The term ‘cryptography’ is derived from two Greek words, namely crypto and graphy. In Greek language, crypto means secret and graphy means writing. Cryptography is the science of secret writing that provides various techniques to protect information that is present in an unreadable format. This unreadable format can be converted into readable format only by the intended recipients. Advanced cryptography provides various techniques based on number theoretic approach and computer science and hence advanced cryptography techniques are virtually unbreakable. This book discusses about various cryptographic and advanced cryptographic techniques. Cryptographic techniques and protocols are used in a wide range of applications such as secure electronic transactions, secure audio/video broadcasting and secure video conferences. In secure electronic transactions, cryptographic techniques are used to protect E-mail messages, credit card information and other sensitive information. In secure audio/video broadcasting, the service provider sends the requested audio/video data to subscribers in a secure way. Only the authorized subscribers are allowed to view the multimedia data. Similarly, it is used in video conferences to allow multi-party communication, where, one user speaks and the remaining users view the communicated data in a secure way.
These secure applications are heavily dependent on various cryptographic services, namely confidentiality, authentication and data integrity. Based on these cryptographic services, the cryptographic techniques and protocols are classified into four main regions and are as follows:
Even though there are so many cryptographic techniques and protocols available in the literature for providing various security services, security threats are still prevalent. The security attack is an internal act that breaks the security procedures or guidelines, regulations and requirements during the transmission of information from the sender to the receiver. The following are some examples of security attacks:
Although there are many possible types of security attacks in the transmission network, network security has many countermeasures to detect, prevent and correct security violations during the transmission of information. Table 1.1 shows various countermeasures that are used to detect, prevent and correct these attacks.
Table 1.1 Attacks and countermeasures

Security is viewed as an important contest among hackers (who try to break the security) and security people (who provide security for the system). Therefore, it is desirable to know the emerging trends of security in order to be able to think about countermeasures and to avoid the hackers from breaking them. Security trends help to measure the security issues that are relevant to computer and networks. Based on the issues, we classify them into computer security and network security. Computer security is the process of protecting the computing systems and computer resources from unauthorized users. Similarly, network security is the process of protecting the network resources and transmitted information from unauthorized users. Computer security and network security are more essential for users who want to make their system free from hackers; otherwise the system would be compromised by hackers. The unprotected computer and communication link can be compromised by performing the following tasks within few seconds after connecting it to the Internet [1].
Confidentiality, integrity and availability (CIA) are the three security trends that are used as heart of the network and computer security to protect computing systems, computer resources and network resources from unauthorized access, use, disclosure, disruption and modification [2]. Figure 1.1 shows CIA security trends.

Figure 1.1 CIA security trends
– Data confidentiality: It is a security service that protects the confidential information by preventing the unauthorized users from accessing it.
– Privacy: It promises that an individual is free from secret surveillance of personal information to be disclosed.
– Data integrity: It ensures that protected information is not changed by unauthorized users. The information and programs are modified only by the authorized entities.
– System integrity: It promises that a system performs its intended function without any degradation due to changes or disruptions in its internal or external environments.
The following are the challenges of network and computer security:
As known earlier, the open systems interconnection (OSI) security architecture consists of seven layers, namely physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. Among these seven layers, security is concerned only in the four layers namely, physical layer, network layer, transport layer and application layer. OSI security architecture is depicted in Figure 1.2. Application layer security mechanisms include electronic mail (S/MIME, PGP) security which is briefly explained in Chapter 13.

Web security is focused on the transport layer that concentrates on SSL/TLS, HTTPS and SSH. Chapter 14 gives the comprehensive explanation about the transport layer security. Network layer security includes IP security and firewall (hardware) which are briefly explained in Chapter 15. The system security focus on physical layer which includes malware identification and virus protection. The physical layer security is briefly explained in Chapter 16.
The OSI security architecture is used for organizing the work of providing security. The international telecommunication union (ITU) Telecommunication Standardization Sector (ITU-T) Recommendation X.800 is a United Nations-sponsored agency that defines a systematic approach of security architecture for OSI. Since this architecture was enlarged as an international standard, it is based on its structured definition of services and mechanisms. Computer and communication sellers have enlarged security features for their products and services. Security mechanisms, security services and security attacks are focussed in OSI security architecture and these are briefly explained as follows:
The security attack is an attempt to break the security. There are two types of security attacks, namely passive attack and active attack. In passive attack, the attackers attempt to find out or use information from the system, without affecting the system resources. But in an active attack, an attacker tries to introduce unwanted data into the system as well as potentially change or modify the system resources or affect their operation.
In passive attacks, message transmissions are monitored by an adversary and thus the goal of the opponent is to acquire or learn information that is being sent in the network channel. Hence, it compromises confidentiality. There are two types of passive attacks. They are (1) release of message contents and (2) traffic analysis.
Figure 1.3 shows the process of release of message contents. In this attack, the sender sends sensitive or confidential information to the receiver. But an opponent captures the message and hence learns the contents of these transmissions. Hence, confidentiality of the sensitive or confidential information is compromised.

