000 06163cam a2200601Ki 4500
001 on1139536172
003 OCoLC
005 20220711203540.0
006 m o d
007 cr cnu---unuuu
008 200206s2020 nju ob 001 0 eng d
040 _aDG1
_beng
_erda
_epn
_cDG1
_dDG1
_dEBLCP
_dAU@
_dUKAHL
_dDG1
_dOCLCQ
019 _a1141200499
020 _a9781119555759
_q(electronic bk.)
020 _a1119555752
_q(electronic bk.)
020 _z9781119555643
020 _z1119555647
029 1 _aAU@
_b000066723584
029 1 _aCHNEW
_b001077492
029 1 _aCHVBK
_b582680409
035 _a(OCoLC)1139536172
_z(OCoLC)1141200499
050 4 _aTK5105.59
_b.D468 2020eb
082 0 4 _a005.8
_223
049 _aMAIN
245 0 0 _aDesign and analysis of security protocol for communication /
_cedited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O.P. Verma.
250 _aFirst edition.
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc. ;
_aSalem, Massachusetts :
_bScrivener Publishing LLC,
_c[2020]
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--
_cProvided by publisher.
588 0 _aPrint version record.
505 0 _aCover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network
505 8 _a1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL)
505 8 _a1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption
505 8 _a2.2 Classical Encryption Techniques -- 2.2.1 Substitution Based -- 2.2.1.1 Caesar Cipher -- 2.2.1.2 Monoalphabetic Cipher -- 2.2.1.3 Playfair Cipher -- 2.2.1.4 Polyalphabetic Cipher -- 2.2.2 Transposition Based -- 2.2.2.1 Simple Columnar -- 2.2.2.2 Rail Fence Cipher -- 2.3 Evolutions of Modern Security Techniques -- 2.3.1 Stream Cipher Algorithms -- 2.3.1.1 One Time Pad (OTP) -- 2.3.1.2 RC-4 -- 2.3.1.3 A5/1 -- 2.3.2 Block Cipher Algorithms -- 2.3.2.1 Feistel Cipher Structure -- 2.3.2.2 Data Encryption Standard (DES) -- 2.3.2.3 Triple Data Encryption Standard (TDES)
505 8 _a2.3.2.4 International Data Encryption Algorithm (IDEA) -- 2.3.2.5 Blowfish -- 2.3.2.6 CAST-128 -- 2.4 Conclusion -- References -- Practice Set -- Review Questions and Exercises -- 3 Philosophy of Security by Cryptostakes Schemes -- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) -- 3.2 RSA Algorithm -- 3.3 Security Analysis of RSA -- 3.4 Exponentiation in Modular Arithmetic -- 3.5 Distribution of Public Keys -- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems -- 3.7 Discrete Logarithms -- 3.8 Diffie-Hellman Key Exchange -- 3.9 Review Exercise -- References
650 0 _aComputer networks
_xSecurity measures.
_93969
650 0 _aComputer network protocols.
_97514
650 7 _aComputer network protocols.
_2fast
_0(OCoLC)fst00872279
_97514
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_93969
655 4 _aElectronic books.
_93294
700 1 _aGoyal, Dinesh,
_d1976-
_eeditor.
_98696
700 1 _aBalamurigan, A.,
_eeditor.
_98697
700 1 _aPeng, Sheng-Lung,
_eeditor.
_98698
700 1 _aVerma, O. P.
_c(Telecommunications engineer),
_eeditor.
_98699
776 0 8 _iPrint version:
_tDesign and analysis of security protocol for communication.
_bFirst edition.
_dHoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2020]
_z9781119555643
_w(DLC) 2019045372
_w(OCoLC)1124779025
856 4 0 _uhttps://doi.org/10.1002/9781119555759
_zWiley Online Library
942 _cEBK
994 _aC0
_bDG1
999 _c69176
_d69176