crytography.

  • All components work together to increase the overall security of the computer network. Security of data can be done by a technique called cryptography. 
  • Models for Cryptosystem Using Neural Network  supports high security.
  • Neural network and cryptography together can make a great help in field of networks security. 
  • Cryptography is the science of writing in secret code.
  • it is about constructing and analyzing protocol s that has been blocked. 

Types of cryptography

1.Passive Attacks

This type of attacks includes observation or monitoring of communication. A passive attack attempts to learn or make use of information from the system but does not affect system resources.

*.Traffic Analysis: The message traffic is sent and received in an apparently normal fashion. 

*.Release of Message Contents: Read contents of message from sender to receiver. 

2.Active Attacks

An active attack attempts to alter system resources or affect their operation. It 

•  Modification of Messages: some portion of a legitimate message is altered, or that messages are delayed or reordered.

•  Denial of Service: An entity may suppress all messages directed to a particular destination.

•  Replay: It involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

•  Masquerade: It takes place when one entity pretends to be a different entity.

3.Security Services

It is a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers. It . 

  • Data Integrity: itcan apply to a stream of messages, a single message, or selected fields within a message.
  • DataConfidentiality:Preserving authorized restrictions on information access. 
  • Authenticity :Provide authentication to all the node and base station for utilizing the available limited resources.
  •  4. Network security  model
  • A security-related transformation on the information to be sent. 
Posted on by