A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kataria, Shipra
- Secure Socket Layer and its Security Analysis
Authors
1 Information Security, P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
3 Information Security from P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 255-259Abstract
The Internet is an insecure medium for communication which leads to substantial security breaches, that is, a possible loss of confidentiality, integrity or site authentication which affects the user severely. To mitigate these insecure communication problems, secure socket layer (SSL) comes into consideration. But SSL is vulnerable to many criminal activities like attackers can hide malware in encrypted content and launch various attacks. This arises the need to rethink about the security and privacy provided by the SSL. So the paper provides detailed description of SSL, its vulnerabilities, various attacks and their countermeasures. It also discusses the ways to scan the SSL traffic for malware detection.
Keywords
Secure Socket Layer, Vulnerabilities, Scanning, Protocols.- DomainKeys Identified Mail
Authors
1 Information Security, P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
3 Information Security from P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 260-264Abstract
Email spam is one of the major social problems facing by the whole world every day. Spam mails spoof the sender domain. A solution is required to provide authentication over the internet. Various email authentication methods and schemes allow organizations to prove email originated from the actual domains. One such authentication method is “DomainKeys Identified Mail (DKIM)". DKIM defines a domain level authentication framework using cryptographic signatures and protect receivers and senders from phishing and forged mails. The DKIM signature and its signing practices provide a tool to authenticate sending domain. This paper discusses the overview of DKIM using public key cryptography with keys stored in Domain Name Server. It also deals with the problems of DKIM and their solutions.
Keywords
Spam, Domain Name Server, Public Key Cryptography.- Visual Cryptography
Authors
1 Information Security from P.E.C. Engineering College, Chandigarh, IN
2 Information Security, P.E.C. Engineering College, Chandigarh, IN
Source
Networking and Communication Engineering, Vol 7, No 6 (2015), Pagination: 265-268Abstract
Visual cryptography is a creative technique of sharing secrets. The key idea behind visual cryptography is to encrypt the original secret image into number of shares. The individual share does not reveal the original secret image until two or more shares overlapped. The image is composed of white and black pixels. Visual cryptography provides information security by encrypting the visual information in such a manner that decryption can be done by manual perception system. There is no need of any cryptographic algorithm for decryption in visual cryptography. Performance of visual cryptography mainly depends on the pixel expansion and contrast. This paper put lights on the following sections:
What is VCS model?
Visual cryptography schemes
Security issues
Prevention methods
Visual cryptography with steganography