A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sethi, Priya
- Secure Socket Layer and its Security Analysis
Authors
1 Information Security, P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
3 Information Security from P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 255-259Abstract
The Internet is an insecure medium for communication which leads to substantial security breaches, that is, a possible loss of confidentiality, integrity or site authentication which affects the user severely. To mitigate these insecure communication problems, secure socket layer (SSL) comes into consideration. But SSL is vulnerable to many criminal activities like attackers can hide malware in encrypted content and launch various attacks. This arises the need to rethink about the security and privacy provided by the SSL. So the paper provides detailed description of SSL, its vulnerabilities, various attacks and their countermeasures. It also discusses the ways to scan the SSL traffic for malware detection.
Keywords
Secure Socket Layer, Vulnerabilities, Scanning, Protocols.- Visual Cryptography
Authors
1 Information Security from P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 265-268Abstract
Visual cryptography is a creative technique of sharing secrets. The key idea behind visual cryptography is to encrypt the original secret image into number of shares. The individual share does not reveal the original secret image until two or more shares overlapped. The image is composed of white and black pixels. Visual cryptography provides information security by encrypting the visual information in such a manner that decryption can be done by manual perception system. There is no need of any cryptographic algorithm for decryption in visual cryptography. Performance of visual cryptography mainly depends on the pixel expansion and contrast. This paper put lights on the following sections:
What is VCS model?
Visual cryptography schemes
Security issues
Prevention methods
Visual cryptography with steganography