2. Q: Give the Name of Security Methods .
● There are mainly three security methods .
1) Encryption
2) cryptography
3) Authentication.
2
3. Q: Explain Encryption.
● Encryption is the conversion of electronic data into
another form, called cipher text,
which cannot be easily understood by anyone except
authorized parties.
3
4. ● The primary purpose of encryption is to protect the
confidentiality of digital data stored on computer
systems or transmitted via the Internet or other
computer networks.
4
5. ● Plain Text: Information in its own form.
● Cipher Text: Information in converted form.
● Key: This is a secret parameter (ideally known only
to the communicants) for a specific message exchange
context.
5
7. 1) Symmetric key encryption
● In symmetric-key schemes, the encryption and decryption keys are the
same.
● Thus communicating parties must have the same key before they can
achieve secret communication.
● Here strength of the key is largely depending on the size of the key and
keeping secret.
● It is a fast technique.
7
8. ● Here the main weakness of the system is that
the key is shared.
● Also called private key encryption.
● There are many symmetric key encryption
algorithms are used.
8
9. a)Data Encryption Standard(DES):
● Developed in the early 1970s at IBM by James Bamford.
● it is oldest and most widely used algorithms.
● Here the key is 64 bit long.
● This algorithm is widely used in ATM or Credit card
9
10. b)International Data Encryption Standard(IDES):
● Developed by Swiss Federal institute in the early
1990s.
● Here key is 128 bits long.
10
11. c)CAST:
● CAST is a popular.
● key sizes up to 128 bits.
● The name CAST stands for Carlisle Adams and
Stafford Tavares, the inventors of CAST.
11
12. d) Rivest Cipher #4(RC4):
● Developed by Ron Rivest .
● Here key is 128 bits long but in latest version key is
40 bits long.
● Used in Netscape navigator and internet explorer.
12
13. ● 2) Asymmetric key encryption:
● In asymmetric-key schemes, the encryption and decryption keys are the
different.
● Thus communicating parties must have the different key before they can
achieve secret communication.
● It is a slow technique.
● Also called public key encryption.
13
14. ● In public-key encryption schemes, the
encryption key is published for anyone to use
and encrypt messages.
● However, only the receiving party has access to
the decryption key that enables messages to be
read.
14
15. Q- Explain Authentication.
● The process of identifying an individual, usually based
on a username and password.
● In security systems, authentication is
distinct(separate) from authorization , which is the
process of giving individuals access to system objects
based on their identity.
15
17. ● Authentication merely(only) ensures that the
individual is who he or she claims to be, but says
nothing about the access rights of the individual.
17
18. ● Authentication is any process by which a system
verifies the identity of a User who wishes to access it.
● Authentication is essential to effective Security.
18
19. Authentication factors & Identity:
● The ways in which someone may be authenticated fall
into three categories, based on what are known as the
factors of authentication:
1. something you know,
2. Something you have, or
3. something you are.
19
20. ● Each Authentication factor covers a range of elements
used to authenticate
or verify a person's identity prior(before) to being granted
access,
approving a transaction request,
granting authority to others, and establishing a chain of
authority.
20
21. ● The three factors (classes) and some of elements of each factor are:
The Ownership factors:
● Something the user has (e.g., wrist band, ID card, security token, software
token, phone, or cell phone)
The Knowledge factors:
● Something the user knows (e.g., a password, pass phrase, or personal identification
number (PIN))
The Inherence factors:
● Something the user is or does (e.g., fingerprint, signature, face, voice, unique bio-
electric signals, or other biometric identifier).
21
23. To setup the internet user must implement following steps:
● Step 1: Connect the necessary hardware and run any software
included plug in and hook up the modem according to the direction
given.
● Step 2: Make the preliminary connection, your modem must start
broadcasting and be connected before it can technically go online.
Connect via a wireless connection or an Ethernets cable.
23
24. ● Step 3: Go to the routers default IP address. Look in the
manual or on the modem itself for the default IP
address associated with model of modem.
● Step 4: Set up the internet connection. Your internet
service provider should have give the basic information
how to establish the connections.
● Step 5: Save your setting
24
26. Q: Explain Cryptography
● Cryptography is a method of storing and transmitting
data in a particular form.
● Cryptography includes techniques such as microdots,
merging words with images, and other ways to hide
information in storage or transit.
26
27. ● However, in today's computer-centric world,
cryptography is most often associated with plaintext
(ordinary text, sometimes referred to as clear text)
into cipher-text (a process called encryption), then back
again (known as decryption).
27
28. ● Plain Text: Information in its own form.
● Cipher Text: Information in converted form.
● Key: This is a secret parameter.
28
30. ● Symmetric-key systems are simpler
and faster, but their main drawback
is that the two parties must somehow
exchange the key in a secure way.
30
31. ● Symmetric-key cryptography is sometimes called
secret-key cryptography.
● It refers to the encryption methods in which both
sender & receiver share the same key.
● Other terms for symmetric-key encryption are secret-
key, single-key, shared-key, one-key encryption.
31
32. ● It is the oldest and best-known technique.
● A secret key, which can be a number, a word, or
just a string of random letters, is applied to the
text of a message to change the content in a
particular way.
32
33. ● This might be as simple as shifting each letter by a
number of places in the alphabet.
● As long as both sender and recipient know the secret
key, they can encrypt and decrypt all messages that
use this key.
33
34. 2)Asymmetric cryptography:
● Also known as public-key cryptography, uses two
different but mathematically linked keys, one public
and one private.
● The public key can be shared with everyone, whereas
the private key must be kept secret.
34
36. ● The problem with secret keys is exchanging them
over the Internet or a large network while preventing
them from falling into the wrong hands.
● Anyone who knows the secret key can decrypt the
message.
36
37. ● One answer is asymmetric encryption, in which there
are two related keys--a key pair.
● A public key is made freely available to anyone who
might want to send you a message.
● A second, private key is kept secret, so that only you
know it.
37
38. ● Any message (text, binary files, or documents) that are
encrypted by using the public key can only be decrypted
by applying the same algorithm, but by using the
matching private key.
● Any message that is encrypted by using the private key can
only be decrypted by using the matching public key.
38
39. ● This means that you do not have to worry about
passing public keys over the Internet (the keys
are supposed to be public).
● A problem with asymmetric encryption, however,
is that it is slower than symmetric encryption. It
requires far more processing power to both
encrypt and decrypt the content of the message.
39