It’s Presentations from         Network Security &Cryptography
Friend
Presented & performed by              Mr: Rahulprasad yadav              Mr: Nakul Naikwade            (Information Techno...
Network Security & Cryptography
Synopsis       Network security        ->Objective of Security        ->Password Auditing        ->Data Security        ->...
ETWORK SECURITY ->a small intro....    ->WHY it is needed?   ->WHERE it is needed?    ->HOW it is needed?    Network Secur...
OBJECTIVE OF SECURITY     To avoid data threats     To avoid denial of services     To secure our data from masquerades   ...
PASSWORD AUDITING  Should not be in uppercase  Must have at least 8 characters  Must include alphabets, numeric keys & spe...
DATA SECURITY To monitor the user’s ACCESS CONTROLS System that are connected in network must be protected  with firewalls...
RYTOGRAPHY->a small intro……keywords    ->cryptography    ->Encryption &Decryption   ->Public& Private key cryptography    ...
CRYTOGRAPHY    Cryptography is science of using mathematics toencrypt decrypt data     Cryptography enable you to store se...
ENCRYPTION AND DECRYPTION  Encryption is a technique that convert’s the original  text into an unreadable text The convert...
PUBLIC & PRIVATE KEYCRYPTOGRAPHY     Public-key cryptography refers to a cryptography systemrequire 2 separate keys, one t...
RSA ALGORITHEM        Published in 1978 by MIT,US   (1)The main function of this algorithm is providing approach    to pub...
PUBLIC KEY SYSTEM->a Demonstration
CONLUSION   This paper describes a technique to successfullyhiding and secure the data or massage with the helpof Encrypti...
“for every lock there is a key………It is better to keep safe your lock than the key”                 “          Network Secu...
Bibliography    References     CCNA INTRO-wendell odom     NETWORK ESSENTIALS-william stalings  Website     www.wikipedia....
Network security & cryptography
Network security & cryptography
Upcoming SlideShare
Loading in...5
×

Network security & cryptography

4,819

Published on

Published in: Technology, Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,819
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
331
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Network security & cryptography

  1. 1. It’s Presentations from Network Security &Cryptography
  2. 2. Friend
  3. 3. Presented & performed by Mr: Rahulprasad yadav Mr: Nakul Naikwade (Information Technology)Network Security & cryptography
  4. 4. Network Security & Cryptography
  5. 5. Synopsis Network security ->Objective of Security ->Password Auditing ->Data Security ->Authentication Cryptography ->Encryption & Decryption ->Public & Private Key Cryptography ->Digital Signatures ->RSA Algorithm Demonstration Conclusion Network Security & Cryptography
  6. 6. ETWORK SECURITY ->a small intro.... ->WHY it is needed? ->WHERE it is needed? ->HOW it is needed? Network Security& Cryptography
  7. 7. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades To safeguard our data’s from traffic analyzer To not to make massage for the third person available Network Security & Cryptography
  8. 8. PASSWORD AUDITING Should not be in uppercase Must have at least 8 characters Must include alphabets, numeric keys & special characters Password should not be the name of the user, dictionary word etc., It must be updated at least once a month Network Security & Cryptography
  9. 9. DATA SECURITY To monitor the user’s ACCESS CONTROLS System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s Network Security & Cryptography
  10. 10. RYTOGRAPHY->a small intro……keywords ->cryptography ->Encryption &Decryption ->Public& Private key cryptography ->Digital signature’s ->RSA Algorithm Network Security & Cryptography
  11. 11. CRYTOGRAPHY Cryptography is science of using mathematics toencrypt decrypt data Cryptography enable you to store sensitiveinformation or transmit it across insecure networks(likeinternet) so that it cannot be read by anyone except theintended recipient It’s very useful to our Army & Police network to transfor confidential data Network Security & Cryptography
  12. 12. ENCRYPTION AND DECRYPTION Encryption is a technique that convert’s the original text into an unreadable text The converted original text is called as Cipher text Decryption technique is used to convert the cipher text into the original text Authentication is the verification process which identifies the password & username Digital signature are signed to make the cipher text into unread- able Network Security &Cryptography
  13. 13. PUBLIC & PRIVATE KEYCRYPTOGRAPHY Public-key cryptography refers to a cryptography systemrequire 2 separate keys, one to lock or encrypt the plaintext& one to unlock or decrypt the cipher text Private-key ,a private or secret key is an encryptiondecryption key known only to the party or parties that exchangesecret massages a problem with PKC is that sender & receiver ofmessage must agree on a common key via alternative securechannel Network Security & Cryptography
  14. 14. RSA ALGORITHEM Published in 1978 by MIT,US (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1C=e M mod n m->message ,e->encryptionM=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime number’s =m e d mod n Network Security & Cryptography
  15. 15. PUBLIC KEY SYSTEM->a Demonstration
  16. 16. CONLUSION This paper describes a technique to successfullyhiding and secure the data or massage with the helpof Encryption or Decryption technique with theCryptography And Network Security.However ,this research work & software packageprovide a good starting point for anyone interested inlearning about Cryptography. Network Security & Cryptography
  17. 17. “for every lock there is a key………It is better to keep safe your lock than the key” “ Network Security & Cryptography
  18. 18. Bibliography References CCNA INTRO-wendell odom NETWORK ESSENTIALS-william stalings Website www.wikipedia.com www.securitymeasure.com Network Security & Cryptography
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×