Knowledge in Cryptography and network security

Classification of cryptographic attacks

passive attacks: passive attacks are in the nature of eaves dropping on, or monitoring of, transmissions the goal of the opponent is to obtain information that is being transmitted, passive attacks are of two types 1.release of message contents. 2.traffic analysis. Active attacks: the attacks involves some modifications of data stream or the creation of a false stream.

Substitution cipher techniques. -ceaser cipher

Substitution cipher techniques : it follows adding of letters, by using of key generator . It is a symmetric key transaction. It follows asymmetric and symmetric key transactions.

Play-fair cipher -substitution cipher techniques

Play fair cipher :it is also called as play fair square. It is a cryptographic technique, that is used for manual encryption of data. This scheme was invented by "Charles wheat stone " in 1854.

Vigenere cipher -substitution cipher technique.

Vigenere cipher : in this scheme, the set of related monoalphabetic substitution rules consisting of 26 ceaser ciphers with shifts of 0 through 25. STRENGTHS OF VIGENERE CIPHER. there are multiple cipher text letters for each plain text letter.

Cryptography and network security pdf

This PDF contains cryptography and network security concepts 1.secirity concepts. 2. Cryptography concepts. 3. Symmetric key ciphers. 4. Asymmetric key cipher. 5. Cryptographic hash functions. 6. Key management and distribution.

Advanced encryption standards.

Advanced encryption standards.(AES) AES found atleast 6 times faster than DES. AES is a symmetric key block cipher. It provides full specifications and design details.

transport-level security

TLS stands for Transport Level security. It is an IETF standardization initiative whose goal is to come out with an internet engineering task force

Cryptography and network security complete notes

This document contains all concepts of cryptography and network security..

Types of Security attacks, services and mechanisms.

This PPT explains about types of Security attacks, mechanism and services...

Substitution techniques and transposition techniques

This PPT contains all the details about substitution techniques and transposition techniques

threats to information security..

This PPT contains the concepts of information security threats..

Cryptography

This us helpful to all those who want to understand RSA in cryptography.