Design and analysis of security protocol for communication / edited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O.P. Verma.

"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security p...

Full description

Saved in:
Bibliographic Details
Other Authors: Goyal, Dinesh, 1976- (Editor), Balamurigan, A. (Editor), Peng, Sheng-Lung (Editor), Verma, O. P. (Telecommunications engineer) (Editor)
Format: eBook
Language:English
Published: Hoboken, New Jersey : Salem, Massachusetts : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, [2020]
Edition:First edition.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1139536172
003 OCoLC
005 20241006213017.0
006 m o d
007 cr cnu---unuuu
008 200206s2020 nju ob 001 0 eng d
040 |a DG1  |b eng  |e rda  |e pn  |c DG1  |d DG1  |d EBLCP  |d AU@  |d UKAHL  |d DG1  |d OCLCQ  |d YDX  |d UKMGB  |d S2H  |d UMI  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ 
015 |a GBC013545  |2 bnb 
016 7 |a 019690871  |2 Uk 
019 |a 1141200499  |a 1222919934 
020 |a 9781119555759  |q (electronic bk.) 
020 |a 1119555752  |q (electronic bk.) 
020 |a 9781119555742  |q (ePub ebook) 
020 |a 1119555744 
020 |a 9781119555766  |q (PDF ebook) 
020 |a 1119555760 
020 |z 9781119555643 
020 |z 1119555647 
035 |a (OCoLC)1139536172  |z (OCoLC)1141200499  |z (OCoLC)1222919934 
037 |a 9781119555742  |b Wiley 
050 4 |a TK5105.59  |b .D468 2020eb 
049 |a HCDD 
245 0 0 |a Design and analysis of security protocol for communication /  |c edited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O.P. Verma. 
250 |a First edition. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons, Inc. ;  |a Salem, Massachusetts :  |b Scrivener Publishing LLC,  |c [2020] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--  |c Provided by publisher 
588 0 |a Print version record. 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network 
505 8 |a 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL) 
505 8 |a 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption 
505 8 |a 2.2 Classical Encryption Techniques -- 2.2.1 Substitution Based -- 2.2.1.1 Caesar Cipher -- 2.2.1.2 Monoalphabetic Cipher -- 2.2.1.3 Playfair Cipher -- 2.2.1.4 Polyalphabetic Cipher -- 2.2.2 Transposition Based -- 2.2.2.1 Simple Columnar -- 2.2.2.2 Rail Fence Cipher -- 2.3 Evolutions of Modern Security Techniques -- 2.3.1 Stream Cipher Algorithms -- 2.3.1.1 One Time Pad (OTP) -- 2.3.1.2 RC-4 -- 2.3.1.3 A5/1 -- 2.3.2 Block Cipher Algorithms -- 2.3.2.1 Feistel Cipher Structure -- 2.3.2.2 Data Encryption Standard (DES) -- 2.3.2.3 Triple Data Encryption Standard (TDES) 
505 8 |a 2.3.2.4 International Data Encryption Algorithm (IDEA) -- 2.3.2.5 Blowfish -- 2.3.2.6 CAST-128 -- 2.4 Conclusion -- References -- Practice Set -- Review Questions and Exercises -- 3 Philosophy of Security by Cryptostakes Schemes -- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) -- 3.2 RSA Algorithm -- 3.3 Security Analysis of RSA -- 3.4 Exponentiation in Modular Arithmetic -- 3.5 Distribution of Public Keys -- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems -- 3.7 Discrete Logarithms -- 3.8 Diffie-Hellman Key Exchange -- 3.9 Review Exercise -- References 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer network protocols. 
650 7 |a Computer network protocols  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Goyal, Dinesh,  |d 1976-  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjt9jX6w94WJGCxPqVybFq 
700 1 |a Balamurigan, A.,  |e editor. 
700 1 |a Peng, Sheng-Lung,  |e editor. 
700 1 |a Verma, O. P.  |c (Telecommunications engineer),  |e editor.  |1 https://id.oclc.org/worldcat/entity/E39PCjCkr7jQB3gWYmrdQh7MWC 
776 0 8 |i Print version:  |t Design and analysis of security protocol for communication.  |b First edition.  |d Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2020]  |z 9781119555643  |w (DLC) 2019045372  |w (OCoLC)1124779025 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=6040173  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD