- All components work together to increase the overall security of the computer network. Security of data can be done by a technique called cryptography.
- Models for Cryptosystem Using Neural Network supports high security.
- Neural network and cryptography together can make a great help in field of networks security.
- Cryptography is the science of writing in secret code.
- it is about constructing and analyzing protocol s that has been blocked.
Types of cryptography.
1.Passive Attacks
This type of attacks includes observation or monitoring of communication. A passive attack attempts to learn or make use of information from the system but does not affect system resources.
*.Traffic Analysis: The message traffic is sent and received in an apparently normal fashion.
*.Release of Message Contents: Read contents of message from sender to receiver.
2.Active Attacks
An active attack attempts to alter system resources or affect their operation. It
• Modification of Messages: some portion of a legitimate message is altered, or that messages are delayed or reordered.
• Denial of Service: An entity may suppress all messages directed to a particular destination.
• Replay: It involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
• Masquerade: It takes place when one entity pretends to be a different entity.
3.Security Services
It is a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers. It .
- Data Integrity: itcan apply to a stream of messages, a single message, or selected fields within a message.
- DataConfidentiality:Preserving authorized restrictions on information access.
- Authenticity :Provide authentication to all the node and base station for utilizing the available limited resources.
- 4. Network security model:
- A security-related transformation on the information to be sent.