You are on page 1of 6

NETWORK SECURITY

AND
CRYPTOGRAPHY
Theory and Practice

(Choice Based Credit System (CBCS) Pattern)


(For B. Sc. Computer Science, BCA, M.Sc.(IT), and MCA Courses)

By

Dr. P.Rizwan Ahmed, MCA., M.Sc.,M.A.,M.Phil.,Ph.D


Head of the Department
Department of Computer Applications &
PG Department of Information Technology
Mazharul Uloom College, Ambur - 635 802
Vellore Dist. Tamil Nadu.

Margham Publications
No.24, Rameswaram Road, T- Nager,
Chennai- 600 017 Phone:(044) 2432 2469
Web Site: www.margham.in
E-mail: www.margham.tn@gmail.com

CONTENTS
Preface
Acknowledgement

Chapter 1

Computer Networks

1.1 Introduction
1.2 Communication media
1.3 Computer Network
1.4 Goals of Computer Networks
1.5 Components of Network
1.6 Uses of Computer Networks
1.7 Network Hardware
1.7.1 Transmission Technologies / Network Technology
1.7.1.1 Broadcast Networks
1.7.1.2 Point to Point Networks
1.7.2 Network Topologies
1.7.2.1 Bus Topology
1.7.2.2Star Topology
1.7.2.3 Ring Topology
1.7.2.4 Mesh Topology
1.7.2.5 Tree Topology
1.7.3 Categories of Networks
1.7.3.1 Local Area Network (LAN)
1.7.3.2 Metropolitan Area Network (MAN)
1.7.3.3 Wide Area Network (WAN)
1.7.4 Difference between LAN and MAN and WAN

1.7.5 Wireless Networks


1.7.6 Home Networks
1.8 Network Software
1.8.1 Protocol hierarchies
1.8.2 Design Issues for the layers
1.8.3 Connection Oriented and Connectionless Services
1.8.3.1 Connection Oriented
1.8.3.2 Connectionless
1.8.4 Differentiate between connection oriented and connectionless services
1.9 Reference Models

1.10 TCP/IP Reference Model


1.11 Difference between OSI Reference Model and TCP/IP Reference Model
1.12 Example Networks
1.12.1 Internet
1.12.2 ARPANET
1.12.3 NSFNET
1.12.4 Connection-Oriented Networks: X.25, Frame Relay, and ATM
1.12.4.1 X.25 Networks
1.12.4.2 Frame Relay
1.12.4.3 ATM (Asynchronous Transfer Mode) / B-ISDN
1.12.4.4 ATM Reference Model
1.12.4.5 Benefits / Advantages of ATM
1.13 Ethernet
1.14 Networking Standards

Summary
Review Questions and Problems
Chapter 2

Physical Layer

2.1 Basis for Data Communication


2.2 Theoretical Basis for Data Communication
2.3 Applications of Data Communications
2.4 Transmission Media
2.4.1 Guided Transmission Media
2.4.1.1 Twisted Pair
2.4.1.2 Coaxial Cable
2.4.1.3 Fiber Optic Cable
2.4.2 Wireless Transmission / Unguided Transmission Media
2.4.2.1 Radio Transmission
2.4.2.2 Microwave Transmission
2.4.2.3 Infrared
2.4.2.4 Satellites Communications
2.5 Difference between Guided and Unguided Media
Summary
Review Question and Problems

Chapter 3
3.1 Introduction
3.2 OSI Security Architecture

Introduction

3.3 SECURITY Attacks


3.3.1 passive Attacks
3.3.2 Active ATTACKS
3.3.3 Difference between Passive Attack and Active Attack
3.4 Security Services
3.5 Security Mechanisms
3.6 A Model for Network Security
Summary
Review Question and Problems

Chapter 4

Conventional Encryption Model

4.1 Introduction
4.2 Symmetric Cipher Model
4.3 Classical Encryption Techniques
4.4Substitution Techniques
4.5 Transposition techniques
4.6 Steganography
4.7 Conventional Encryption Algorithm
4.7.1 Data Encryption Standard (DES)
4.7.2 Applications of Cryptography
Summary
Review Question and Problems
Chapter 5

Public Key Cryptography

5.1 Principles of Public Key Cryptosystems


5.2 RSA Algorithm
5.3 Key Management
5.4 Diffie-Hellman Key Exchange
Summary
Review Questions and Problems
Chapter 6
6.1 Introduction
6.2 Prime Numbers
6.3 Relatively Prime Numbers
6.4 Fermats Theorem
6.5 Eulers Theorem
6.6 Testing of Primality
6.7 Euclids Algorithm

Introduction to Number Theory

6.8 Chinese Remainder Theorem


Summary
Review Questions and Problems

Chapter 7

Message Authentication

7.1 Introduction
7.2 Authentication Requirements
7.3 Authentication Functions
7.4 Message Encryption
7.5 Hash Functions
7.5.1 Hash Functions Requirements / Hash Function Properties
7.5.2 Birthday attack
Summary
Review Questions
Chapter 8

SHA and Digital Signature

8.1 Secure Hash Algorithm


8.1.1 SHA-512 Logic
8.1.2 SHA-512 Overview
8.1.3 SHA-512 Compression Function
8.1.4 SHA-512 Round Function
8.2 Digital Signature
8.2.1 Direct Digital Signature
8.2.2 Arbitrated Digital Signature
8.3 Authentication Protocols
8.4 Digital Signature Standard (DSS)
8.5 Kerberos
Summary
Review Questions

Chatper-9
9.1 Pretty Good Privacy (PGP)
9.2 S/MIME
Summary
Review Questions

Electronic mail Security

Chapter 10

IP Security Overview

10.1 IP Security Overview


10.1.1 Need for IPSec
10.1.1 Benefits of IPSec
10.2 IP Security Architecture
Summary
Review Questions
Chapter 11

Intruders

11.1 Intruders
11.1.1 Hackers
11.1.2 Insider Attacks
11.2 Intrusion Detection
11.3 Password Management
Summary
Review Questions
Chapter 12
12.1 Introduction
12.2 Design Goals of Firewalls
12.3 Limitations of Firewalls
Summary
Review Questions
APPENDIX A ; Past University Question Papers.
APPENDIX B : Multiple Choice Questions
APPENDIX C : Two marks Question and Answer
APPENDIX D : Prime Numbers between 1 and 1000

Firewalls

You might also like