SlideShare a Scribd company logo
1 of 17
NETWORK SECURITY
CRYPTOGRAPHY
BY:
R.Thushara Bharathi (CSE)
S. Jahnavi (CSE)
WHAT IS NETWORK
∗ A network Is an interconnection or a
media between two or more systems
to share information among them.
∗ The various threats caused to
network are :
 Remote Login
 Application Backdoors
 SMTP Session Hijackings
 Operating System Bugs
 Spams
 Viruses etc.
NETWORK SECURITY
∗ The security provided to the network is
called network security which at present
is looming on horizon as a massive
problem.
∗ There are two kinds of Network Security
mainly as :
 Transit Security
:
it just encrypts the packets to be
transferred.
 Traffic Security
:
it acts just as a screen between hosts
& remote sites.
PROBLEMS & ATTACKS
∗ There are few intertwined areas in network security as:
 Secrecy
 Authentication
 Non-Repudiation
 Integrity Control etc.
∗ The threats are classified into two categories :
Passive Attacks :
A passive attack is one in which the attacker eavesdrops and
listens to the message but can’t modify the message.
Active Attacks :
An active attack is one in which the attacker modifies, deletes,
replay or introduce new messages into the stream of message.
CRYPTOGRAPHY
∗ It is derived from the Greek word that
meant for secret writing.
∗ Cryptography is the ability to send
information between particulars in a
way that it prevents others from
reading the data.
∗ The data is transferred by applying
two techniques by changing the plain
text & Cipher texts as Encryption (P
to C) & Decryption (C to P).
PRINCIPLES & SERVICES OF
CRYPTOGRAPHY
∗ The two fundamental principles of cryptography are:
 Messages must contain some Redundancy (information
not needed to understand the message).
 Some method is needed to foil replay attacks (validation
of messages by timestamp) i.e. freshness.
∗ The services provided by the cryptography are as follows:





Integrity Checking
Authentication
Protection to the data
Confidentiality of information etc.
ENCRYPTION & DECRYPTION
∗ The way of converting the
plain text to the cipher text
by the means of few keys
is called as “encryption”.
∗ The way of converting the
cipher text to the plain text
by the use of keys that are
suitable to it is called as
“decryption”.
SUBSTITUTION CIPHER
∗ Replacing of each letter or
group of letters of plain text
into cipher text by another
letters is called as “substitution
cipher”.
∗ The substitution may be :
 Monoalphabetic Substitution
 Digrams
 Trigrams
TRANSPOSITION CIPHER

∗ The change offered in the
position of the text i.e. By
jumbling the words is called
as “transposition cipher”.
∗ And the technique used
here is termed as “mass
technique”.
SECRET-KEY ALGORITHMS
∗ The implementation of a simple cryptography using
single key is done by the secret-key algorithms.
∗ This can be done by p-box, s-box and product
cipher.
ELEMENTS OF PRODUCT CIPHERS
∗ Transpositions & substitutions can be done through
p-box (a).
∗ Substitutions can be done through s-box (b).
∗ Mapping of the p-box with s-boxes form product
cipher (c).
PUBLIC-KEY ALGORITHMS
∗ Public key algorithms
are formed when it
satisfies the following
requirements:
 D(E(P))=P.
 Difficulty to deduce D
from E.
 E cannot be broken
by a chosen plain
text attack.
RSA ALGORITHM
∗ RSA is derived from the names of
the 3 discoverers named Rivest,
Shamir, Adleman.
∗ The RSA algorithm is one of the
widely used in the key algorithms.
∗ But takes much time for the large
volumes of data encryption. This is
done by few mathematical
principles as:
 Choose 2 large primes.
 Compute n=pxq & z=(p-1)x(q-1).
 Find e, exd=1 mod z.
ADVANTAGES & DISADVANTAGES
∗ Advantages :
 Used to protect the data from the others.
 Used to send the data / packet in a secured way
from the source to destination.
 Avoids in knowing the data in the way of
sending.
∗ Disadvantages:
 Hacking is done now-a-days easily even for the data
encrypted with 48 bits though the bits are extended
by 52-bits.
PROPOSED CONCEPT
∗ As known the data has been easily hacked even for
the 52- bit encryption too. So, the encryption bits of
52-bits should be given with the combination of both
numerals and alphabets ( for example one alphabet is
placed for 13-bits each).
∗ The placement of alphabet is known only to the
particular sender & receiver such that it secures the
data to be sent.
Network security cryptography ppt
Network security cryptography ppt

More Related Content

What's hot

What's hot (20)

