SlideShare a Scribd company logo
1 of 39
Name of Security
Methods
Assi. Prof. Sejal Jadav
Q: Give the Name of Security Methods .
● There are mainly three security methods .
1) Encryption
2) cryptography
3) Authentication.
2
Q: Explain Encryption.
● Encryption is the conversion of electronic data into
another form, called cipher text,
which cannot be easily understood by anyone except
authorized parties.
3
● The primary purpose of encryption is to protect the
confidentiality of digital data stored on computer
systems or transmitted via the Internet or other
computer networks.
4
● Plain Text: Information in its own form.
● Cipher Text: Information in converted form.
● Key: This is a secret parameter (ideally known only
to the communicants) for a specific message exchange
context.
5
● Types of encryption:
1) Symmetric key encryption
2) Asymmetric key encryption:
6
1) Symmetric key encryption
● In symmetric-key schemes, the encryption and decryption keys are the
same.
● Thus communicating parties must have the same key before they can
achieve secret communication.
● Here strength of the key is largely depending on the size of the key and
keeping secret.
● It is a fast technique.
7
● Here the main weakness of the system is that
the key is shared.
● Also called private key encryption.
● There are many symmetric key encryption
algorithms are used.
8
a)Data Encryption Standard(DES):
● Developed in the early 1970s at IBM by James Bamford.
● it is oldest and most widely used algorithms.
● Here the key is 64 bit long.
● This algorithm is widely used in ATM or Credit card
9
b)International Data Encryption Standard(IDES):
● Developed by Swiss Federal institute in the early
1990s.
● Here key is 128 bits long.
10
c)CAST:
● CAST is a popular.
● key sizes up to 128 bits.
● The name CAST stands for Carlisle Adams and
Stafford Tavares, the inventors of CAST.
11
d) Rivest Cipher #4(RC4):
● Developed by Ron Rivest .
● Here key is 128 bits long but in latest version key is
40 bits long.
● Used in Netscape navigator and internet explorer.
12
● 2) Asymmetric key encryption:
● In asymmetric-key schemes, the encryption and decryption keys are the
different.
● Thus communicating parties must have the different key before they can
achieve secret communication.
● It is a slow technique.
● Also called public key encryption.
13
● In public-key encryption schemes, the
encryption key is published for anyone to use
and encrypt messages.
● However, only the receiving party has access to
the decryption key that enables messages to be
read.
14
Q- Explain Authentication.
● The process of identifying an individual, usually based
on a username and password.
● In security systems, authentication is
distinct(separate) from authorization , which is the
process of giving individuals access to system objects
based on their identity.
15
16
● Authentication merely(only) ensures that the
individual is who he or she claims to be, but says
nothing about the access rights of the individual.
17
● Authentication is any process by which a system
verifies the identity of a User who wishes to access it.
● Authentication is essential to effective Security.
18
Authentication factors & Identity:
● The ways in which someone may be authenticated fall
into three categories, based on what are known as the
factors of authentication:
1. something you know,
2. Something you have, or
3. something you are.
19
● Each Authentication factor covers a range of elements
used to authenticate
or verify a person's identity prior(before) to being granted
access,
approving a transaction request,
granting authority to others, and establishing a chain of
authority.
20
● The three factors (classes) and some of elements of each factor are:
The Ownership factors:
● Something the user has (e.g., wrist band, ID card, security token, software
token, phone, or cell phone)
The Knowledge factors:
● Something the user knows (e.g., a password, pass phrase, or personal identification
number (PIN))
The Inherence factors:
● Something the user is or does (e.g., fingerprint, signature, face, voice, unique bio-
electric signals, or other biometric identifier).
21
How Internet Connect
with Computer?
22
To setup the internet user must implement following steps:
● Step 1: Connect the necessary hardware and run any software
included plug in and hook up the modem according to the direction
given.
● Step 2: Make the preliminary connection, your modem must start
broadcasting and be connected before it can technically go online.
Connect via a wireless connection or an Ethernets cable.
23
● Step 3: Go to the routers default IP address. Look in the
manual or on the modem itself for the default IP
address associated with model of modem.
● Step 4: Set up the internet connection. Your internet
service provider should have give the basic information
how to establish the connections.
● Step 5: Save your setting
24
Cryptography
25
Q: Explain Cryptography
● Cryptography is a method of storing and transmitting
data in a particular form.
● Cryptography includes techniques such as microdots,
merging words with images, and other ways to hide
information in storage or transit.
26
● However, in today's computer-centric world,
cryptography is most often associated with plaintext
(ordinary text, sometimes referred to as clear text)
into cipher-text (a process called encryption), then back
again (known as decryption).
27
● Plain Text: Information in its own form.
● Cipher Text: Information in converted form.
● Key: This is a secret parameter.
28
Types of Cryptography:
1) Symmetric-key cryptography:
29
● Symmetric-key systems are simpler
and faster, but their main drawback
is that the two parties must somehow
exchange the key in a secure way.
30
● Symmetric-key cryptography is sometimes called
secret-key cryptography.
● It refers to the encryption methods in which both
sender & receiver share the same key.
● Other terms for symmetric-key encryption are secret-
key, single-key, shared-key, one-key encryption.
31
● It is the oldest and best-known technique.
● A secret key, which can be a number, a word, or
just a string of random letters, is applied to the
text of a message to change the content in a
particular way.
32
● This might be as simple as shifting each letter by a
number of places in the alphabet.
● As long as both sender and recipient know the secret
key, they can encrypt and decrypt all messages that
use this key.
33
2)Asymmetric cryptography:
● Also known as public-key cryptography, uses two
different but mathematically linked keys, one public
and one private.
● The public key can be shared with everyone, whereas
the private key must be kept secret.
34
35
● The problem with secret keys is exchanging them
over the Internet or a large network while preventing
them from falling into the wrong hands.
● Anyone who knows the secret key can decrypt the
message.
36
● One answer is asymmetric encryption, in which there
are two related keys--a key pair.
● A public key is made freely available to anyone who
might want to send you a message.
● A second, private key is kept secret, so that only you
know it.
37
● Any message (text, binary files, or documents) that are
encrypted by using the public key can only be decrypted
by applying the same algorithm, but by using the
matching private key.
● Any message that is encrypted by using the private key can
only be decrypted by using the matching public key.
38
● This means that you do not have to worry about
passing public keys over the Internet (the keys
are supposed to be public).
● A problem with asymmetric encryption, however,
is that it is slower than symmetric encryption. It
requires far more processing power to both
encrypt and decrypt the content of the message.
39

