Encryption algorithms used. Then the attacks on confidentiality of the transmitted data will be prevented.
Using the intrusion detection systems for detection of unauthorized individuals logged onto a system and making the resources available to legitimate users.
Whenever the unauthorised attacks happen in the system, the security mechanisms can detect the process and the system can respond to make the data unavailable.
Recovery is the final approach if an attacker modifies the data or makes the data unavailable. The data can then be recovered by using backup systems, so that the integrity of the data shall not be compromised.
General model of cryptographic systemData Encryption StandardsAdvanced Encryption Standards
Eg. Bluetooth Device pairing
Eg. 9/11 Attacks used stegan.
Eg. Currency notes
2. General Model
of CRYPTOGRAPHIC SYSTEM
3. Types of
4. Dear Ali
5. Asymmetric Key Encryption
7. Transport Layer Security (TLS) and its predecessor, Secure
Sockets Layer (SSL), are cryptographic protocols which are
designed to provide communication security over the Internet.
They use X.509 certificates and hence asymmetric cryptography to
assure the counterparty with whom they are communicating, and to
exchange a symmetric key.
Several versions of the protocols are in widespread use in
applications such as
8. Types of
Pure Secret Key Public Key
9. Reduces the difficulty in key shar i ng.
Doesn’t pr ovi de bet t er secur i t y
because i t i s easy t o ext r act t he
message i f t he unaut hor i zed per son
knows t he embeddi ng met hod.
10. Pr ovi des bet t er secur i t y compar ed
t o Pur e St eganogr aphy
Di f f i cul t y i n shar i ng t he secr et
key. I f t he at t acker knows t he key
i t wi l l be easi er t o decr ypt and
access or i gi nal i nf or mat i on.