Cryptography

Encryption operation is done by substitution, transposition and product. For a system to be computationally secure, ¬†the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information. Symmetric Encryption: Mathematically, Y = Ek(X) Encryption Model, X = Dk(Y) […] Read more»

network-security

Network Security Services

Security services as per ITU-T X.800 are authentication, access control, data confidentiality, data integrity and non-repudiation. Security attacks can be categorized as interruption (attack on availability), interception (attack on confidentiality), modification (attack on integrity) and fabrication (attack on authenticity). Malicious programs like virus, worm, zombie are replication on behavior and ¬†trapdoors, trojan horse are non […] Read more»

network-security

Network Security: An Introduction

Network Security is very essential in any organization. Without network security, there is always threat in that organization for information being hacked and cracked. Network security is the protection of information and systems and hardware that use, store and transmit that information, as defined by National Telecommunications Security and Information System Security Committee. So, network […] Read more»