More Related Content

What's hot

Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption TechniquesDel Elson
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20jemtallon
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryptionQamar Farooq
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemMerlin Florrence
 

What's hot (20)

Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Encryption
EncryptionEncryption
Encryption
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 

Similar to 04 authentication

CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16jemtallon
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfAdiseshaK
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 

Similar to 04 authentication (20)

CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Crytography
CrytographyCrytography
Crytography
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Eng12
Eng12Eng12
Eng12
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 

More from Jadavsejal

Programming with Java Concept: Java TimeZone Class
Programming with Java Concept: Java TimeZone ClassProgramming with Java Concept: Java TimeZone Class
Programming with Java Concept: Java TimeZone ClassJadavsejal
 
Programming Java Concept of Event Handling
Programming Java Concept of Event HandlingProgramming Java Concept of Event Handling
Programming Java Concept of Event HandlingJadavsejal
 
Programming Java GUI using SWING, Event Handling
Programming Java GUI using SWING, Event HandlingProgramming Java GUI using SWING, Event Handling
Programming Java GUI using SWING, Event HandlingJadavsejal
 
concept of applet and concept of Layout Managers
concept of applet and concept of Layout Managersconcept of applet and concept of Layout Managers
concept of applet and concept of Layout ManagersJadavsejal
 
C++ unit-2-part-3
C++ unit-2-part-3C++ unit-2-part-3
C++ unit-2-part-3Jadavsejal
 
C++ unit-2-part-2
C++ unit-2-part-2C++ unit-2-part-2
C++ unit-2-part-2Jadavsejal
 
C++ unit-2-part-1
C++ unit-2-part-1C++ unit-2-part-1
C++ unit-2-part-1Jadavsejal
 
C++ unit-1-part-15
C++ unit-1-part-15C++ unit-1-part-15
C++ unit-1-part-15Jadavsejal
 
C++ unit-1-part-14
C++ unit-1-part-14C++ unit-1-part-14
C++ unit-1-part-14Jadavsejal
 
C++ unit-1-part-13
C++ unit-1-part-13C++ unit-1-part-13
C++ unit-1-part-13Jadavsejal
 
C++ unit-1-part-12
C++ unit-1-part-12C++ unit-1-part-12
C++ unit-1-part-12Jadavsejal
 
C++ unit-1-part-11
C++ unit-1-part-11C++ unit-1-part-11
C++ unit-1-part-11Jadavsejal
 
C++ unit-1-part-10
C++ unit-1-part-10C++ unit-1-part-10
C++ unit-1-part-10Jadavsejal
 
