bankkvm.blogg.se

Cryptography & network security forouzan pdf
Cryptography & network security forouzan pdf













cryptography & network security forouzan pdf cryptography & network security forouzan pdf

The cryptographic algorithms that are widely accepted are outlined with their relative advantages and disadvantages. The cryptographic techniques are broadly classified into three categories namely symmetric-key cryptography, asymmetric-key cryptography and authentication. The original data is restructured by the intended receiver using decryption algorithms. The encryption algorithms perform scrambling of ordinary text and generate an unreadable format for the third party known as ciphertext. The cryptography technique consists of encryption and decryption algorithms. This chapter primarily focuses on cryptography techniques and their role in preserving the network security. It assures the confidentiality and integrity of data as well as provides authentication and non-repudiation to the users. Cryptography is an automated mathematical tool that plays a vital role in network security. The antivirus and antimalware software are also part of network security for protection from malware such as spyware, ransomware, trojans, worms, and viruses. Data security includes encryption, tokenization, and key management practices in protecting data across all applications and platforms. The network security schemes vary depending on the types of the network, that is, public or private, wired or wireless. The application domains of security mechanisms cover both public and private computer networks which are used in everyday jobs for conducting transactions and communications among business partners, government agencies, enterprises and individuals. The design aspects of the network security mechanism involve both hardware and software technologies. The security mechanisms enhance the usability and integrity of the network. Network administrators employ several security mechanisms to protect data in the network from unauthorized access and various threats.















Cryptography & network security forouzan pdf