Class model defines the structure of the entire system by identifying the static structure of objects in that system. A class model defines attributes and operations for the objects of each class and also the relationship between the objects in the systems. A class model prepares the platform for the other two models i.e. the state model and interaction model. Class model is … [Read more...] about Class Model
Object Oriented Development
When we talk about the object oriented development, we are actually considering the life cycle of software which include analysis, design and implementation of the software. Object oriented development focuses on identifying and organizing the application concept instead of the implementation of the software. In this section, we will study the object oriented development … [Read more...] about Object Oriented Development
Object Orientation
Object Orientation is the software engineering concept which represents the software as a cluster of distinct objects. Each object comprises both data structure i.e. it’s storage structure and functioning i.e. its behaviour. In object orientation concept data structure and behaviour of each object is tightly coupled. The object orientation concept is broadly classified into … [Read more...] about Object Orientation
Public Key Cryptography
Public Key Cryptography is a cryptographic technique that involves 'two distinct keys' for encryption and decryption. That's why it is also known as asymmetric-key cryptography. The public key cryptography is totally based on the 'invertible mathematical' function which makes it different from the conventional symmetric key cryptography. It is not that symmetric key … [Read more...] about Public Key Cryptography
RSA Algorithm in Cryptography
RSA is a first successful public key cryptographic algorithm. It is also known as an asymmetric cryptographic algorithm because two different keys are used for encryption and decryption. RSA is named after Rivest, Shamir and Adleman the three inventors of RSA algorithm. The algorithm was introduced in the year 1978. In this section, we will discuss, RSA algorithm along with … [Read more...] about RSA Algorithm in Cryptography
Fundamental Security Design Principles
The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents unwanted access to the system. Below is the list of fundamental security design principles provided by the National Centres of Academic Excellence in Information … [Read more...] about Fundamental Security Design Principles
Network Security Model
A Network Security Model exhibits how the security service has been designed over the network to prevent the opponent from causing a threat to the confidentiality or authenticity of the information that is being transmitted through the network. In this section, we will be discussing the general ‘network security model’ where we will study how messages are shared between the … [Read more...] about Network Security Model
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES) was introduced by NIST in 2001 is a symmetric block cipher which overcomes the key size weakness of DES. AES comes with the variable key sizes i.e. 128-bit key, 192-bit key and a 256-bit key. AES does not follow the Feistel structure in fact it operates on entire plaintext block at once instead of dividing them into two halves. AES can be … [Read more...] about Advanced Encryption Standard (AES)
Feistel Block Cipher
Feistel block cipher is a structure used to derive many symmetric block ciphers such as DES which we have discussed in our previous content. Feistel cipher proposed a structure which implements substitution and permutation alternately to obtain cipher text from the pain text and vice-versa. In the Feistel block cipher, each block has to undergo many rounds where each round … [Read more...] about Feistel Block Cipher
Block Cipher
Block cipher is an encryption and decryption method which operates on the blocks of plain text, instead of operating on each bit of plain text separately. Each block is of equal size and has fixed no of bits. The generated ciphertext has blocks equal to the number of blocks in plaintext and also has the same number of bits in each block as of plain text. Block cipher uses the … [Read more...] about Block Cipher