Information Security & Cryptography

4,036 views

Published on

Information Security & Cryptography

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,036
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
93
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • 18 October 2010
  • 18 October 2010
  • The SD3 security framework has proven an effective tool for encouraging the adoption of secure development practices. Ensure your systems are secure by design, meaning that you have carried out threat modelling to identify security vulnerabilities, you conduct code reviews focusing on security issues and that you ensure that security testing is an integral part of the testing process. Write software that runs with just enough privilege to carry out its purpose, but no more. Implement systems that are secure by default. Reduce the potential for attack by ensuring that optional features are turned off by default. Secure in Deployment. Ensure that your systems are easy to administer and update, so that security vulnerabilities may be addressed. Educate users on how to use the application securely. Provide a continuing program of security assessments and testing.
  • 18 October 2010
  • Information Security & Cryptography

    1. 1. It's a Presentation from THIAGARAJAR POLYTECHNIC COLLEGE (Autonomous Institution) Salem - 5
    2. 2. Information Security & Cryptography
    3. 3. Presented & performed by <ul><li>Ranjith. B </li></ul><ul><li>Arunachalam. PL </li></ul><ul><li>COMPUTER ENGINEERING </li></ul>
    4. 4. <ul><li>INFORMATION SECURITY </li></ul><ul><ul><li>OBJECTIVES OF SECURITY </li></ul></ul><ul><ul><li>PASSWORD AUDITING </li></ul></ul><ul><ul><li>DATA SECURITY </li></ul></ul><ul><ul><li>AUTHENTICATION </li></ul></ul><ul><li>CRYPTOGRAPHY </li></ul><ul><ul><li>Encryption and Decryption </li></ul></ul><ul><ul><li>Public & Private Key Cryptography </li></ul></ul><ul><ul><li>Digital signatures </li></ul></ul><ul><ul><li>RSA ALGORITHM </li></ul></ul><ul><li>DEMONSTRATION </li></ul><ul><li>CONCLUSION </li></ul>Synopsis
    5. 5. INFO SECURITY -> a small intro… <ul><li>Why it is needed ? </li></ul><ul><li>Where ? </li></ul><ul><li>How? </li></ul>
    6. 6. OBJECTIVES OF SECURITY <ul><ul><li>To avoid data threats </li></ul></ul><ul><ul><li>To avoid denial of services </li></ul></ul><ul><ul><li>To secure our data from Masquerades </li></ul></ul><ul><ul><li>To safeguard our data's from traffic analyzer </li></ul></ul><ul><ul><li>To not to make the message for the third person available </li></ul></ul>
    7. 7. PASSWORD AUDITING <ul><li>Should not be in uppercases </li></ul><ul><li>Must have at least 8 characters </li></ul><ul><li>Must include alphabets, numeric keys and special characters </li></ul><ul><li>Password should not be the name of the user, dictionary word etc., </li></ul><ul><li>It must be updated at least once a month </li></ul>
    8. 8. DATA SECURITY <ul><li>To monitor the users ACCESS CONTROLS </li></ul><ul><li>Systems that are connected in networks must be protected with FIREWALLS </li></ul><ul><li>To protect the integrity and availability of the institution’s information assets </li></ul>
    9. 9. CYPTOGRAPHY -> small intro… <ul><li>KEYWORDS </li></ul><ul><ul><li>Cryptography </li></ul></ul><ul><ul><li>Encryption & Decryption </li></ul></ul><ul><ul><li>Public Key Cryptography </li></ul></ul><ul><ul><li>Private Key Cryptography </li></ul></ul><ul><ul><li>Digital Signatures </li></ul></ul><ul><ul><li>RSA Algorithm </li></ul></ul>
    10. 10. <ul><li>Cryptography is the science of using mathematics to encrypt and decrypt data. </li></ul><ul><li>Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. </li></ul><ul><li>Its very usefull to OUR Army and Police networks to transfer confidential datas. </li></ul>Cryptography
    11. 11. ENCRYPTION AND DECRYPTION <ul><li>Encryption is a technique that converts the original text into an unreadable text </li></ul><ul><li>The converted original text is called as CIPHER TEXT </li></ul><ul><li>Decryption technique is used to convert the cipher text into the original text </li></ul><ul><li>Authentication is the verification process which identifies the password and username </li></ul><ul><li>Digital signatures are signed to make the cipher text into unreadable or unchangeable </li></ul>
    12. 12. Principles of public key system John’s public key John Annie plaintext cipher text Dec.ALG Enc.ALG plaintext
    13. 13. The SD3 Security Framework Secure by Design Secure by Default Secure in Deployment <ul><li>Build threat models </li></ul><ul><ul><li>Conduct code reviews </li></ul></ul><ul><ul><li>Run code with minimal privileges </li></ul></ul><ul><ul><li>Minimize your attack surface </li></ul></ul><ul><ul><li>Enable services securely </li></ul></ul><ul><ul><li>Leverage the security best practices </li></ul></ul><ul><ul><li>Create security guidance </li></ul></ul><ul><ul><li>Build tools to assess application security </li></ul></ul>The Secure Windows project team at Microsoft has adopted a simple set of tactic called SD3. <ul><ul><li>Minimize your attack surface </li></ul></ul><ul><ul><li>Enable services securely </li></ul></ul><ul><ul><li>Minimize your attack surface </li></ul></ul><ul><ul><li>Enable services securely </li></ul></ul>
    14. 14. <ul><li>Published in 1978 by MIT, US </li></ul><ul><li>The main function of this algorithm is to providing approach to public key cryptography and encryption </li></ul><ul><li>In this the CIPHER TEXT are all the integers between 0 to n-1 </li></ul><ul><ul><ul><li>C = m e mod n </li></ul></ul></ul><ul><ul><ul><li>m = c d mod n </li></ul></ul></ul><ul><ul><ul><li>= (me)d mod n </li></ul></ul></ul><ul><ul><ul><li>= med modn </li></ul></ul></ul>RSA Algorithm <ul><ul><ul><ul><li>m -> message </li></ul></ul></ul></ul><ul><ul><ul><ul><li>e -> encryption </li></ul></ul></ul></ul><ul><ul><ul><ul><li>d -> decryption </li></ul></ul></ul></ul><ul><ul><ul><ul><li>n -> integers (p*q) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>P and Q are the prime numbers </li></ul></ul></ul></ul>
    15. 15. Decryption Algorithm Message Source Encryption Algorithm Destination Crypt. Analyst Key Pair Source X Y X PR a PR a PU a X=E(PR ,X) a X=D(PU ,Y) a X=WELCOME Y=5370379 Principles of public key system -> a DEMONSTRATION
    16. 16. Conclusion
    17. 17. This Paper has been submitted under the guidance of <ul><li>Over headed by </li></ul><ul><ul><li>M.Saravanan (M.E) – Lecturer (Computer Tech). </li></ul></ul><ul><ul><li>PL.Sindhu B. E – Lecturer (Computer Tech). </li></ul></ul>MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Technology
    18. 18. “ Thank You” “ For every lock there is a Key… It is better to KEEP SAFE YOUR LOCK THAN THE KEY”
    19. 19. Bibliography <ul><li>References </li></ul><ul><ul><li>CCNA INTRO - Wendell Odom </li></ul></ul><ul><ul><li>Network Essentials – William Stalings </li></ul></ul>Website www.wikipedia.com www.securitymeasures.com

    ×