You are on page 1of 10

CSE

Paper Presentation
On

NETWORK SECURITY
Submitted By

D.HARITHA
E-mail : haritha.devinani@gmail.com

Department of
Computer Science
KMM INSTITUTE OF
TECHNOLOGY &
SCIENCE
(Affiliated to JNTU, Anantapur)

KMM INSTITUTE OF TECHNOLOGY &


SCIENCE
Reg. No : 083G1A0520 Topic : NETWORK
SECURITY
CSE

Name : D.HARITHA Course :1I1-B.Tech


[CSE]

security mechanisms are primarily


Abstract
based on cryptographic algorithms
SECURITY” in this contemporary
scenarios has become a more like symmetric-DES, AES,
sensible issue either it may be in
“REAL WORLD” or in the “CYBER asymmetric-RSA, ECC. Generally,
WORLD” .in this world as opposed to
the cyber world an attack is often
the logical conclusion is to use both
preceded by information gathering.

kind of algorithms and their

Network security is a
combinations to achieve optimal

complicated subject, historically only


speed and security levels. It is hoped

tackled by well-trained and


that the reader will have a wider

experienced experts. However, as


perspective on security in general,

more and more people


and better understand how to reduce

become”wired'', an increasing
and manage risk personally.

number of people need to understand


Contents
 Introduction
the basics of security in a networked Popular networks
 Security services
 Security threats
world. Our paper covers different
 Where do they come
from?
kinds of threats & firewalls in the  Preventing security
disasters
 Firewalls
network by implementation of
 Types of firewalls
Point of failure
different security services using

various security mechanisms. The


CSE

development of computer networks


 Security mechanisms has reached the point, where security

becomes essential. Users want to


 Cryptography
exchange data in a secure way. The

problem of network security is a


 Types of cryptography
complex issue. Network security

means a protection of the network

 Secret key cryptography assets.


Popular networks:
UUCP:(Unix-to-Unix Copy) was
originally developed to connect
UNIX (surprise!) hosts together.
 Public key cryptography Internet:The Internet is the
world's largest networkof
networks.
Services for security:
The services are intended to
 Hash algorithms
counter security attacks, and
 Conclusion
they make use of one or more
 Bibliography
security mechanisms to provide
the service.

1.Confidentiality: Ensure that the

information in a computer system and

transmitted information are

accessible only for reading by

Introduction: authorized parties. This type of

A basic understanding of access includes printing displaying

computer networks is requisite in and other forms of disclosure,

order to understand the principles of including simply revealing the

network security. In this section, we'll existence of an object.


2.Authentication: Ensure that the
cover some of the foundations of origin of a message or electronic
document is correctly
computer networking, then move on with an assurance that the
identity is not false;
to an overview of some popular
3.Integrity: Ensures that only authorized
networks. The impressive
parties are able to modify computer
CSE

information that is being


systems assets and transmitted transmitted. Two
types of passive attacks are
information. Modification includes release of message contents and
traffic analysis.
writing, changing, changing status, Active attacks:. These attacks
involve some modification of the
deleting, creating and delaying or data stream or the creation of
false
replaying of transmitted messages. stream and can be sub divided
4.Non-repudiation: Requires that into 4 categories: Masquerade,
neither the sender nor the Replay, Modification of
receiver of a message is able to messages, and
deny denial of service.
the transmission. Denial of service: Do S (Denial-
5.Access control: Require that of-Service) attacks are probably
access to information resources the nastiest, and most difficult to
may be controlled by or for the
target system. address. Such attacks were fairly
6.Availability: Require that
computer systems assets be common in late 1996 and early 1997,
available to authorized parties
when but are now becoming less popular.
needed.
Some things that can be done to

reduce the risk of being stung by a


Attacks:
Attacks on the security of a denial of service attack include
computer system or network are •

best characterized by viewing Not running your visible-to-the-


the world servers at a level too close
function of a computer system to capacity

as provided information. This Using packet filtering to prevent
normal flow is depicted in figure: obviously forged packets from
entering into your
network address space.

Keeping up-to-date on security-


related patches for your hosts'
operating systems.
Unauthorized Access:

``Unauthorized access'' is a very

high-level term that can refer to a

number of different sorts of attacks.

