원문정보
보안공학연구지원센터(IJUNESST)
International Journal of u- and e- Service, Science and Technology
vol.4 no.2
2011.06
pp.43-52
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
In today’s world the networking plays a very important role in our life. Most of the activities occur through the Internet. For the safe and secured exchange of information, we need to have security. The encryption has very wide applications for securing data. Latest authentication deals with biometric application such as fingerprint and retina scan. The different types of encryptions and their strength and standards are discussed.
목차
Abstract
1. Introduction
2. What is Encryption?
3. Basic Model of Network Security
4. Classification of Encryption
4.1 Symmetric Key
4.2 Asymmetric Key
5. Secure Sockets Layer (SSL) and Transport Layer Security (TSL)[7]
6. Security Attacks [8]
6.1 Passive attack
6.2 Active attack
7. Encryption Standards [9]
7.1 Data Encryption Standards (DES)
7.2 Advanced Encryption Standards (AES)
8. How The Encrypted Text Look Like?
9. Applications of Encryption
9.1 Data Protection
9.2 Authentication
10. Biometric Authentication [11]
10.1 Biometric Encryption (BE)
11. Future Scope of Encryption
12. Conclusion
13. Glossary
References
1. Introduction
2. What is Encryption?
3. Basic Model of Network Security
4. Classification of Encryption
4.1 Symmetric Key
4.2 Asymmetric Key
5. Secure Sockets Layer (SSL) and Transport Layer Security (TSL)[7]
6. Security Attacks [8]
6.1 Passive attack
6.2 Active attack
7. Encryption Standards [9]
7.1 Data Encryption Standards (DES)
7.2 Advanced Encryption Standards (AES)
8. How The Encrypted Text Look Like?
9. Applications of Encryption
9.1 Data Protection
9.2 Authentication
10. Biometric Authentication [11]
10.1 Biometric Encryption (BE)
11. Future Scope of Encryption
12. Conclusion
13. Glossary
References
저자정보
참고문헌
자료제공 : 네이버학술정보