28-06-2010, 10:00 PM
Abstract
Classical cryptographic protocol based on user chosen keys allows an attacker to mount password guessing attacks. In todayâ„¢s world, the importance of information cannot be over emphasizing. All this makes it imperative for individuals and organizations alike to safeguard their data and avoid its misuse, destruction, duplication or distribution by unauthorized people, especially after witnessing the havoc that can be unleashed by such attacks. Recent threats to the information systems of the world have led to unprecedented efforts to seek a way out to stop these miscreants. Computer security has become synonymous with network security.
Our paper deals with one such system that is presently Cryptography. The three types of cryptography algorithms are secret key cryptography, public key cryptography, hash functions, trust models. Authentication, Integrity and Non Repudiation, Key Distribution and certification, Access control by implementing Firewalls etc. also feature in the discussion in the form of the KERBEROS AUTHENTICATION SYSTEM, IP Sec & AAA server. In this information and network security provides some methods like VPN (virtual private network), firewalls, IP Sec (internet protocol security), AAA server.