Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Authentication
Confidentiality
Integrity
SECURITY
Access Control
Non-Repudiation
Cryptography
and Information
Security
V.K. Pachghare
Cryptography and
Information Security
Second Edition
V.K. PACHGHARE
Associate Professor
Department of Computer Engineering and Information Technology
College of Engineering, Pune
(An Autonomous Institute of Government of Maharashtra)
Delhi-110092
2015
CRYPTOGRAPHY AND INFORMATION SECURITY, Second Edition
V.K. Pachghare
© 2015 by PHI Learning Private Limited, Delhi. All rights reserved. No part of this book may be
reproduced in any form, by mimeograph or any other means, without permission in writing from
the publisher.
ISBN-978-81-203-5082-3
The export rights of this book are vested solely with the publisher.
Published by Asoke K. Ghosh, PHI Learning Private Limited, Rimjhim House, 111, Patparganj
Industrial Estate, Delhi-110092 and Printed by Mudrak, 30-A, Patparganj, Delhi-110091.
To
my parents,
my wife Archana
and
my daughter Samiksha
Contents
Preface...................................................................................................................................xv
Acknowledgements...............................................................................................................xix
1. Introduction................................................................................................................. 1
1.1 Security 1
1.2 Elements of Information Security 2
1.2.1 Confidentiality 2
1.2.2 Integrity 2
1.2.3 Availability 2
1.3 Security Policy 3
1.4 Security Techniques 3
1.5 Steps for Better Security 4
1.6 Category of Computer Security 5
1.7 The Operational Model of Network Security 6
1.8 Security Services 6
1.9 Basic Network Security Terminology 7
1.9.1 Cryptography 7
1.9.2 Hacking 8
1.9.3 Encryption 8
1.9.4 Decryption 8
1.9.5 Cryptanalysis 9
1.10 Security Attacks 9
1.10.1 Passive Attack 9
1.10.2 Active Attack 10
Summary 12
Exercises 12
Multiple Choice Questions 13
v
vi Contents
5. Symmetric Ciphers.................................................................................................. 97
5.1 Introduction 97
5.2 Blowfish Encryption Algorithm 97
5.2.1 Key Expansion 98
5.2.2 Encryption 99
5.2.3 Blowfish Architecture 101
5.2.4 Cryptanalysis of Blowfish 102
5.3 RC5 102
5.3.1 Characteristics of RC5 103
5.3.2 Parameters 104
5.3.3 Cipher Modes in RC5 105
5.4 RC4 106
5.4.1 Design 106
5.4.2 Characteristics 106
5.4.3 Algorithms 106
5.5 RC6 107
5.5.1 Parameters of RC6 108
5.5.2 Basic Operations 108
5.5.3 Working of RC6 109
5.6 Comparison between RC6 and RC5 109
viii Contents
5.7 IDEA 110
5.7.1 Working of IDEA 111
5.7.2 Decryption 114
5.7.3 Security 115
Solved Problems 115
Summary 128
Exercises 128
Multiple Choice Questions 129
9. Authentication......................................................................................................... 202
9.1 Introduction 202
9.1.1 Objectives 202
9.1.2 Measurements 203
9.2 Authentication Methods 204
9.2.1 Password-based Authentication Method 204
9.2.2 Two-factor Authentication Method 206
9.2.3 Biometric Authentication Method 206
9.2.4 Extensible Authentication Protocol (EAP) 208
9.3 Message Digest 210
9.3.1 MD2 210
Cryptography And Information Security
30%
OFF