SlideShare uma empresa Scribd logo
1 de 28
NETWORK SECURITY 
CRYPTOGRAPHY 
Presented BY 
Sankari.P(B.Sc[CS] S/F) 
Sadakathullah Appa College 
Tirunelveli -11. 
Guided by: 
Mrs.J .Jannathul Firthous ,M.sc,M.phil
WHAT IS NETWORK 
 A network is an interconnection 
or a media between two or more 
systems to share information 
among them. 
 The various threats caused to 
network are : 
 Remote Login 
 Application Backdoors 
 SMTP Session Hijackings 
 Operating System Bugs 
 Spams 
 Viruses etc.
NETWORK SECURITY 
 The security provided to the network 
is called network security which at 
present is looming on horizon as a 
massive problem. 
There are two kinds of Network 
Security mainly as : 
 Transit Security: It just encrypts 
the packets to be transferred. 
 Traffic Security : It acts just as a 
screen between hosts & remote 
sites.
SECURITY GOALS
OBJECTIVE OF SECURITY 
 To avoid data threats 
 To avoid denial of services 
 To secure our data from masquerades 
 To safeguard our data’s from traffic analyzer 
 To not to make massage for the third person available
PASSWORD AUDITING 
 Should not be in uppercase 
 Must have at least 8 characters 
 Must include alphabets, numeric keys & special 
characters 
 Password should not be the name of the user, 
dictionary word etc., 
 It must be updated at least once a month
DATA SECURITY 
 To monitor the user’s ACCESS 
CONTROLS 
 System that are connected in network must be protected 
with firewalls 
To protect the integrity & availability of the institution’s 
information asset’s
PROBLEMS & ATTACKS 
There are few intertwined areas in network security as: 
 Secrecy 
 Authentication 
 Non-Repudiation 
 Integrity Control etc. 
The threats are classified into two categories : 
Passive Attacks : 
A passive attack is one in which the attacker eavesdrops and 
listens to the message but can’t modify the message. 
Active Attacks : 
An active attack is one in which the attacker modifies, deletes, 
replay or introduce new messages into the stream of message.
THREATS :
CLICK
CRYPTOGRAPHY 
 It is derived from the Greek word that meant for secret writing. 
 Cryptography is a Software or Hardware programs 
use Mathematical Functions , Formulas(Algorithms) to 
change text from one form to another. 
 Cryptography is the science and art of transforming messages to 
make them secure and immune to attacks. 
 It provides Confidentiality, Integrity, Accuracy. 
 Applications of cryptography includes ATM cards, computer 
passwords, and electronic commerce. 
 It’s very useful to our Army & Police network to transfer 
confidential data
TECHNIQUES 
The data is transferred by applying two techniques 
1.Encryption 
2.Decryption 
Encryption :The way of converting the plain text to the 
cipher text by the means of few keys is called as the 
“Encryption”. 
Decryption :The way of converting the cipher text to 
the plain text by the use of keys that are suitable to it is 
called as “Decryption”.
ENCRYTION & DECRYPTION
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY 
 The implementation of a simple cryptography using 
single key is done by the secret-key algorithms. 
 Also known as SECRET KEY CRYPTOGRAPHY . 
