Network Security
#1

Network Security
RSA Continues
Choose an integer e such that 1 < e < φ(pq), and e and φ(pq) share no divisors other than 1 (i.e. e and φ(pq) are coprime).
e is released as the public key exponent.
RSA Continues
Determine d which satisfies the congruence relation .
Stated differently, ed − 1 can be evenly divided by the totient (p − 1)(q − 1).
d is kept as the private key exponent.
RSA Example
Choose two prime numbers
p = 61 and q = 53
Compute n = pq
Compute the totients of product. For primes the totient is maximal and equals x − 1. Therefore
RSA Example Continues
Choose any number e > 1 that is coprime to 3120. Choosing a prime number for e leaves you with a single check: that e is not a divisor of 3120.
e = 17
RSA Example Continues
Compute d such that
d . e = 1 mod Ǿ(pq)
d = 2753
since 17 · 2753 = 46801 and 46801 mod 3120 = 1, this is the correct answer.
RSA Example Continues
The public key is (n = 3233, e = 17).

The private key is (n = 3233, d = 2753).
RSA Example Continues
For instance, in order to encrypt m = 123, we calculate
To decrypt c = 855, we tap
Authentication

KERBEROS
In Greek mythology, a many headed dog, the guardian of the entrance of Hades
KERBEROS
Provides a centralized authentication server to authenticate users to servers and servers to users.
Relies on conventional encryption, making no use of public-key encryption
Two versions: version 4 and 5
Version 4 makes use of DES
Kerberos Version 4
Terms:
C = Client
AS = authentication server
V = server
IDc = identifier of user on C
IDv = identifier of V
Pc = password of user on C
ADc = network address of C
Kv = secret encryption key shared by AS an V
TS = timestamp
|| = concatenation







Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what is kerberos, kerberos ba,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,198 06-11-2014, 09:23 PM
Last Post: seminar report asees
  virtual network computing seminar addict 1 1,416 12-12-2012, 02:07 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 2,017 14-11-2012, 12:29 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,368 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,716 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,434 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,763 08-10-2012, 03:08 PM
Last Post: seminar details
  Wireless Intelligent Network (WIN) seminar details 0 1,005 11-06-2012, 05:46 PM
Last Post: seminar details
  The Application of Back Propagation Neural Network of Multi-channel Piezoelectric.... project uploader 0 1,184 09-06-2012, 05:32 PM
Last Post: project uploader

Forum Jump: