You are on page 1of 25

WELCOME

SEMINAR ON
NETWORK SECURITY & cryptography

BY
D.HARITHA (cse )
CONTENTS:
 Introduction
 networks aspects
 Security services
 Security threats/ Attacks
 Fire walls
 Security mechanisms
 Cryptography
 Types of cryptography
 Conclusion
INTRODUCTION:

 What is network?

 Why we need network security?

 What is the role of cryptography


in network security?
Aspects of Security:
 consider 3 aspects of information
security:
 security attack
 security mechanism
 security service
Security Attack
 information security is about how to prevent
attacks, or failing that, to detect attacks on
information-based systems
 often threat & attack used to mean same
thing
 have a wide range of attacks
 can focus of generic types of attacks
 passive
 active
Passive attacks
Active attacks
ATTACKS:
SECURITY SERVICES
 enhance security of data processing systems
and information transfers of an organization
 intended to counter security attacks
 using one or more security mechanisms
 often replicates functions normally associated
with physical documents
 which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
SECURITY SERVICES
1. CONFIDENTIALITY: Ensure that
information in a computer system and
transmitted information are accessible only
read by authorized parties.
2. AUTHENTICATION: Ensure that the origin
of message is correct.
3. INTEGRITY: Ensure that only authorized
parties are able to modify computer
systems or transmitted information.
SECURITY SERVICES
4. NON-REPUDIATION: Requires that neither
sender nor receiver of a message is able to
deny the transmission.
5. ACCESS CONTROL: Requires that access
to information resources may be controlled
for target system.
6. AVAILABILITY: The availability of
computer systems must be only for
authorized parties when ever needed.
FIRE WALLS:
o Firewalls can be an effective means of protecting
a local system or network of systems from
network based security threats while at the same
time, a firewall is simply a group of components
that collectively form a barrier between two
networks.
o TYPES OF FIRE WALLS:
1. Application gate ways
2. Packet filtering
3. Hybrid systems
FIRE WALLS:

GLOBAL
FIREWALL
INTERNET

INSIDE OUTSIDE
SECURITY MECHANISMS:
 A mechanism that is designed to detect,
prevent, or recover from a security attack.
Cryptography and Steganographic are
such two techniques. Hence we focus on
development, use and management of
Cryptographic techniques.
CRYPTOGRAPHY:
 The word “cryptography” is derived from Greek
means “ secret writing”.
 the process of encoding and decoding the data is
called cryptography.
 encryption refers to the transformation of data
from plain text to cipher text.
 decryption refers to the transformation of cipher
text to original data.
 this process requires a key in order to provide
security or privacy for the data.
CRYPTOGRAPHY:
 Substitution cipher:
Plaintext letter
ABCDEFGH
Cipher text letter
FHE ACDGB
CRYPTOGRAPHY:
TYPES OF CRYPTOGRAPHY:
There are types of cryptographic
algorithms. They are
1. secret key algorithm

2. public key algorithm


SECRET KEY CRYPTOGRAPHY:
 it involves the use of single key.
 it is also known as symmetric
cryptography.
Encryption
Plain text ------------------> cipher text
Key
  Cipher text------------------> plain text
Decryption
SECRET KEY CRYPTOGRAPHY:

ADVANTAGES:
1.widely used and very popular.
2. very fast relative to public key
cryptography.
3.cipher text is compact.
 DISADVANTAGES:
1. administration of keys become extremely
complicated.
2. key is subject to interception by hackers.
PUBLIC KEY CRYPTOGRAPHY:
 it is also known as asymmetric cryptography.
 it is used to provide privacy or confidentiality.
Encryption
Plain text ---------------------------------> cipher text
  Public key

Private key
  Cipher key --------------------------------> plain
text
Decryption
PUBLIC KEY CRYPTOGRAPHY:

 ADVANTAGES:
1. more secure and easy to configure the
systems.
2. supports non-repudiation.
 DISADVANTAGES:
1. slower compared to secret key
cryptography.
2. cipher text is much larger than plain text.
CONCLUSION:
Everyone has a different idea of
what ``security'' is, and what levels of risk
are acceptable. when new security
methods are developed, breaking of these
methods has increased. Cryptography is
evergreen and developments in this area
are a better option.
YOU
A N K
T H
Why do we need Cryptography?

Computers are used by millions of people for many purposes


Banking
Shopping
Tax returns
Protesting
Military
Student records

Privacy is a crucial issue in many of these applications
Security is to make sure that nosy people cannot read or secretly
modify messages intended for other recipients
25

You might also like