Professional Documents
Culture Documents
AND
CRYPTOGRAPHY
Theory and Practice
By
Margham Publications
No.24, Rameswaram Road, T- Nager,
Chennai- 600 017 Phone:(044) 2432 2469
Web Site: www.margham.in
E-mail: www.margham.tn@gmail.com
CONTENTS
Preface
Acknowledgement
Chapter 1
Computer Networks
1.1 Introduction
1.2 Communication media
1.3 Computer Network
1.4 Goals of Computer Networks
1.5 Components of Network
1.6 Uses of Computer Networks
1.7 Network Hardware
1.7.1 Transmission Technologies / Network Technology
1.7.1.1 Broadcast Networks
1.7.1.2 Point to Point Networks
1.7.2 Network Topologies
1.7.2.1 Bus Topology
1.7.2.2Star Topology
1.7.2.3 Ring Topology
1.7.2.4 Mesh Topology
1.7.2.5 Tree Topology
1.7.3 Categories of Networks
1.7.3.1 Local Area Network (LAN)
1.7.3.2 Metropolitan Area Network (MAN)
1.7.3.3 Wide Area Network (WAN)
1.7.4 Difference between LAN and MAN and WAN
Summary
Review Questions and Problems
Chapter 2
Physical Layer
Chapter 3
3.1 Introduction
3.2 OSI Security Architecture
Introduction
Chapter 4
4.1 Introduction
4.2 Symmetric Cipher Model
4.3 Classical Encryption Techniques
4.4Substitution Techniques
4.5 Transposition techniques
4.6 Steganography
4.7 Conventional Encryption Algorithm
4.7.1 Data Encryption Standard (DES)
4.7.2 Applications of Cryptography
Summary
Review Question and Problems
Chapter 5
Chapter 7
Message Authentication
7.1 Introduction
7.2 Authentication Requirements
7.3 Authentication Functions
7.4 Message Encryption
7.5 Hash Functions
7.5.1 Hash Functions Requirements / Hash Function Properties
7.5.2 Birthday attack
Summary
Review Questions
Chapter 8
Chatper-9
9.1 Pretty Good Privacy (PGP)
9.2 S/MIME
Summary
Review Questions
Chapter 10
IP Security Overview
Intruders
11.1 Intruders
11.1.1 Hackers
11.1.2 Insider Attacks
11.2 Intrusion Detection
11.3 Password Management
Summary
Review Questions
Chapter 12
12.1 Introduction
12.2 Design Goals of Firewalls
12.3 Limitations of Firewalls
Summary
Review Questions
APPENDIX A ; Past University Question Papers.
APPENDIX B : Multiple Choice Questions
APPENDIX C : Two marks Question and Answer
APPENDIX D : Prime Numbers between 1 and 1000
Firewalls