Page 222 - DCAP207_NETWORKS_DCAP406_COMPUTER_NETWORKS
P. 222

Unit 14: Network Security




               to plain text. Examples of symmetric encryption are the RSA algorithm. Symmetric  Notes
               encryption method has the following five major parts:
               (a)  Plaintext: It is the text message to be transmitted on which an algorithm is applied.

               (b)  Encryption Algorithm: It enables mathematical operations to conduct substitutions
                    and transformations to the plaintext.
               (c)  Secret Key: They constitute a part of algorithm for encryption and decryption of the
                    message.
               (d)  Ciphertext: This is the encrypted message generated by applying the algorithm to
                    the plaintext message using the secret key.
               (e)  Decryption Algorithm: This is the encryption algorithm that decrypts the cipher text
                    into plain text by using the ciphertext and the secret key.

          In the application of the symmetric encryption, the sender and receiver are required to exchange
          secret keys in a secure manner with the aid of a strong encryption algorithm.

          14.4.3 Authentication

          It verifies the antecedents of the remote party being the real party rather than an impostor.
          It means that the message is received from an authentic person not from an impostor. Digital
          signature is one of the several authentication approaches that use public key encryption method.

          14.4.4 Data Compression


          It compresses data to reduce the amount of transmitted data thus saving in bandwidth and
          money. There are three general methods to data compression. Each method considers that the
          data stream may be transformed into a more compact representation. This compact data stream
          is reconstructed back into the original data at the destination machine.

          Finite Set of Symbols

          It is considered that a library with many branch offices in which the previous days transactions
          are transmitted to every other branch after closing. Transactions are comprised of checked out
          and returned books. The information could be exchanged in the following manners:
          1.   The name of the book, its author, the copy number, etc. together with the type of transaction
               are sent.
          2.   The library needs to maintain a officewise table assigning a unique ID number to every
               book in every branch. Transactions then refer to the book’s ID number instead of its title.
               As the book IDs are small and contain few bytes, so less data will be transmitted.




             Notes  The above descriptions that the above technique is used throughout programming
            and pointers and array subscripts are frequently exchanged to avoid the cost of transferring
            large amounts of data between subroutines. It is also assumed that all objects occur with
            equal frequency and that the set of objects, books in this case, is finite. When text is
            examined, it is immediately noticed that some words appear more often than others.
            Taking cue from this, the number of bits could be reduced that are required to represent a
            document by using a coding scheme that employs small code words to represent common
            words and longer code words to represent words that appear infrequently.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   215
   217   218   219   220   221   222   223   224   225   226   227