Sender & Receiver uses same key and an Encryption / 
Decryption Algorithm to Encrypt / Decrypt data . 
(i.e ) The Key is Shared 
 This can be done by p-box, s-box and product cipher
SYMMETRIC KEY CRYPTOGRAPHY
SUBSTITUTION CIPHER 
Replacing of each letter or 
group of letters of plain text 
into cipher text by another 
letters is called as 
“Substitution cipher”. 
The substitution may be : 
Monoalphabetic Substitution 
Polyalphabetic Substitution
TRANSPOSITION CIPHER 
 The change offered in 
the position of the text 
i.e. By jumbling the 
words is called as 
“Transposition cipher”. 
 And the technique used 
here is termed as “Mass 
Technique”.
ASYMMETRIC KEY CRYPTOGRAPHY 
 Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & 
Receiver uses different keys for Encryption & Decryption 
namely PUBLIC & PRIVATE respectively 
 Public key algorithms are formed when it satisfies the 
following requirements: 
o D(E(P))=P. 
o Difficulty to deduce D from E. 
o E cannot be broken by a chosen plain text attack. 
D -> Deciphering E -> Enciphering
ASYMMETRIC KEY CRYPTOGRAPHY
RSA ALGORITHM 
 RSA is derived from the names of the 3 discoverers 
named Rivest, Shamir, Adleman. 
 The RSA algorithm is one of the widely used in the key 
algorithms. 
(1)The main function of this algorithm is providing 
approach to public key cryptography & Encryption 
(2) In this the CIPHER TEXT are the integer’s 
between 0 to n-1 
C =e M mod n m->message ,e->encryption 
M=d C mod n C->cipher text ,d->decryption 
=(e M) d mod n n-> integer’s (r*a) r & a are prime 
=m e d mod n number’s
Symmetric key 
cryptography 
• Only 1 shared key is involved. 
• The same key encrypts and 
decrypts the plaintext. 
• The shared key is kept secret 
between Alice and Bob. 
• Examples of Symmetric 
algorithms: 
– DES, 3DES, AES, IDEA, 
BLOWFISH, TWOFISH, RC4, 
RC5, SAFER etc. 
Asymmetric key 
cryptography 
• Here 2 keys : a private and a 
public key are involved. 
• The Public key encrypts the 
plaintext while the private key 
decrypts it. 
• The private key is just kept 
secret by the Bob while the 
public key is made public. 
• Examples of Asymmetric 
algorithms: 
– Diffie-Hellman, RSA, El Gamal, 
Elliptic Curve Cryptography 
(ECC) etc.
APPLICATIONS 
• Defense Services 
• Secure Data Manipulation 
• E – Commerce 
• Business Transactions 
• Internet Payment Systems 
• User Identification Systems 
• Access Control 
• Data Security
PROPOSED CONCEPT 
 As known the data has been easily hacked 
even for the 52- bit encryption too. So, the 
encryption bits of 52-bits should be given 
with the combination of both numerals and 
alphabets ( for example one alphabet is 
placed for 13-bits each). 
 The placement of alphabet is known only to 
the particular sender & receiver such that it 
secures the data to be sent.
CONLUSION 
 This paper describes a technique to successfully 
hiding and secure the data or massage with the 
help of Encryption or Decryption technique with 
the Cryptography And Network Security. 
 However ,this research work & software package 
provide a good starting point for anyone 
interested in learning about Cryptography.
“For every lock there is a key……… 
It is better to keep safe your lock than the key”

