Alice, Bob, and Trudy - to "real world" scenarios in today's Internet . Let's begin with Trudy, the network intruder. Can a "real world" network intruder really listen to and record passively receives all data-link-layer frames passing by the device's network interface. In a broadcast environment INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 153 ISBN: 378-26-138420-01
  • 5. such as an Ethernet LAN, this means that the packet sniffer receives all frames being transmitted from or to all hostson the local area network. Any host with an Ethernet card can easily serve as a packet sniffer, as the Ethernet interface card needs only be set to "promiscuous mode" to receive all passing Ethernet frames. These frames can then be passed on to application programs that extract application-level data. For example, in the telnet scenario , the login password prompt sent from A to B, as well as the password entered at B are "sniffed" at host C. Packet sniffing is a double-edged sword - it can be invaluable to a network administrator for network monitoring and management but also used by the unethical hacker. Packet-sniffing software is freely available at various WWW sites, and as commercial products. Cryptography:- Cryptography comes from the Greek words for ''secret writing.'' It has a long and colorful history going back thousands of years. Professionals make a distinction between ciphers and codes. A cipher is a character-for-character or bit-for-bit transformation, without regard to the linguistic structure of the message. In contrast, a code replaces one word with another word or symbol. Codes are not used any more, although they have a glorious history The messages to be encrypted, known as the plaintext, are transformed by a function that is parameterized by a key. The output of the encryption process, known as the ciphertext, is then transmitted, often by messenger or radio. We assume that the enemy, or intruder, hears and accurately copies down the complete ciphertext. However, unlike the intended recipient, he does not know what the decryption key is and so cannot decrypt the ciphertext easily. Sometimes the intruder can not only listen to the communication channel (passive intruder) but can also record messages and play them back later, inject his own messages, or modify legitimate messages before they get to the receiver (active intruder). The art of breaking ciphers, called cryptanalysis, and the art devising them (cryptography) is collectively known as cryptology. It will often be useful to have a notation for relating plaintext, ciphertext, and keys. We will use C = EK(P) to mean that the INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 154 ISBN: 378-26-138420-01
  • 6. encryption of the plaintext P using key K gives the ciphertext C. Similarly, P = DK(C) represents the decryption of C to get the plaintext again. Two Fundamental Cryptographic Principles: Redundancy The first principle is that all encrypted messages must contain some redundancy, that is, information not needed to understand the message. Cryptographic principle 1: Messages must contain some redundancy Freshness Cryptographic principle 2: Some method is needed to foil replay attacks One such measure is including in every message a timestamp valid only for, say, 10 seconds. The receiver can then just keep messages around for 10 seconds, to compare newly arrived messages to previous ones to filter out duplicates. Messages older than 10 seconds can be thrown out, since any replays sent more than 10 seconds later will be rejected as too old. Symmetric key Encryption model: Beyond that ,the security of conventional encryption depends on the secracy of the key ,not the secrecy of the algorithm. We do not need to keep the algorithm secret, we need to keep only the secret key. The fact that the algorithm need not be kept secret means that manufactures can and have developed low cost chip implementations of data encryption algorithms. these chips are widely available and incorporated in to a number of products. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 155 ISBN: 378-26-138420-01
  • 7. Substitution Ciphers In a substitution cipher each letter or group of letters is replaced by another letter or group of letters to disguise it. One of the oldest known ciphers is the Caesar cipher, attributed to Julius Caesar. In this method, a becomes D, b becomes E, c becomes F, ... , and z becomes C. For example, attack becomes DWWDFN. The next improvement is to have each of the symbols in the plaintext, say, the 26 letters for simplicity, map onto some other letter. For example, plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z ciphertext: Q W E R T Y U I O P A S D F G H J K L Z X C V B N M Transposition Ciphers:Substitution ciphers preserve the order of the plaintext symbols but disguise them. Transposition ciphers, in contrast, reorder the letters but do not disguise them depicts a common transposition cipher, the columnar transposition. M E G A B U C K 7 4 5 1 2 8 3 6 W E L C O M E T PLAIN TEXT: WELCOME TO SAfire-2K8,CHIRALA, O S A f i r e 2 PRAKASAM, AP. K 8 C H I R A L CIPHER TEXT: CfHAOiIKEeASES8PALACRPT2LA A P R A K A S A WOKAMMRRA M A P The cipher is keyed by a word or phrase not containing any repeated letters. In this example, MEGABUCK is the key. The purpose of the key is to number the columns, column 1 being under the key letter closest to the start of the alphabet, and so on. The plaintext is written horizontally, in rows, padded to fill the matrix if need be. The ciphertext is read out by columns, starting with the column whose key letter is the lowest. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 156 ISBN: 378-26-138420-01
  • 8. Public key algorithm: While there may be many algorithms and keys that have this property, the RSA algorithm (named after its founders, Ron Rivest, Adi Shamir, and Leonard Adleman) has become almost synonymous with public keycryptography. In order to choose the public and private keys, one must do the following: Choose two large prime numbers, p and q. How large should p and q be? The larger the values, the more difficult it is to break RSA but the longer it takes to perform the encoding and decoding. RSA Laboratories recommends that the product of p and q be on the order of 768 bits for personal use and 1024 bits for corporate use . Compute n = pq and z = (p-1)(q-1). Choose a number, e, less than n, which has no common factors (other than 1) with z. (In this case, e and z are said to be relatively prime). The letter 'e' is used since this value will be used in encryption. Find a number, d, such that ed -1 is exactly divisible (i.e., with no remainder) by z. The letter 'd' is used because this value will be used in decryption. Put another way, given e, we choose d such that the integer remainder when ed is divided by z is 1. (The integer remainder when an integer x is divided by the integer n, is denoted x mod n). The public key that Bob makes available to the world is the pair of numbers (n,e); his private key is the pair of numbers (n,d). key distribution: For symmetric key cryptograghy , the trusted intermediary is called a Key Distribution Center (KDC), which is a single, trusted network entity with whom one has established a shared secret key. We will see that one can use the KDC to obtain the shared keys needed to communicate securely with all other network entities. For public key cryptography, the trusted intermediary is called a Certification Authority (CA). A certification INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 157 ISBN: 378-26-138420-01
