Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
html
1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Contents:
Abstract
Introduction
Steganography
Cryptographic technologies
Based on layers
Based on algorithms
Applications of cryptography
Conclusion
2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
CRYPTOGRAPHY
NETWORK SECURITY
3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
panoramic view of the victims network the case with this. Nevertheless the
and then start digging the holes. security breaches and eavesdroppers, the
Today the illicit activities of technological prowess has been
the hackers are growing by leaps and stupendously developed to defy against
bounds, viz., “THE RECENT ATTACK each of the assaults. Our paper covers
ON THE DNS SERVERS HAS the ADVANCED technical combats that
CAUSED A LOT OF HULLABALOO have been devised all through the way,
ALL OVER THE WORLD”. However, thus giving birth to the notion of
fortunately, the antagonists reacted “NETWORK -SECURITY”. Various
promptly and resurrected the Internet antidotes that are in fact inextricable
world from the brink of prostration. with security issues are – Cryptography,
Since the inception of Authentication, Integrity and Non
conglomerating Computers with Repudiation, Key Distribution and
Networks the consequence of which certification, Access control by
shrunk the communication implementing Firewalls etc.
world,hitherto, umpteen ilks of security
breaches took their origin. Tersely To satiate the flaws in the network
quoting some security ditherers – security more and more advanced
Eavesdropping, Hacking, Hijacking, security notions are being devised day
Mapping, Packet Sniffing, 1Spoofing, by day. Our paper covers a wide
DoS & DDoS attacks, etc. perspective of such arenas where the
Newton’s law says “Every action has got contemporary cyber world is revolving
an equal but opposite reaction”. So is around viz.
modification and deletion. Many people
. Introduction: pay great amounts of lip service to
security but do not want to be bothered
Network security deals with the
with it when it gets in their way. It’s
problems of legitimate messages being
important to build systems and networks
captured and replayed. Network security
in such a way that the user is not
is the effort to create a secure computing
constantly reminded of the security
platform. The action in question can be
system. Users who find security policies
reduced to operations of access,
4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
way. The slightest change in signed that is a hidden. The most common
7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
Filling achievable.
10 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html
BIBOLOGRAPHY:
“Computer Networks ”,
by Andrew S.Tanunbaum
“Fighting Steganography
detection” by Fabian
Hansmann
“Network security” by
Andrew S.Tanenbaum
“Cryptography and
Network Security” by
William Stallings
“Applied Cryptography”
by Bruce Schneier,
JohnWillley and Sons Inc
URL:
http://www.woodmann.co
m/fravia/fabian2.html.
URL:
http://www.jjtc.com/stegd
oc/sec202.html.
11 Email: chinna_chetan05@yahoo.com