Visit: https://a2zcareers.viden.io
Classification of cryptographic attacks
passive attacks: passive attacks are in the nature of eaves dropping on, or monitoring of, transmissions the goal of the opponent is to obtain information that is being transmitted, passive attacks are of two types 1.release of message contents. 2.traffic analysis. Active attacks: the attacks involves some modifications of data stream or the creation of a false stream.
Substitution cipher techniques. -ceaser cipher
Substitution cipher techniques : it follows adding of letters, by using of key generator . It is a symmetric key transaction. It follows asymmetric and symmetric key transactions.
Play-fair cipher -substitution cipher techniques
Play fair cipher :it is also called as play fair square. It is a cryptographic technique, that is used for manual encryption of data. This scheme was invented by "Charles wheat stone " in 1854.
Vigenere cipher -substitution cipher technique.
Vigenere cipher : in this scheme, the set of related monoalphabetic substitution rules consisting of 26 ceaser ciphers with shifts of 0 through 25. STRENGTHS OF VIGENERE CIPHER. there are multiple cipher text letters for each plain text letter.
Cryptography and network security pdf
This PDF contains cryptography and network security concepts 1.secirity concepts. 2. Cryptography concepts. 3. Symmetric key ciphers. 4. Asymmetric key cipher. 5. Cryptographic hash functions. 6. Key management and distribution.
Advanced encryption standards.
Advanced encryption standards.(AES) AES found atleast 6 times faster than DES. AES is a symmetric key block cipher. It provides full specifications and design details.
transport-level security
TLS stands for Transport Level security. It is an IETF standardization initiative whose goal is to come out with an internet engineering task force
Cryptography and network security complete notes
This document contains all concepts of cryptography and network security..
Types of Security attacks, services and mechanisms.
This PPT explains about types of Security attacks, mechanism and services...
Substitution techniques and transposition techniques
This PPT contains all the details about substitution techniques and transposition techniques
threats to information security..
This PPT contains the concepts of information security threats..
Cryptography
This us helpful to all those who want to understand RSA in cryptography.