SlideShare a Scribd company logo
1 of 24
IT306.01: CRYPTOGRAPHYAND NETWORK SECURITY
Teaching Scheme Theory Practical Total Credit
Hours/week 3 2 5
4
Marks 100 50 150
Sr
No
.
Title of the unit Minimum number
of hours
1. Conventional Encryption 04
2. Block Cipher 12
3. Public Key Cryptography 07
4. Number Theory 04
5. Message Authentication and Hash Function 06
6. Network Security 04
7. IP Security and E-mail Security 04
8. Web Security 04
Text Books:
Behrouz A. Forouzan, Cryptography and Network Security, McGraw-Hill Companies
Reference Books:
William Stallings, Cryptography And Network Principles And Practice, Prentice Hall, Pearson Education Asia
Modules :-
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Introduction
Neha Patel
Assistant Professor,
Department of I.T,
CSPIT-Changa.
CSPIT-Department Of Information Technology Prepared By: Neha Patel
CSPIT-Department Of Information Technology Prepared By: Neha Patel
โ€ข The advancement of technology has made man dependent on Internet for all
his needs.
โ€ข Internet has given man easy access to everything while sitting at one place.
Social networking, online shopping, storing data, gaming, online studying,
online jobs, every possible thing that man can think of can be done through
the medium of internet.
โ€ข Internet is used in almost every sphere.
โ€ข With the development of the internet and its related benefits also developed
the concept of cyber crimes.
โ€ข Cyber crimes are committed in different forms. A few years back, there was
lack of awareness about the crimes that could be committed through internet.
Why Need to Study this Subject?
Cyber Attacks
โ€ข Phishing fraud :Escorts MD Nikhil Nanda, son-in-law of Amitabh Bachchan, was cheated into submitting
his email ID, password and date of birth to a fake Microsoft account on July 21-13. The scamsters hacked
two email accounts and his social network profile, and sought money from his contacts by impersonating
him.
โ€ข Sony Cyber Attack One of Worst in Corporate History. Wiper-Malware attack. Nov-14
โ€“ Thousands of files, seized by hackers last week, have been leaked online including personal details of
around 6,000 Sony employees, upcoming Sony feature films and the salary details of top executives.
โ€ข Xbox Live is Struggling Due to a Lizard Squad DDoS Attack .Dec-14
โ€“ This DDoS has resulted in many users being unable to connect to the service, making online play next
to impossible, in addition to impacting update and game downloads.
โ€ข Huawei hacked Indiaโ€™s Biggest telecommunication Network โ€˜BSNLโ€™ โ€“Feb -14
โ€ข Sony Xperia Smartphones have default installed Spyware, Sending data to China โ€“oct-14
โ€ข One in Six Smartphone Users Victim of Cyber Attack: Study The Indian News Express.
โ€ข Report by Arbor Networks reveals that India has seen a significant increase in attacks against financial
and government organizations, with 34 percent and 43 percent reporting cyber threats and attacks
respectively, up from last yearโ€™s 15 percent and 19 percent respectively
๏‚ง Indian News Express
๏‚ง news.google.co.in
CSPIT-Department Of Information Technology Prepared By: Neha Patel
The Internet landscape has been
transformed into a binary battlefield.
Who needs a gun when you have a
keyboard?
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Tutorial#1
โ€ข For the two entities A and B to communicate with each other semantically correctly,
โ€ข Identify what are the properties desired in the protocol that facilitates the
communication ?
โ€ข What additional properties are required in presence of an adversary ?
A B
Adversary
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Security Goals(CIA)
โ€ข Confidentiality :-
โ€“ The protection of data from unauthorized disclosure.
โ€ข Integrity:-
โ€“ The assurance that data received are exactly as sent by an authorized entity
(i.e., contain no modification, insertion, deletion or replay).
โ€ข Availability
โ€“ The information created and stored by an organization needs to be available
to authorized entities
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Attacks
โ€ข Security attack: Any action that compromises the security Goals.
โ€ข The three goals of security confidentiality, integrity, and availability can be
threatened by security attacks.
โ€ข Attacks Threatening Confidentiality:-
CSPIT-Department Of Information Technology Prepared By: Neha Patel
A B
C
Attacks Threatening Confidentiality:-
โ€ข Snooping - unauthorized access to or interception of data.
o For example, if you login to a website that uses no encryption, your username and password can
be sniffed off the network by someone who can capture the network traffic between you and the
web site.
โ€ข Traffic Analysis- monitoring online traffic.
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Attacks Threatening Integrity.