The goal of these attacks is to access


Security threats
Categorization of these attacks some resource that your machine
is passive attacks and active
attacks. should not provide the attacker.
Passive attacks: In this the goal
of the attacker is to obtain These can take the form of a virus,
CSE

Best for me: Lots of options are


worm, or Trojan horse. One of the available, and it makes sense to
spend some time with an expert,
most publicized threats either in-house, or an
experienced consultant who can
to security is intruder. Generally take the time to understand your
referred to as a hacker or organization's
cracker, and some other threats security policy, and can design
are and build a firewall architecture
executing commands illicitly, that best implements that policy.
confidential breaches, Points of Failure: Any time there
destructive behavior. is only one component paying
Where do the attacks come attention to what's going on
from? How, though, does an between
attacker gain access to your the internal and external
equipment? networks, an attacker has only
Through any connection that you one thing to break (or fool!) in
have to the outside world. This order to gain
includes Internet connections, complete access to your internal
dial-up networks.
modems, and even physical Security Mechanisms: A
access. mechanism that is designed to
Preventing security disasters: detect, prevent, or recover from

Hope you have backups a security



attack. Cryptography and
Stay current with relevant Steganographic are such two
operating system patches techniques. Hence we focus on

Don't put data where it doesn't development,


need to be use and management of

Cryptographic techniques.
Avoid systems with single points
of failure
What is Cryptography?

Watch for relevant security


advisories The word “cryptography” is
Firewalls:
derived from Greek and when literally
Firewalls can be an effective
translated, means “secret writing.”
means of protecting a local system or
The study of enciphering and
network of systems from network
encoding (on the sending end), and
based security threats while at the
decoding (on the receiving end) is
same time, a firewall is simply a
called cryptography. Although the
group of components that collectively
distinction is fuzzy, ciphers are
form a barrier between two networks.
Types of firewalls: different from codes. When you mix

Application Gateways up or substitute existing letters, you

Packet Filtering are using a cipher.

Hybrid systems
CSE

DTTZD TQYZT KLEIG GSWTI


Encryption refers to the OFRZI TUNDM
Transposition cipher: Text
transformation of data in “plain text” chosen in one form can be
enciphered choosing a different
form into a form called “cipher route. To
decipher, you fill the in box
text,” .The recovery of plain text following the zigzag route and
read the message using the
requires the key, and this process is spiral route.
The cipher text becomes:
known as decryption. This key is EAMTN FTDIE EHOTE RHMEM
BYESC GLOHO
meant to be secret information and
Types of Cryptography:
the privacy of the text depends on the There are three types of
cryptographic algorithms:
cryptographic strength of the key. 1. Secret Key Cryptography.

2. Public Key Cryptography.


Ciphers are broken into two main
3. Hash Algorithms.
categories, substitution ciphers Secret Key Cryptography:

Secret key cryptography


and transposition ciphers.
involves the use of single key. Given
Substitution ciphers replace letters in
a message (Plain text) and the key,
the plaintext with other letters or
encryption produces cipher text,
symbols, keeping the order in which
which is about the same length as the
the symbols fall the same.
plain text was. Decryption is the
Transposition ciphers keep all of the
reverse of encryption, and uses the
original letters intact, but mix up their
same key as encryption.
order.
Substitution cipher: Encryption
Plain text------------------> cipher
Plaintext letter
ABCD EF G H IJK LM N text
Key
OP Q RST UV WX Y Z
Cipher text letter Cipher text------------------> plain
text
QW ER TY U IOP A S DF
G HJ K LZX C V B NM Decryption
Secret key cryptography is
You can construct a secret
message from the above table. sometimes referred to as
symmetric cryptography
Relative substitutions can be
done. So, the orconventional
cryptography. If sender and
message “ Meet me after school
behind the gym,” would read receiver agree on a shared
secret key, then by using secret
“DTTZ DT QYZTK LEIGGS
WTIOFR ZIT UND.” key
Five letters are customary in the
cryptography we can send messages
spy biz, so your message comes
out like this: to one another on a medium that can
CSE

be tapped, without worrying about Public key cryptography sometimes

eavesdroppers. All we need to do is also referred to as asymmetric

have the sender encrypt the cryptography. The public key need

messages and the receiver decrypt not be kept secret, and, in fact, may

them using the key. An eavesdropper be widely available, only its

will only see unintelligible data. Some authenticity is required to guarantee

of the secret key cryptography that A is indeed the only party who

algorithms are - DES, 3-DES, knows the co-responding private key.

blowfish, IDEA, AES, RC2, RC4, A primary

RC5, ECB etc.