  • 9. authority certifies that a public key belongs to a particular entity (a person or a network entity). For a certified public key, if one can safely trust the CA that the certified the key, then one can be sure about to whom the public key belongs. Once a public key is certified, then it can be distributed from just about anywhere, including a public key server, a personal Web page or a diskette. security in the layers: Before getting into the solutions themselves, it is worth spending a few moments considering where in the protocol stack network security belongs. There is probably no one single place. Every layer has something to contribute. physical layer:In the physical layer wiretapping can be foiled by enclosing transmission lines in sealed tubes containing gas at high pressure. Any attempt to drill into a tube will release some gas, reducing the pressure and triggering an alarm. Some military systems use this technique. Data link layer:In this layer, packets on a point-to-point line can be encrypted as they leave one machine and decrypted as they enter another. All the details can be handled in the data link layer, with higher layers oblivious to what is going on. This solution breaks down when packets have to traverse multiple routers, however, because packets have to be decrypted at each router, leaving them vulnerable to attacks from within the router. Network layer:In this layer, firewalls can be installed to keep good packets and bad packets out. IP security also functions in this layer. In the transport layer, entire connections can be encrypted, end to end, that is, process to process. For maximum security, end-to-end security is required . Finally, issues such as user authentication and nonrepudiation can only be handled in the application layer. Since security does not fit neatly into any layer Secure Internet Commerce : SET (Secure Electronic Transactions) is a protocol specifically designed to secure payment-card transactions over the Internet. It was originally developed by Visa International and MasterCard International in February 1996 with participation from leading technology companies around the world .SET Secure Electronic INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 158 ISBN: 378-26-138420-01
  • 10. Transaction LLC (commonly referred to as SET Co) was established in December 1997 as a legal entity to manage and promote the global adoption of SET 1. Bob indicates to Alice that he is interested in making a credit card purchase. 2. Alice sends the customer an invoice and a unique transaction identifier. 3. Alice sends Bob the merchant's certificate which includes the merchant's public key. Alice also sends the certificate for her bank, which includes the bank's public key. Both of these certificates are encrypted with the private key of a certifying authority. 4. Bob uses the certifying authority's public key to decrypt the two certificates. Bob now has Alice's public key and the bank's public key. 5. Bob generates two packages of information: the order information (OI) package and the purchase instructions (PI) package. The OI, destined for Alice, contains the transaction identifier and brand of card being used; it does not include Bob's card number. The PI, destined for Alice's bank, contains the transaction identifier, the card number and the purchase amount agreed to Bob. The OI and PI are dual encrypted: the OI is encrypted with Alice's public key; the PI is encrypted with Alice's bank's public key. (We are bending the truth here in order to see the big picture. In reality, the OI and PI are encrypted with a customer-merchant session key INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 159 ISBN: 378-26-138420-01
  • 11. and a customer-bank session key.) Bob sends the OI and the PI to Alice. 6.Alice generates an authorization request for the card payment request, which includes the transaction identifier. 7.Alice sends to her bank a message encrypted with the bank's public key. (Actually, a session key is used.) This message includes the authorization request, the PI package received from Bob, and Alice's certificate . 8.Alice's bank receives the message and unravels it. The bank checks for tampering. It also make sure that the transaction identifier in the authorization request matches the one in Bob's PI package. 9.Alice's bank then sends a request for payment authorization to Bob's payment-card bank through traditional bank-card channels -- just as Alice's bank would request authorization for any normal payment-card transaction. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 160 ISBN: 378-26-138420-01
  • 12. One of the key features of SET is the non-exposure of the credit number to the merchant. This feature is provided in Step 5, in which the customer encrypts the credit card number with the bank's key. Encrypting the number with the bank's key prevents the merchant from seeing the credit card. Note that the SET protocol closely parallels the steps taken in a standard payment-card transaction. To handle all the SET tasks, the customer will have a so-called digital wallet that runs the client-side of the SET protocol and stores customer payment-card information (card number, expiration date, etc.) Conclusion: All the three techniques discussed in this presentation i.e. network security; cryptography andfirewalls are most widely used and implemented networks security tools. Each of them had itsown significance in its own mode. For example, a single organization or establishment tomaintain privacy of information within itself can use cryptography. These methods are beingused to provide confidentiality required by the network. There is a lot of scope for thedevelopment in this field. Digital signatures are one of the latest developments in the field of c ry p t o g r a p hy . Wi t h t h e in c r e a s e i n n u mb e r o f c o m p u te rs , a nd t he u s a g e INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 161 ISBN: 378-26-138420-01
  • 13. o f c o mp u te r s worldwide the demand for network security is increasing exponentially. This has led to thedevelopment of major companies like Symantec Corporation, MacAfee etc. So this field is putting up a big employment potential for the young generation of today. And not to forget,there is no end to the complexity of this subject, which means that any amount of research willnot go futile for the world of computers. BOOKS:Computer networking: A Top-Down Approach Featuring the Internet-JamesF.Kurose, Keith W.Ross. Networks for Computer Scientists and Engineers: Youlu Zheng, Shakil Akhtar. WEBSITES: www.iec.org/online- http://ftp.research.att.com/dist/internetsecurity/- http://www.jjtc.com/stegdoc/ INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 162 ISBN: 378-26-138420-01