Home / Our Books /  Engineering Books < CS/IT Branch / Information System Security

More Books related to same category

Data Structure Algorithms using C

Rs. 330

8085 Microprocessor

Rs. 300

Product Development and Launching

Rs. 190

Artificial Intelligence Technique

Rs. 220

Protection of Power Systems

Rs. 180

Information System Security

By Arihant Khicha, Neeti Kapoor

3 Ratings | 1 Reviews

Rs. 275


Specifications of Information System Security

Book Details

  • 978-93-80311-92-0
  • English
  • 2012, 2013, 2014
  • Paper Back
  • -


  • 1. Number Theory, Algebraic Structures & Element of Information Theory
    Objectives, Introduction, Divisibility and Euclid Algorithms, Primes and Sieve of Eratosthenes, Testing for Primes and Prime Number Theorem, Prime and Composite Number, Relative Prime Numbers, The Simple Primality Test, Pseudoprimality Testing, The Miller-Rabin Randomized Primality Test, The Fermat’s Little Theorem, Euler’s Totient Function, Euler’s Theorem, Congruences and Computing Inverse in Congruences, Legendre and Jacobi Symbol, The Chinese Remainder Theorem, Groups, Rings and Fields, Groups, Rings, Fields, Division Algorithm, Polynomials Over a Field, Galois Fields, Entropy, Key Equivocation and Unicity Distance, Review Question.
    2. Introduction to Security & Cryptography
    Objectives, Introduction, Security Attacks, Passive Attacks, Active Attacks, Differences between Passive and Active Attacks, Security Services, Authentication, Access Control, Data Confidentiality, Data Integrity, Nonrepudiation, Availability, Security Mechanisms, Specific Security Mechanisms, Pervasive Security Mechanisms, Introduction to Cryptography, Symmetric Cipher Model, Types of Attacks on Encrypted Messages, Classical Cipher Techniques, Substitution Techniques, Transposition Techniques, Private Key Cryptosystem, Block Cipher Principles, Concept of Confusion and Diffusion in Block Cipher, Feistel Cipher Structure, Lucifer Algorithm, Data Encryption Standard (DES), Initial Permutation, Round Function, The Strength of DES, Double DES, Triple DES, International Data Encryption Algorithm (IDEA), Basic Principle of IDEA, Working Idea, Working of a Round, Subkey Generation for a Round, Output Transformation, IDEA Decryption, The Strength of IDEA, Differential & Linear Cryptanalysis, The Attack, as Originally Defined, S-BOX Theory, Link vs End to End Encryption, Link Encryption, End-to-End Encryption, Key Distribution in Symmetric Encryption, Review Questions.
    3. Principles of Public Key Cryptosystems
    Objectives, Introduction, Brief History of Asymmetric Key Cryptography, An Overview of Asymmetric Key Cryptography, Principles of Public Key Cryptosystems, Comparison Between Symmetric and Asymmetric Key Cryptography, Applications for Public Key Cryptosystems, Factorization, Common Factoring Techniques, Exponentiation in Modular Arithmetic, Discrete Logarithms, Modular Multiplication Using Intermediate Modulo-n Reductions, Square and Multiply Technique, Modular Reduction of the Exponent - The Totient, Public Key Crypto Algorithms, The RSA Algorithm, Diffie–Hellman Key Exchange Algorithm, The Security of RSA, Key Management, Distribution of Public Keys, Distribution of Secret Keys Using Public-Key Cryptography, Review Questions.
    4. Message Authentication & Hash Function
    Objectives, Introduction, Authentication Requireements, Authentication Functions, Message Encryption, Message Authentication Code (MAC), Hash Functions, Requirements for a Hash Function, Birthday Attacks and General Case of Duplication, Security of Hash Functions and MACs, Brute-Force Attacks, Cryptanalysis, Introduction to Hash & MAC Algorithm, Message Digest Algorithm, MD5 Message Digest Algorithm, Secure Hash Algorithm (SHA), Comparison between MD5 and SHA-1, Digital Signature, Digital Signature-RSA Based, ElGamal Signatures, Undeniable Signatures, Model of Authentication System, Substitution Game, Spoofing Game, Impersonation, One-way Authentication, Mutual Authentication, Mediated Authentication: Key Distribution Center, Review Questions.
    5. Authentication Service and E-mail Security
    Objectives, X.509 Authentication Service, Certificates, Obtaining a User’s Certificate, Revocation of Certificates, Authentication Procedures, X.509 Version 3, Key and Policy Information, Certificate Subject and Issuer Attributes, Certification Path Constraints, Email Security, Pretty Good Privacy (PGP), S/MIME, Review Questions.
    6. Network Security
    Objectives, Introduction, Architecture of IP Security, IPsec Protocol Documents, Security Associations (SAs), Security Policy Database, Security Association Database, Type of Security Associations, Authentication Header, AH Format, AH Location, How AH Deal with Reply-Attack, IP ESP (Encapsulating Security Payload), ESP Packet Format, ESP Header Location, Combining Security Associations, Authentication Plus Confidentiality, Basic Combinations of Security Associations, Secure Socket Layer (SSL), Working of SSL, SSL Protocol, Review Questions.
    7. Intursion Detection
    Objectives, Introduction, Audit Records, Statistical Anomaly Detection, Rule-Based Intrusion Detection, Honeypots, Types of Honeypots, Intrusion Detection Exchange Format, IDMEF Motivation, IDMEF Terminology, IDMEF Data Model, IDMEF Message Content, Password protection, Review Questions.
    K. Key Terms
    R. Refferences
    P. Paper

Reviews of Information System Security

  • 3
    Average Rating Based on 3 ratings
  • 0
  • 0
  • 2
  • 0
  • 0

komal gupta

04 Sep 2013

views about the book

theory is not so much good as compared to your other genius books

See All >