![]() In the case of an ongoing interaction, such as the connection of a terminal to a host, In the case of a single message, such as a warning or alarm signal, the function of theĪuthentication service is to assure the recipient that the message is from the source The authentication service is concerned with assuring that a communication is ![]() X.800 divides these services into five categories and fourteen specific services. ![]() Processing or communication service that is provided by a system to give a specific kind of X.800 defines a security service as a service that is provided by a protocol layer ofĬommunicating open systems and that ensures adequate security of the systems or of dataĪlso the RFC 2828(Internet Security Glossary version 2) defines security services as a UNIT – 1: Services, Mechanisms and Attacks, The OSI security architecture, A Model for ![]() Services, mechanisms and attacks, The OSI security architecture, A model for Cryptography and Network Security, Atul Kahate, TMH, 2003.ī.G.S INSTITUTE OF TECHNOLOGY (B.G.S.I.T)ī.G Nagara, Nagamangala Tq, Mandya District- 571448ĭept. Cryptography and Network Security, Behrouz A. Cryptography and Network Security, William Stalling, Pearson Education, 2003.ġ. 7 Hrsįirewalls Design Principles, Trusted Systems. MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. Intruders, Intrusion Detection, Password Management. Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrsĭigital signatures, Authentication Protocols, Digital Signature Standard. Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. Services, mechanisms and attacks, The OSI security architecture, A model for network security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |