SlideShare uma empresa Scribd logo
1 de 32
 Introduction
 CIA Triad
 Mechanisms of Cryptography
 OSI Security Architecture
 Security Attacks
 Security Mechanisms
 Security Services
 Cryptography vs Steganography
 Network Security Model
 Cryptographic techniques
 Stream Cipher vs Block cipher
 Cryptography,a word with Greek origin means “Secret
Writing”
 Cryptography is technique of securing information and
communications through use of codes so that only
those person for whom the information is intended can
understand it and process it. Thus preventing
unauthorized access to information.
 These three letters stand for confidentiality, integrity,
and availability, otherwise known as the CIA triad.
 These principles form the cornerstone of any
organization’s security infrastructure
 The CIA triad is so foundational to information
security that anytime data is leaked, a system is
attacked, a user takes a phishing bait, an account is
hijacked, a website is maliciously taken down, or any
number of other security incidents occur, you can be
certain that one or more of these principles has been
violated.
Confidentiality
Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
Integrity
Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
Authentication
The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
 Symmetric Key Encipherment/Secret-key
Encipherment
 Asymmetric Key Encipherment/Public-
key Encipherment
 Hashing
 It is an encryption system where the sender and
receiver of message use a single common key to
encrypt and decrypt messages.
 Symmetric Key Systems are faster and simpler but
the problem is that sender and receiver have to
somehow exchange key in a secure manner.
 The most popular symmetric key cryptography
system is Data Encryption System(DES).
Under this system a pair of keys is used to
encrypt and decrypt information. A public key
is used for encryption and a private key is used
for decryption.
Public key and Private Key are different.
Even if the public key is known by everyone
the intended receiver can only decode it
because he alone knows the private key.
A hash value with fixed length is calculated as
per the plain text which makes it impossible
for contents of plain text to be recovered.
Many operating systems use hash functions to
encrypt passwords.
ITU-T Recommendation X.800, Security
Architecture for OSI defines systematic way to
defining the requirements for security,
characterizing the approaches to satisfying
those requirements.
 ITU-T – international Telecommunication
Union Telecommunication Standardization
Sector
OSI – Open Systems Interconnections

 Security attack: Any actions that compromises the
security of information owned by an organization (or a
person)
 Security mechanism: a mechanism that is designed to
detect, prevent, or recover from a security attack
 Security service: a service that enhances the security
of the data processing systems and the information
transfers of an organization. The services make use of
one or more security mechanisms to provide the
service.
 Passive attack: aims to learn or make use of
information from the system but does not affect system
resources.
 Eg:Snooping,Traffic Analysis
 Active attack: attempts to alter system resources or
affect their operation
 Eg: Modification, Masquerading,Replaying,
Repudiation,Denial of Service
 Encipherment/Hiding/Covering data
 Data Integrity
 Digital Signature
 Authentication Exchange
 Traffic Padding
 Routing Control
 Notarization
 Access control
Data Confidentiality
o Connection confidentiality
o Connectionless Confidentiality
o Selective Field Confidentiality
o Traffic Flow Confidentiality
Authentication
o Peer Entity
o Data Origin
Data Integrity
o Connection Integrity with Recovery
o Connection Integrity without Recovery
o Connectionless Integrity
o Selective Field connection Integrity
o Selective Field connectionless Integrity
Non Repudiation: Protection against denial by one of the
entities involved in a communication of having participated in
the communication.
 Proof of origin
 Proof of Destination
 Access Control
Cryptography Steganography
In cryptography, sender does not send message
directly to the receiver, before sending information
to the receiver information or plain text is
converted into cipher text by using some
encryption algorithm then send to the receiver and
receiver decrypt the cipher text into plain text to
read the original information.
Steganography is a method in which secret
message is hidden in a cover media.
Cryptography means secret writing. Steganography means covered writing.
In cryptography, structure of data is altered. In steganography, structure of data is not
usually altered.
It is of two types:
1. Symmetric key cryptography 2. Asymmetric key
cryptography
The forms of steganography are:
1. Text 2. Audio 3. Video 4. Images 5.
Network or Protocol
Cryptography
supports Confidentiality and Authentication secu
rity principles as well as Data integrity and Non-
repudiation.
Steganography
supports Confidentiality and Authenticati
on security principles
Cryptography is more popular than Steganography. Steganography is less popular than
 Substitution Techniques: The one in
which the letters of plaintext are replaced
by other letters.
◦ Monoalphabetic cipher: In this , a character
or a symbol in plaintext is always changed to
same character or symbol in cipher text
regardless of its position in the text
 Caesar cipher
◦ Polyalphabetic cipher: a substitution cipher
in which the cipher alphabet for the plain
alphabet may be different at different places
during the encryption process.
 Playfair cipher:
 One time Pad cipher
 Vigenere cipher
 Hill cipher
 Autokey cipher:
1. Caesar cipher
 It involves replacing each letter of the alphabet
with the letter standing 3 places further down
the alphabet.
1. Playfair cipher: In Playfair cipher, initially a key table
is created. The key table is a 5×5 grid of alphabets that acts
as the key for encrypting the plaintext. Each of the 25
alphabets must be unique and one letter of the alphabet
(usually J) is omitted from the table as we need only 25
alphabets instead of 26. If the plaintext contains J, then it is
replaced by I.
2.Vigenere cipher: Vigenere Cipher works similar to
Caesar Cipher algorithm with only one major distinction
that it includes key with multiple alphabets shift.
3. Autokey cipher: It is closely related to the Vigenere cipher
but uses a different method of generating the key. In this cipher, the
key is a stream of subkeys which is used to encrypt the corresponding
character in the plaintext.
4.One time Pad cipher: One-time pad cipher is a type of
Vigenere cipher which includes the following features −
 It is an unbreakable cipher.
 The key is exactly same as the length of message which is
encrypted.
 The key is made up of random symbols.
 As the name suggests, key is used one time only and never
used again for any other message to be encrypted.
 Due to this, encrypted message will be vulnerable to attack
for a cryptanalyst. The key used for a one-time pad cipher is
called pad, as it is printed on pads of paper.
5.Hill cipher: Hill cipher is a polygraphic substitution
cipher based on linear algebra. Each letter is represented by
a number modulo 26. Often the simple scheme A = 0, B =
1, …, Z = 25 is used, but this is not an essential feature of
the cipher.
 To encrypt a message, each block of n letters
(considered as an n-component vector) is multiplied by
an invertible n × n matrix, against modulus 26.
 To decrypt the message, each block is multiplied by the
inverse of the matrix used for encryption.
 The matrix used for encryption is the cipher key, and it
should be chosen randomly from the set of invertible n
× n matrices (modulo 26).
 Row Transposition Cipher: A transposition cipher
is one which rearranges the order of the letters in the
cipher text (encoded text), according to some
predetermined method, without making any
substitutions.
 Feistel Cipher Structure:
• Feistel Cipher model is a structure or a design used to
develop many block ciphers such as DES.
• Same encryption as well as decryption algorithm is
used.
• A separate key is used for each round. However same
round keys are used for encryption as well as
decryption.
 Feistel cipher algorithm:
• Create a list of all the Plain Text characters.
• Convert the Plain Text to Ascii and then 8-bit binary
format.
• Divide the binary Plain Text string into two halves:
left half (L1)and right half (R1)
• Generate a random binary keys (K1 and K2) of
length equal to the half the length of the Plain Text
for the two rounds.
• First Round of Encryption
• a. Generate function f1 using R1 and K1 as follows:
f1= xor(R1, K1)
• b. Now the new left half(L2) and right half(R2) after round 1 are as
follows:
• R2= xor(f1, L1) L2=R1Second Round of Encryption
• a. Generate function f2 using R2 and K2 as follows:
f2= xor(R2, K2)
• b. Now the new left half(L2) and right half(R2) after round 1 are as
follows:
• R3= xor(f2, L2) L3=R2Concatenation of R3 to L3 is the Cipher
Text
• Same algorithm is used for decryption to retrieve the Plain Text
from the Cipher Text.
Stream cipher converts the plain text
into cipher text by taking 1 byte of
plain text at a time.
Block cipher converts the plain text
into cipher text by taking plain text’s
block at a time.
Stream cipher uses 8 bits. Block cipher uses either 64 bits or
more than 64 bits.
It works on substitution techniques
like Caesar cipher, etc.
On the other hand , it works on
transposition techniques like rail-fence
technique, etc
Stream cipher is fast in comparison to
block cipher.
Block cipher is slow
Thank you

Mais conteúdo relacionado

Mais procurados

White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and securityresearch30
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureMike Gates
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption KeyIOSR Journals
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
 

Mais procurados (20)

White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETAn Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANET
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
01337277
0133727701337277
01337277
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Cryptography
CryptographyCryptography
Cryptography
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 

Semelhante a Cns 1

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptxHamnaMalik31
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Zara Nawaz
 

Semelhante a Cns 1 (20)

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Day5
Day5Day5
Day5
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Unit 1
Unit 1Unit 1
Unit 1
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Cryptography
CryptographyCryptography
Cryptography
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
Cryptography
CryptographyCryptography
Cryptography
 

Último

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Último (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Cns 1

  • 1.
  • 2.  Introduction  CIA Triad  Mechanisms of Cryptography  OSI Security Architecture  Security Attacks  Security Mechanisms  Security Services  Cryptography vs Steganography  Network Security Model  Cryptographic techniques  Stream Cipher vs Block cipher
  • 3.  Cryptography,a word with Greek origin means “Secret Writing”  Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information.
  • 4.
  • 5.  These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA triad.  These principles form the cornerstone of any organization’s security infrastructure  The CIA triad is so foundational to information security that anytime data is leaked, a system is attacked, a user takes a phishing bait, an account is hijacked, a website is maliciously taken down, or any number of other security incidents occur, you can be certain that one or more of these principles has been violated.
  • 6. Confidentiality Information can only be accessed by the person for whom it is intended and no other person except him can access it. Integrity Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected. Authentication The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.
  • 7.  Symmetric Key Encipherment/Secret-key Encipherment  Asymmetric Key Encipherment/Public- key Encipherment  Hashing
  • 8.  It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages.  Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner.  The most popular symmetric key cryptography system is Data Encryption System(DES).
  • 9. Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.
  • 10. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.
  • 11. ITU-T Recommendation X.800, Security Architecture for OSI defines systematic way to defining the requirements for security, characterizing the approaches to satisfying those requirements.  ITU-T – international Telecommunication Union Telecommunication Standardization Sector OSI – Open Systems Interconnections 
  • 12.  Security attack: Any actions that compromises the security of information owned by an organization (or a person)  Security mechanism: a mechanism that is designed to detect, prevent, or recover from a security attack  Security service: a service that enhances the security of the data processing systems and the information transfers of an organization. The services make use of one or more security mechanisms to provide the service.
  • 13.  Passive attack: aims to learn or make use of information from the system but does not affect system resources.  Eg:Snooping,Traffic Analysis  Active attack: attempts to alter system resources or affect their operation  Eg: Modification, Masquerading,Replaying, Repudiation,Denial of Service
  • 14.  Encipherment/Hiding/Covering data  Data Integrity  Digital Signature  Authentication Exchange  Traffic Padding  Routing Control  Notarization  Access control
  • 15. Data Confidentiality o Connection confidentiality o Connectionless Confidentiality o Selective Field Confidentiality o Traffic Flow Confidentiality Authentication o Peer Entity o Data Origin
  • 16. Data Integrity o Connection Integrity with Recovery o Connection Integrity without Recovery o Connectionless Integrity o Selective Field connection Integrity o Selective Field connectionless Integrity Non Repudiation: Protection against denial by one of the entities involved in a communication of having participated in the communication.  Proof of origin  Proof of Destination  Access Control
  • 17.
