TY - BOOK AU - Sehgal,Umesh AU - Kaur,Kuljeet TI - Network security and cryptography / SN - 9789350146637 AV - TK5105.59 .S444 2009 U1 - 005.8 23 PY - 2009/// ; Reprint 2022 CY - New Delhi, India PB - S.K. Kataria & Sons KW - Computer networks KW - Security measures KW - Cryptography N1 - Includes index; Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols N2 - "This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book ER -