โ€ข Modification means that the attacker intercepts the message and changes it.
โ€ข An example is the man-in-the-middle attack, in which an intruder reads messages from the
sender and sends (possibly modified) versions to the recipient,
โ€ข Masquerading or spoofing happens when the attacker impersonates somebody
else.
โ€ข Replaying means the attacker obtains a copy of a message sent by a user and later
tries to replay it.
โ€ข Repudiation means that sender of the message might later deny that she has sent
the message; the receiver of the message might later deny that he has received the
message
A B
C
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Attacks Threatening Availability
โ€ข Attacks Denial of service (DoS) is a very common attack. It may slow down or
totally interrupt the service of a system
A B
C
CSPIT-Department Of Information Technology Prepared By: Neha Patel
โ€ข Passive attack: The goal of the opponent is to obtain information that is being
transmitted.
โ€ข Active attack :Involve some modification of the data stream or the creation of a
false stream
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Passive versus Active Attacks [Forouzan]
Cryptanalysis
objective to recover key not just message
โ€ข general approaches:
โ€“ cryptanalytic attack
โ€“ brute-force attack
โ€ข if either succeed all key use compromised
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Kerckhoffโ€™s Principle [Forouzan]
Based on Kerckhoffโ€™s principle, one should always assume that
the adversary, Eve, knows the encryption/decryption algorithm.
The resistance of the cipher to attack must be based only on the
secrecy of the key.
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Cryptanalytic Attacks
๏ƒ˜ ciphertext only
๏‚ง only know algorithm & ciphertext, is statistical, know or can identify
plaintext
๏ƒ˜ known plaintext
๏‚ง know/suspect plaintext & ciphertext
๏ƒ˜ chosen plaintext
๏‚ง select plaintext and obtain ciphertext
๏ƒ˜ chosen ciphertext
๏‚ง select ciphertext and obtain plaintext
Brute-force attack
โ€ข The attacker tries every possible key on a piece of
ciphper text until an intelligent translation into
plaintext is obtained. On average half of all possible
keys must be tried
CSPIT-Department Of Information Technology Prepared By: Neha Patel
The OSI Security Architecture [William Stalling]
โ€ข ITU-T provides some security services and some mechanisms to achieve security
goals services. Security services and mechanisms are closely related because a
mechanism or combination of mechanisms are used to provide a service..
โ€ข Security service: A processing or communication service that enhances the security
of the data processing systems and the information transfers of an organization.
โ€ข Security mechanism: A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack.
โ€“ Methods or techniques to achieve security services.
Note : For detail study refer Textbook and Reference book
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Security Services [Forouzan]
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Security mechanisms[Forouzan]
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Relation between Services and
Mechanisms[William Stalling]
CSPIT-Department Of Information Technology Prepared By: Neha Patel
About Subject
โ€ข In this subject you will learn different security
mechanism/techniques to achieve security goals and services.
โ€ข There are many cryptanalytic techniques.
CSPIT-Department Of Information Technology Prepared By: Neha Patel
1.22
Encipher Techniques
โ€ข The actual implementation of security goals needs some techniques. Two
techniques are prevalent today: cryptography and steganography.
โ€ข Cryptography :
o Cryptography, a word with Greek origins, means โ€œsecret writing.โ€ However,
we use the term to refer to the science and art of transforming messages to
make them secure and immune to attacks.
โ€ข Steganography
o The word steganography, with origin in Greek, means โ€œcovered/Hide
writing,โ€ in contrast with cryptography, which means โ€œsecret writing.โ€
CSPIT-Department Of Information Technology Prepared By: Neha Patel
Cryptography Characteristics
โ€ข can characterize cryptographic system by:
โ€“ type of encryption operations used
โ€ข substitution
โ€ข transposition
โ€ข product
โ€“ number of keys used
โ€ข single-key or private
โ€ข two-key or public
โ€“ way in which plaintext is processed
โ€ข block
โ€ข stream
CSPIT-Department Of Information Technology Prepared By: Neha Patel
THE REST OF THE BOOK
The rest of this book is divided into four parts.
Part One: Symmetric-Key Enciphermen
Part Two: Asymmetric-Key Encipherment
Part Three: Integrity, Authentication, and Key Management
Part Four: Network Security
CSPIT-Department Of Information Technology Prepared By: Neha Patel