  • 18. Cryptography Steganography In cryptography, sender does not send message directly to the receiver, before sending information to the receiver information or plain text is converted into cipher text by using some encryption algorithm then send to the receiver and receiver decrypt the cipher text into plain text to read the original information. Steganography is a method in which secret message is hidden in a cover media. Cryptography means secret writing. Steganography means covered writing. In cryptography, structure of data is altered. In steganography, structure of data is not usually altered. It is of two types: 1. Symmetric key cryptography 2. Asymmetric key cryptography The forms of steganography are: 1. Text 2. Audio 3. Video 4. Images 5. Network or Protocol Cryptography supports Confidentiality and Authentication secu rity principles as well as Data integrity and Non- repudiation. Steganography supports Confidentiality and Authenticati on security principles Cryptography is more popular than Steganography. Steganography is less popular than
  • 19.  Substitution Techniques: The one in which the letters of plaintext are replaced by other letters. ◦ Monoalphabetic cipher: In this , a character or a symbol in plaintext is always changed to same character or symbol in cipher text regardless of its position in the text  Caesar cipher
  • 20. ◦ Polyalphabetic cipher: a substitution cipher in which the cipher alphabet for the plain alphabet may be different at different places during the encryption process.  Playfair cipher:  One time Pad cipher  Vigenere cipher  Hill cipher  Autokey cipher:
  • 21. 1. Caesar cipher  It involves replacing each letter of the alphabet with the letter standing 3 places further down the alphabet.
  • 22. 1. Playfair cipher: In Playfair cipher, initially a key table is created. The key table is a 5×5 grid of alphabets that acts as the key for encrypting the plaintext. Each of the 25 alphabets must be unique and one letter of the alphabet (usually J) is omitted from the table as we need only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced by I. 2.Vigenere cipher: Vigenere Cipher works similar to Caesar Cipher algorithm with only one major distinction that it includes key with multiple alphabets shift.
  • 23. 3. Autokey cipher: It is closely related to the Vigenere cipher but uses a different method of generating the key. In this cipher, the key is a stream of subkeys which is used to encrypt the corresponding character in the plaintext.
  • 24. 4.One time Pad cipher: One-time pad cipher is a type of Vigenere cipher which includes the following features −  It is an unbreakable cipher.  The key is exactly same as the length of message which is encrypted.  The key is made up of random symbols.  As the name suggests, key is used one time only and never used again for any other message to be encrypted.  Due to this, encrypted message will be vulnerable to attack for a cryptanalyst. The key used for a one-time pad cipher is called pad, as it is printed on pads of paper.
  • 25. 5.Hill cipher: Hill cipher is a polygraphic substitution cipher based on linear algebra. Each letter is represented by a number modulo 26. Often the simple scheme A = 0, B = 1, …, Z = 25 is used, but this is not an essential feature of the cipher.  To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, against modulus 26.  To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption.  The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26).
  • 26.  Row Transposition Cipher: A transposition cipher is one which rearranges the order of the letters in the cipher text (encoded text), according to some predetermined method, without making any substitutions.
  • 27.  Feistel Cipher Structure: • Feistel Cipher model is a structure or a design used to develop many block ciphers such as DES. • Same encryption as well as decryption algorithm is used. • A separate key is used for each round. However same round keys are used for encryption as well as decryption.
  • 28.  Feistel cipher algorithm: • Create a list of all the Plain Text characters. • Convert the Plain Text to Ascii and then 8-bit binary format. • Divide the binary Plain Text string into two halves: left half (L1)and right half (R1) • Generate a random binary keys (K1 and K2) of length equal to the half the length of the Plain Text for the two rounds.
  • 29.
  • 30. • First Round of Encryption • a. Generate function f1 using R1 and K1 as follows: f1= xor(R1, K1) • b. Now the new left half(L2) and right half(R2) after round 1 are as follows: • R2= xor(f1, L1) L2=R1Second Round of Encryption • a. Generate function f2 using R2 and K2 as follows: f2= xor(R2, K2) • b. Now the new left half(L2) and right half(R2) after round 1 are as follows: • R3= xor(f2, L2) L3=R2Concatenation of R3 to L3 is the Cipher Text • Same algorithm is used for decryption to retrieve the Plain Text from the Cipher Text.
  • 31. Stream cipher converts the plain text into cipher text by taking 1 byte of plain text at a time. Block cipher converts the plain text into cipher text by taking plain text’s block at a time. Stream cipher uses 8 bits. Block cipher uses either 64 bits or more than 64 bits. It works on substitution techniques like Caesar cipher, etc. On the other hand , it works on transposition techniques like rail-fence technique, etc Stream cipher is fast in comparison to block cipher. Block cipher is slow