Hello There, Guest! RegisterLogin with Facebook
Login with Facebook

New Anna University Nov / Dec 2016 Examination Important Questions
New Anna University (UG / PG) Nov/Dec 2016 and Jan 2017 Theory , Practical Exam Timetable
>>> Anna University Sixth Semester Question Bank Collection (R2013) ECE,MECH,CSE,IT,EEE,CIVIL,EIE
>>> Anna University November/December 2015 Examination Question Papers
>>> Anna University Study Materials for all Departments
>>> Anna University Question Papers : April May June 2015 Question Papers | Nov Dec 2014 and Jan 2015 Question Papers

Register or Login to Submit Study Materials , Shoutbox and also to access Many Features !!

Vidyarthiplus Shop :: Handwritten Premium Lecture Notes
Share your Study Materials with us
Share your Study Materials with us : Click Here

EC2035 Cryptography and Network Security - Lecture Notes for Unit 3 - Edition 2014
#1


university:anna university
year:4th
sem:07
dept:ece
subject code:EC2035
subject:cryptography and network security
content:EC2035-cryptography and network security-lecture notes for unit 3-edition 2014

AUTHENTICATION REQUIREMENTS 

• Kind of attacks (threats) in the context of communications across a network 
1. Disclosure 
2. Traffic analysis 
3. Masquerade 
4. Content modification 
5. Sequence modification 
6. Timing modification 
7. Repudiation

1. Disclosure: Release of message contents to any person or process not possessing the appropriate cryptographic key. 
2. Traffic analysis
• Discovery of the pattern of traffic between parties. 
• In a connection-oriented application, the frequency and duration of connections could be determined. 
• In either a connection-oriented or connectionless environment, the number and length of messages between parties could be determined. 

3. Masquerade
• Insertion of messages into the network from a fraudulent source. 
• Includes the creation of messages by an opponent that are purported to come from an authorized entity. 
• Also included are fraudulent acknowledgments of messages receipt or non receipt by someone other than the message recipient. 
4. Content modification
• Changes to the contents of a message, including insertion, deletion, transportation and modification. 
Attachment link:

.pdf   Unit-3 peri.pdf (Size: 711.53 KB / Downloads: 651)

mohanavalli, proud to be a member of Vidyarthiplus.com (V+) - Online Students Community since Nov 2012.


Reply

Subscribe


Recommend on Google