C++ unit-1-part-9
C++ unit-1-part-9C++ unit-1-part-9
C++ unit-1-part-9Jadavsejal
 
C++ unit-1-part-8
C++ unit-1-part-8C++ unit-1-part-8
C++ unit-1-part-8Jadavsejal
 
C++ unit-1-part-7
C++ unit-1-part-7C++ unit-1-part-7
C++ unit-1-part-7Jadavsejal
 
C++ unit-1-part-6
C++ unit-1-part-6C++ unit-1-part-6
C++ unit-1-part-6Jadavsejal
 
C++ unit-1-part-5
C++ unit-1-part-5C++ unit-1-part-5
C++ unit-1-part-5Jadavsejal
 
C++ unit-1-part-4
C++ unit-1-part-4C++ unit-1-part-4
C++ unit-1-part-4Jadavsejal
 
C++ unit-1-part-2
C++ unit-1-part-2C++ unit-1-part-2
C++ unit-1-part-2Jadavsejal
 

More from Jadavsejal (20)

Programming with Java Concept: Java TimeZone Class
Programming with Java Concept: Java TimeZone ClassProgramming with Java Concept: Java TimeZone Class
Programming with Java Concept: Java TimeZone Class
 
Programming Java Concept of Event Handling
Programming Java Concept of Event HandlingProgramming Java Concept of Event Handling
Programming Java Concept of Event Handling
 
Programming Java GUI using SWING, Event Handling
Programming Java GUI using SWING, Event HandlingProgramming Java GUI using SWING, Event Handling
Programming Java GUI using SWING, Event Handling
 
concept of applet and concept of Layout Managers
concept of applet and concept of Layout Managersconcept of applet and concept of Layout Managers
concept of applet and concept of Layout Managers
 
C++ unit-2-part-3
C++ unit-2-part-3C++ unit-2-part-3
C++ unit-2-part-3
 
C++ unit-2-part-2
C++ unit-2-part-2C++ unit-2-part-2
C++ unit-2-part-2
 
C++ unit-2-part-1
C++ unit-2-part-1C++ unit-2-part-1
C++ unit-2-part-1
 
C++ unit-1-part-15
C++ unit-1-part-15C++ unit-1-part-15
C++ unit-1-part-15
 
C++ unit-1-part-14
C++ unit-1-part-14C++ unit-1-part-14
C++ unit-1-part-14
 
C++ unit-1-part-13
C++ unit-1-part-13C++ unit-1-part-13
C++ unit-1-part-13
 
C++ unit-1-part-12
C++ unit-1-part-12C++ unit-1-part-12
C++ unit-1-part-12
 
C++ unit-1-part-11
C++ unit-1-part-11C++ unit-1-part-11
C++ unit-1-part-11
 
C++ unit-1-part-10
C++ unit-1-part-10C++ unit-1-part-10
C++ unit-1-part-10
 
C++ unit-1-part-9
C++ unit-1-part-9C++ unit-1-part-9
C++ unit-1-part-9
 
C++ unit-1-part-8
C++ unit-1-part-8C++ unit-1-part-8
C++ unit-1-part-8
 
C++ unit-1-part-7
C++ unit-1-part-7C++ unit-1-part-7
C++ unit-1-part-7
 
C++ unit-1-part-6
C++ unit-1-part-6C++ unit-1-part-6
C++ unit-1-part-6
 
C++ unit-1-part-5
C++ unit-1-part-5C++ unit-1-part-5
C++ unit-1-part-5
 
C++ unit-1-part-4
C++ unit-1-part-4C++ unit-1-part-4
C++ unit-1-part-4
 
C++ unit-1-part-2
C++ unit-1-part-2C++ unit-1-part-2
C++ unit-1-part-2
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