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Key management
Key managementKey management
Key management
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Software security
Software securitySoftware security
Software security
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network securitymmubashirkhan
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyRajKumar Rampelli
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Jorge Salazar
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographypinkutinku26
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Tania Agni
 

Viewers also liked (20)

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
cryptography
cryptographycryptography
cryptography
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
E securty
E securtyE securty
E securty
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Flood
FloodFlood
Flood
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 

Similar to Network security cryptography ppt

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography pptSoma Subbama
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfAdiseshaK
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 

Similar to Network security cryptography ppt (20)

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
Rsa
RsaRsa
Rsa
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Group 6
Group 6Group 6
Group 6
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Net
NetNet
Net
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 

Recently uploaded

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Recently uploaded (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Network security cryptography ppt

  • 2. WHAT IS NETWORK ∗ A network Is an interconnection or a media between two or more systems to share information among them. ∗ The various threats caused to network are :  Remote Login  Application Backdoors  SMTP Session Hijackings  Operating System Bugs  Spams  Viruses etc.
  • 3. NETWORK SECURITY ∗ The security provided to the network is called network security which at present is looming on horizon as a massive problem. ∗ There are two kinds of Network Security mainly as :  Transit Security : it just encrypts the packets to be transferred.  Traffic Security : it acts just as a screen between hosts & remote sites.
  • 4. PROBLEMS & ATTACKS ∗ There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity Control etc. ∗ The threats are classified into two categories : Passive Attacks : A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message. Active Attacks : An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message.
  • 5. CRYPTOGRAPHY ∗ It is derived from the Greek word that meant for secret writing. ∗ Cryptography is the ability to send information between particulars in a way that it prevents others from reading the data. ∗ The data is transferred by applying two techniques by changing the plain text & Cipher texts as Encryption (P to C) & Decryption (C to P).
  • 6. PRINCIPLES & SERVICES OF CRYPTOGRAPHY ∗ The two fundamental principles of cryptography are:  Messages must contain some Redundancy (information not needed to understand the message).  Some method is needed to foil replay attacks (validation of messages by timestamp) i.e. freshness. ∗ The services provided by the cryptography are as follows:     Integrity Checking Authentication Protection to the data Confidentiality of information etc.
  • 7. ENCRYPTION & DECRYPTION ∗ The way of converting the plain text to the cipher text by the means of few keys is called as “encryption”. ∗ The way of converting the cipher text to the plain text by the use of keys that are suitable to it is called as “decryption”.
  • 8. SUBSTITUTION CIPHER ∗ Replacing of each letter or group of letters of plain text into cipher text by another letters is called as “substitution cipher”. ∗ The substitution may be :  Monoalphabetic Substitution  Digrams  Trigrams
  • 9. TRANSPOSITION CIPHER ∗ The change offered in the position of the text i.e. By jumbling the words is called as “transposition cipher”. ∗ And the technique used here is termed as “mass technique”.
  • 10. SECRET-KEY ALGORITHMS ∗ The implementation of a simple cryptography using single key is done by the secret-key algorithms. ∗ This can be done by p-box, s-box and product cipher.
  • 11. ELEMENTS OF PRODUCT CIPHERS ∗ Transpositions & substitutions can be done through p-box (a). ∗ Substitutions can be done through s-box (b). ∗ Mapping of the p-box with s-boxes form product cipher (c).
  • 12. PUBLIC-KEY ALGORITHMS ∗ Public key algorithms are formed when it satisfies the following requirements:  D(E(P))=P.  Difficulty to deduce D from E.  E cannot be broken by a chosen plain text attack.
  • 13. RSA ALGORITHM ∗ RSA is derived from the names of the 3 discoverers named Rivest, Shamir, Adleman. ∗ The RSA algorithm is one of the widely used in the key algorithms. ∗ But takes much time for the large volumes of data encryption. This is done by few mathematical principles as:  Choose 2 large primes.  Compute n=pxq & z=(p-1)x(q-1).  Find e, exd=1 mod z.
  • 14. ADVANTAGES & DISADVANTAGES ∗ Advantages :  Used to protect the data from the others.  Used to send the data / packet in a secured way from the source to destination.  Avoids in knowing the data in the way of sending. ∗ Disadvantages:  Hacking is done now-a-days easily even for the data encrypted with 48 bits though the bits are extended by 52-bits.
  • 15. PROPOSED CONCEPT ∗ As known the data has been easily hacked even for the 52- bit encryption too. So, the encryption bits of 52-bits should be given with the combination of both numerals and alphabets ( for example one alphabet is placed for 13-bits each). ∗ The placement of alphabet is known only to the particular sender & receiver such that it secures the data to be sent.