Figure 1.3 Release of message contents
Figure 1.4 shows the process of traffic analysis. In this attack, the messages are encrypted and cannot be decrypted by the intruder. So if the intruder captures the message, then he/she cannot obtain the message from the transmission. Since the message is encrypted in the sender side, an intruder tries to observe the pattern of the message. From the observation, an intruder could find out the location and identity of the communicating parties and also observe the frequency and length of messages being transmitted. By using this information, an intruder can guess the nature of the communication between the sender and receiver that took place.

Figure 1.4 Traffic analysis
The detection of passive attacks is very hard compared to the detection of active attacks for the reason that they do not engage in the process of altering the transmitted data. Moreover, during the transmission of the messages, neither the sender nor the receiver knows that an intruder has read the messages in this attack. During transmission, passive attacks can be prevented by using strong encryption schemes. Therefore, it is better to prevent the passive attack rather than detecting it.
Active attacks involve some modification of the system resources or the creation of false resources and hence affect their data transmission. So, active attacks compromise the integrity or availability feature. It can be subdivided into four categories: masquerade attack, replay attack, modification of messages attack and DoS attack.
This attack takes place when one user pretends to be a different user to gain unauthorized access through legitimate access identification as shown in Figure 1.5. By using stolen passwords and logons, masquerade attacks can be performed.

Figure 1.5 Masquerade attack
Replay attack is also known as a playback attack in which a valid data is maliciously or fraudulently retransmitted or delayed to produce an unauthorized effect as shown in Figure 1.6.

Figure 1.6 Replay attack
In this attack, an intruder either modifies or alters some portion of a legitimate message and hence it produces an unauthorized effect as depicted in Figure 1.7. For example, the sender sends a message ‘please transfer $5000 into my account 3048976’ to the receiver. This message can be captured by an intruder and modified as ‘please transfer $5000 in to my account 1234567’. After seeing this message, the receiver may transfer the amount $5000 in to the intruder’s account 1234567 who is not an intended user.

Figure 1.7 Modification of messages
In this attack, an intruder may fix a specific target machine (server) and send some unwanted messages to that particular target machine in order to jam the communication media. Using this approach, the attackers formulate the network resources to be busy to its rightful users. This kind of attack is shown in Figure 1.8.

Figure 1.8 DoS attack
Based on ITU-T X.800 Recommendation, security services are defined for the system resources and data transfers to provide a specific kind of protection. These services are also divided into five categories. Figure 1.9 shows the different categories of the security services [3].

Figure 1.9 Categories of security services
Authentication is a process through which a system verifies the identity of an entity that wishes to access it. The private and public computer networks use logon passwords for performing authentication. Based on the knowledge of the password, it is assumed to promise that the user is authorized. In the initial process, each user assigns a self-declared password for registration. Hence, for each subsequent use, the user must be familiar with and apply the previously declared password. The main drawback in this system is that passwords are often stolen, accidentally disclosed or forgotten. So, digital signatures are used nowadays for authentication purposes. There are two specific types of authentication services defined in X.800:
In network security, access control is a security service which has the ability to control the user access to the system resources located on a server. This service provides the access rights in which it maintains the information such as, who can access the system resources, under what conditions the user entities can access the system resources, and the list of the resources that the users are allowed to access.
Confidentiality conceals the transmitted information from intruder’s passive attacks. An intruder may disclose the contents of transmitting information by applying passive attacks. Hence, the transmitted information should be protected when two users communicate with each other over a period of time. The other important feature of confidentiality is the protection of information from the traffic flow analysis. Otherwise, an intruder can observe the source and destination, frequency, length and different aspects of the activity on a correspondence channel.
Non-repudiation assures that the sender of the message cannot deny the transmitted message to the receiver in the case of dispute or query. Thus, the receiver can prove that the sender is the one who had actually sent the message. Similarly, the sender can also prove that the receiver has actually received the message.
Data integrity is the process that ensures that the data transmitted from the sender to the receiver is not altered or modified by an intruder. It provides the correctness of the transmitted data since this service protects the transmitted data from alteration during communication.
Access control
Active attack
Authentication
Availability
Confidentiality
Data integrity
Denial of service
Intruder
Masquerade
Non-repudiation
Passive attack
Replay attack
Security attacks
Security services