04 authentication

  • 1. Name of Security Methods Assi. Prof. Sejal Jadav
  • 2. Q: Give the Name of Security Methods . ● There are mainly three security methods . 1) Encryption 2) cryptography 3) Authentication. 2
  • 3. Q: Explain Encryption. ● Encryption is the conversion of electronic data into another form, called cipher text, which cannot be easily understood by anyone except authorized parties. 3
  • 4. ● The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. 4
  • 5. ● Plain Text: Information in its own form. ● Cipher Text: Information in converted form. ● Key: This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. 5
  • 6. ● Types of encryption: 1) Symmetric key encryption 2) Asymmetric key encryption: 6
  • 7. 1) Symmetric key encryption ● In symmetric-key schemes, the encryption and decryption keys are the same. ● Thus communicating parties must have the same key before they can achieve secret communication. ● Here strength of the key is largely depending on the size of the key and keeping secret. ● It is a fast technique. 7
  • 8. ● Here the main weakness of the system is that the key is shared. ● Also called private key encryption. ● There are many symmetric key encryption algorithms are used. 8
  • 9. a)Data Encryption Standard(DES): ● Developed in the early 1970s at IBM by James Bamford. ● it is oldest and most widely used algorithms. ● Here the key is 64 bit long. ● This algorithm is widely used in ATM or Credit card 9
  • 10. b)International Data Encryption Standard(IDES): ● Developed by Swiss Federal institute in the early 1990s. ● Here key is 128 bits long. 10
  • 11. c)CAST: ● CAST is a popular. ● key sizes up to 128 bits. ● The name CAST stands for Carlisle Adams and Stafford Tavares, the inventors of CAST. 11
  • 12. d) Rivest Cipher #4(RC4): ● Developed by Ron Rivest . ● Here key is 128 bits long but in latest version key is 40 bits long. ● Used in Netscape navigator and internet explorer. 12
  • 13. ● 2) Asymmetric key encryption: ● In asymmetric-key schemes, the encryption and decryption keys are the different. ● Thus communicating parties must have the different key before they can achieve secret communication. ● It is a slow technique. ● Also called public key encryption. 13
  • 14. ● In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. ● However, only the receiving party has access to the decryption key that enables messages to be read. 14
  • 15. Q- Explain Authentication. ● The process of identifying an individual, usually based on a username and password. ● In security systems, authentication is distinct(separate) from authorization , which is the process of giving individuals access to system objects based on their identity. 15
  • 16. 16
  • 17. ● Authentication merely(only) ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. 17
  • 18. ● Authentication is any process by which a system verifies the identity of a User who wishes to access it. ● Authentication is essential to effective Security. 18
  • 19. Authentication factors & Identity: ● The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: 1. something you know, 2. Something you have, or 3. something you are. 19
  • 20. ● Each Authentication factor covers a range of elements used to authenticate or verify a person's identity prior(before) to being granted access, approving a transaction request, granting authority to others, and establishing a chain of authority. 20
  • 21. ● The three factors (classes) and some of elements of each factor are: The Ownership factors: ● Something the user has (e.g., wrist band, ID card, security token, software token, phone, or cell phone) The Knowledge factors: ● Something the user knows (e.g., a password, pass phrase, or personal identification number (PIN)) The Inherence factors: ● Something the user is or does (e.g., fingerprint, signature, face, voice, unique bio- electric signals, or other biometric identifier). 21
  • 23. To setup the internet user must implement following steps: ● Step 1: Connect the necessary hardware and run any software included plug in and hook up the modem according to the direction given. ● Step 2: Make the preliminary connection, your modem must start broadcasting and be connected before it can technically go online. Connect via a wireless connection or an Ethernets cable. 23
  • 24. ● Step 3: Go to the routers default IP address. Look in the manual or on the modem itself for the default IP address associated with model of modem. ● Step 4: Set up the internet connection. Your internet service provider should have give the basic information how to establish the connections. ● Step 5: Save your setting 24
  • 26. Q: Explain Cryptography ● Cryptography is a method of storing and transmitting data in a particular form. ● Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. 26
  • 27. ● However, in today's computer-centric world, cryptography is most often associated with plaintext (ordinary text, sometimes referred to as clear text) into cipher-text (a process called encryption), then back again (known as decryption). 27
  • 28. ● Plain Text: Information in its own form. ● Cipher Text: Information in converted form. ● Key: This is a secret parameter. 28
  • 29. Types of Cryptography: 1) Symmetric-key cryptography: 29
  • 30. ● Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. 30
  • 31. ● Symmetric-key cryptography is sometimes called secret-key cryptography. ● It refers to the encryption methods in which both sender & receiver share the same key. ● Other terms for symmetric-key encryption are secret- key, single-key, shared-key, one-key encryption. 31
  • 32. ● It is the oldest and best-known technique. ● A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. 32
  • 33. ● This might be as simple as shifting each letter by a number of places in the alphabet. ● As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. 33
  • 34. 2)Asymmetric cryptography: ● Also known as public-key cryptography, uses two different but mathematically linked keys, one public and one private. ● The public key can be shared with everyone, whereas the private key must be kept secret. 34
  • 35. 35
  • 36. ● The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. ● Anyone who knows the secret key can decrypt the message. 36
  • 37. ● One answer is asymmetric encryption, in which there are two related keys--a key pair. ● A public key is made freely available to anyone who might want to send you a message. ● A second, private key is kept secret, so that only you know it. 37
  • 38. ● Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. ● Any message that is encrypted by using the private key can only be decrypted by using the matching public key. 38
  • 39. ● This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). ● A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message. 39