Mais conteúdo relacionado

Mais procurados (20)

Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
cryptography
cryptographycryptography
cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 

Semelhante a Network security and cryptography

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography pptSoma Subbama
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 

Semelhante a Network security and cryptography (20)

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 

Último

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Último (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Network security and cryptography

  • 1. NETWORK SECURITY CRYPTOGRAPHY Presented BY Sankari.P(B.Sc[CS] S/F) Sadakathullah Appa College Tirunelveli -11. Guided by: Mrs.J .Jannathul Firthous ,M.sc,M.phil
  • 2. WHAT IS NETWORK  A network is an interconnection or a media between two or more systems to share information among them.  The various threats caused to network are :  Remote Login  Application Backdoors  SMTP Session Hijackings  Operating System Bugs  Spams  Viruses etc.
  • 3. NETWORK SECURITY  The security provided to the network is called network security which at present is looming on horizon as a massive problem. There are two kinds of Network Security mainly as :  Transit Security: It just encrypts the packets to be transferred.  Traffic Security : It acts just as a screen between hosts & remote sites.
  • 5. OBJECTIVE OF SECURITY  To avoid data threats  To avoid denial of services  To secure our data from masquerades  To safeguard our data’s from traffic analyzer  To not to make massage for the third person available
  • 6. PASSWORD AUDITING  Should not be in uppercase  Must have at least 8 characters  Must include alphabets, numeric keys & special characters  Password should not be the name of the user, dictionary word etc.,  It must be updated at least once a month
  • 7. DATA SECURITY  To monitor the user’s ACCESS CONTROLS  System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s
  • 8. PROBLEMS & ATTACKS There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity Control etc. The threats are classified into two categories : Passive Attacks : A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message. Active Attacks : An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message.
  • 10. CLICK
  • 11. CRYPTOGRAPHY  It is derived from the Greek word that meant for secret writing.  Cryptography is a Software or Hardware programs use Mathematical Functions , Formulas(Algorithms) to change text from one form to another.  Cryptography is the science and art of transforming messages to make them secure and immune to attacks.  It provides Confidentiality, Integrity, Accuracy.  Applications of cryptography includes ATM cards, computer passwords, and electronic commerce.  It’s very useful to our Army & Police network to transfer confidential data
  • 12. TECHNIQUES The data is transferred by applying two techniques 1.Encryption 2.Decryption Encryption :The way of converting the plain text to the cipher text by the means of few keys is called as the “Encryption”. Decryption :The way of converting the cipher text to the plain text by the use of keys that are suitable to it is called as “Decryption”.
  • 15. SYMMETRIC KEY CRYPTOGRAPHY  The implementation of a simple cryptography using single key is done by the secret-key algorithms.  Also known as SECRET KEY CRYPTOGRAPHY . Sender & Receiver uses same key and an Encryption / Decryption Algorithm to Encrypt / Decrypt data . (i.e ) The Key is Shared  This can be done by p-box, s-box and product cipher
  • 17.
  • 18. SUBSTITUTION CIPHER Replacing of each letter or group of letters of plain text into cipher text by another letters is called as “Substitution cipher”. The substitution may be : Monoalphabetic Substitution Polyalphabetic Substitution
  • 19. TRANSPOSITION CIPHER  The change offered in the position of the text i.e. By jumbling the words is called as “Transposition cipher”.  And the technique used here is termed as “Mass Technique”.
  • 20. ASYMMETRIC KEY CRYPTOGRAPHY  Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & Receiver uses different keys for Encryption & Decryption namely PUBLIC & PRIVATE respectively  Public key algorithms are formed when it satisfies the following requirements: o D(E(P))=P. o Difficulty to deduce D from E. o E cannot be broken by a chosen plain text attack. D -> Deciphering E -> Enciphering
  • 22. RSA ALGORITHM  RSA is derived from the names of the 3 discoverers named Rivest, Shamir, Adleman.  The RSA algorithm is one of the widely used in the key algorithms. (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1 C =e M mod n m->message ,e->encryption M=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime =m e d mod n number’s
  • 23.
  • 24. Symmetric key cryptography • Only 1 shared key is involved. • The same key encrypts and decrypts the plaintext. • The shared key is kept secret between Alice and Bob. • Examples of Symmetric algorithms: – DES, 3DES, AES, IDEA, BLOWFISH, TWOFISH, RC4, RC5, SAFER etc. Asymmetric key cryptography • Here 2 keys : a private and a public key are involved. • The Public key encrypts the plaintext while the private key decrypts it. • The private key is just kept secret by the Bob while the public key is made public. • Examples of Asymmetric algorithms: – Diffie-Hellman, RSA, El Gamal, Elliptic Curve Cryptography (ECC) etc.
  • 25. APPLICATIONS • Defense Services • Secure Data Manipulation • E – Commerce • Business Transactions • Internet Payment Systems • User Identification Systems • Access Control • Data Security
  • 26. PROPOSED CONCEPT  As known the data has been easily hacked even for the 52- bit encryption too. So, the encryption bits of 52-bits should be given with the combination of both numerals and alphabets ( for example one alphabet is placed for 13-bits each).  The placement of alphabet is known only to the particular sender & receiver such that it secures the data to be sent.
  • 27. CONLUSION  This paper describes a technique to successfully hiding and secure the data or massage with the help of Encryption or Decryption technique with the Cryptography And Network Security.  However ,this research work & software package provide a good starting point for anyone interested in learning about Cryptography.
  • 28. “For every lock there is a key……… It is better to keep safe your lock than the key”