Advantages of Secret Key advantage of such systems is that
Cryptography:
providing authentic public keys is
o Very fast relative to public key
generally easier than distributing
cryptography.
secret keys securely, as required in
o Considered secure, provided the
symmetric key systems. The main
key is relatively strong.
objective of public-key encryption is
o The cipher text is compact (i.e.,
to provide privacy or confidentiality.
encryption does not add excess
Public-key encryption schemes are
“Baggage” to the cipher text).
typically substantially slower than
o Widely used and very popular.
Disadvantages of Secret Key symmetric-key encryption algorithms
Cryptography:
such as DES.
o The administration of the keys can The private key and the public
key are mathematically linked.
become extremely complicated. Encryption
Plain text---------------------------------
o A large number of keys are needed > cipher text
Public key
to communicate securely with a large Private key
Cipherkey--------------------------------
group of People. > plain text
Decryption
o The key is subject to interception by
Public key cryptography can do
hackers.
Public Key Cryptography: anything secret key cryptography can
CSE

do like- transmitting the data over an takes a message of arbitrary length

insecure channel, secure storage on and computes from it a fixed length

insecure media, authentication number.


The following things can be done
purposes and digital signatures. using hash algorithms.

Some Public key cryptography Password Hashing: When a user


types a password, the system
algorithms are RSA, Elliptic Curve must store the password
encrypted
Cryptography (ECC), ElGamal, DH,
because someone else can use it. To
DSA/DSS etc.
Advantages of Public key avoid this problem hashing is used.
Cryptography:
When a password is supplied, it
o Considered very secure, and easy
computes the password hash and
to configure these systems.
compares it with the stored value if
o No form of secret sharing is
they match; the password is taken to
required, thus reducing key
be correct.
administration to a Minimum. Message Integrity: Cryptographic
hash functions can be used to
o Supports non-repudiation. protect the integrity of a
message
o The number of keys managed by transmitted over insecure media.
Message fingerprint:We can
each user is much less compared to know whether some data stored
has been modified from one day
secret key to the
Cryptography.
Disadvantages of Public key next, if we save that data structure
Cryptography:
o Much slower compared to with a hash function. We can
secret key cryptography.
o The ciphertext is much larger compare the hash function data
than the plaintext, relative to
secret key Cryptography. structure with the message on the
Hash Algorithms:
message data. If the message digest
Hash algorithms are also
has not changed, you can be sure
known as message digests or one-
that none of the data is changed.
way transformations. A Digital Signatures: can be
efficiently implemented using
cryptographic hash function is a hash functions.
Implementation Issues
mathematical transformation that Key Size:
CSE

This has major role for amount of

security. If the algorithm is inherently

strong, then it can be assumed that

the larger the key size for the ciphers,

the harder it is for a hacker to perform

an attack on the cipher text. But,

larger keys lead to lower levels of

performance. Thus there are, trade-

offs, which are traditionally made

between the level of security and

other factors, like performance.


Hybrid Systems:
Just one crypto-system will not
solve every problem. Most
systems in use today employ a
hybrid system.

Conclusion:
Everyone has a different

idea of what ``security'' is, and what

levels of risk are acceptable. It's

important to build systems and

networks in such a way that the user

is not constantly reminded of the

security system around him. As and


and is playing a major role.
when new security methods are Cryptography is evergreen and
developments in this area are a
developed, breaking of these better
option.
methods has increased. So References:
o

measures have to be taken to fill the William Stallings: Cryptography


and Network security: principles
loopholes, of which cryptography has and practice: 2nd edition.
o

J.P. Holbrook, J.K. Reynolds.


``Site Security Handbook.''
o
CSE

Douglas R.Stinson.
Cryptography: theory and
practice: 2nd edition
o

A.Menezes, P.van Oorschot and


S.Vanstone:Handbook of Applied
Cryptography.
o

Smith, Laurence Dwight.


Cryptography, the Science of
Secret Writing

You might also like