首页    期刊浏览 2024年11月24日 星期日
登录注册

文章基本信息

  • 标题:Cryptography And Network Security Principles And Practices
  • 本地全文:下载
  • 作者:Prashant singh ; Pratik kr. Sharma ; Tanuj kr. Aggarwal
  • 期刊名称:International Journal of Engineering and Computer Science
  • 印刷版ISSN:2319-7242
  • 出版年度:2012
  • 卷号:1
  • 期号:1
  • 页码:01-10
  • 出版社:IJECS
  • 摘要:

    The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. That is a broad statement that covers a host of possibilities. To give you a feel for the areas covered in this paper, consider the following examples of security violations:

    1. User A transmits a file to user B. The file contains sensitive information (e.g., payroll records) that is to be protected from disclosure. User C, who is not authorized to read the file, is able to monitor the transmission and capture a copy of the file during its transmission.This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic techniques.

    Cryptographic algorithms and protocols can be grouped into four main areas:

    • Symmetric encryption: Used to conceal the contents of blocks or streams of data of any size, including messages, files, encryption keys, and passwords.

    • Asymmetric encryption: Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.

    • Data integrity algorithms: Used to protect blocks of data, such as messages, from alteration.

    • Authentication protocols: These are schemes based on the use of cryptographicalgorithms designed to authenticate the identity of entities.

    Computer and network security can be described as the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/ data, and telecommunications

国家哲学社会科学文献中心版权所有