More Related Content

What's hot

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
ย 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
ย 
Hash function
Hash function Hash function
Hash function Salman Memon
ย 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
ย 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
ย 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
ย 
Kerberos
KerberosKerberos
KerberosSutanu Paul
ย 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
ย 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
ย 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptkusum sharma
ย 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownInformation Security Awareness Group
ย 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
ย 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
ย 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
ย 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Securityvishnukp34
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
ย 

What's hot (20)

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
ย 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
ย 
Hash function
Hash function Hash function
Hash function
ย 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
ย 
Message authentication
Message authenticationMessage authentication
Message authentication
ย 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
ย 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
ย 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
ย 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
ย 
Kerberos
KerberosKerberos
Kerberos
ย 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
ย 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
ย 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
ย 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
ย 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
ย 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
ย 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
ย 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
ย 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
ย 

Similar to Introduction of cryptography and network security

Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
ย 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
ย 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
ย 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
ย 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
ย 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
ย 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
ย 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
ย 
CP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and CybercrimeCP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and CybercrimeLeonardo
ย 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
ย 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
ย 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
ย 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
ย 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
ย 

Similar to Introduction of cryptography and network security (20)

Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
ย 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
ย 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
ย 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
ย 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
ย 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
ย 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
ย 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
ย 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
ย 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
ย 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ย 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
ย 
CP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and CybercrimeCP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and Cybercrime
ย 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
ย 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
ย 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
ย 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ย 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
ย 

Recently uploaded

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
ย 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
ย 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 

Recently uploaded (20)

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
ย 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 

Introduction of cryptography and network security

  • 1. IT306.01: CRYPTOGRAPHYAND NETWORK SECURITY Teaching Scheme Theory Practical Total Credit Hours/week 3 2 5 4 Marks 100 50 150 Sr No . Title of the unit Minimum number of hours 1. Conventional Encryption 04 2. Block Cipher 12 3. Public Key Cryptography 07 4. Number Theory 04 5. Message Authentication and Hash Function 06 6. Network Security 04 7. IP Security and E-mail Security 04 8. Web Security 04 Text Books: Behrouz A. Forouzan, Cryptography and Network Security, McGraw-Hill Companies Reference Books: William Stallings, Cryptography And Network Principles And Practice, Prentice Hall, Pearson Education Asia Modules :- CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 2. Introduction Neha Patel Assistant Professor, Department of I.T, CSPIT-Changa. CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 3. CSPIT-Department Of Information Technology Prepared By: Neha Patel โ€ข The advancement of technology has made man dependent on Internet for all his needs. โ€ข Internet has given man easy access to everything while sitting at one place. Social networking, online shopping, storing data, gaming, online studying, online jobs, every possible thing that man can think of can be done through the medium of internet. โ€ข Internet is used in almost every sphere. โ€ข With the development of the internet and its related benefits also developed the concept of cyber crimes. โ€ข Cyber crimes are committed in different forms. A few years back, there was lack of awareness about the crimes that could be committed through internet. Why Need to Study this Subject?
  • 4. Cyber Attacks โ€ข Phishing fraud :Escorts MD Nikhil Nanda, son-in-law of Amitabh Bachchan, was cheated into submitting his email ID, password and date of birth to a fake Microsoft account on July 21-13. The scamsters hacked two email accounts and his social network profile, and sought money from his contacts by impersonating him. โ€ข Sony Cyber Attack One of Worst in Corporate History. Wiper-Malware attack. Nov-14 โ€“ Thousands of files, seized by hackers last week, have been leaked online including personal details of around 6,000 Sony employees, upcoming Sony feature films and the salary details of top executives. โ€ข Xbox Live is Struggling Due to a Lizard Squad DDoS Attack .Dec-14 โ€“ This DDoS has resulted in many users being unable to connect to the service, making online play next to impossible, in addition to impacting update and game downloads. โ€ข Huawei hacked Indiaโ€™s Biggest telecommunication Network โ€˜BSNLโ€™ โ€“Feb -14 โ€ข Sony Xperia Smartphones have default installed Spyware, Sending data to China โ€“oct-14 โ€ข One in Six Smartphone Users Victim of Cyber Attack: Study The Indian News Express. โ€ข Report by Arbor Networks reveals that India has seen a significant increase in attacks against financial and government organizations, with 34 percent and 43 percent reporting cyber threats and attacks respectively, up from last yearโ€™s 15 percent and 19 percent respectively ๏‚ง Indian News Express ๏‚ง news.google.co.in CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 5. The Internet landscape has been transformed into a binary battlefield. Who needs a gun when you have a keyboard? CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 6. Tutorial#1 โ€ข For the two entities A and B to communicate with each other semantically correctly, โ€ข Identify what are the properties desired in the protocol that facilitates the communication ? โ€ข What additional properties are required in presence of an adversary ? A B Adversary CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 7. Security Goals(CIA) โ€ข Confidentiality :- โ€“ The protection of data from unauthorized disclosure. โ€ข Integrity:- โ€“ The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion or replay). โ€ข Availability โ€“ The information created and stored by an organization needs to be available to authorized entities CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 8. Attacks โ€ข Security attack: Any action that compromises the security Goals. โ€ข The three goals of security confidentiality, integrity, and availability can be threatened by security attacks. โ€ข Attacks Threatening Confidentiality:- CSPIT-Department Of Information Technology Prepared By: Neha Patel A B C
  • 9. Attacks Threatening Confidentiality:- โ€ข Snooping - unauthorized access to or interception of data. o For example, if you login to a website that uses no encryption, your username and password can be sniffed off the network by someone who can capture the network traffic between you and the web site. โ€ข Traffic Analysis- monitoring online traffic. CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 10. Attacks Threatening Integrity. โ€ข Modification means that the attacker intercepts the message and changes it. โ€ข An example is the man-in-the-middle attack, in which an intruder reads messages from the sender and sends (possibly modified) versions to the recipient, โ€ข Masquerading or spoofing happens when the attacker impersonates somebody else. โ€ข Replaying means the attacker obtains a copy of a message sent by a user and later tries to replay it. โ€ข Repudiation means that sender of the message might later deny that she has sent the message; the receiver of the message might later deny that he has received the message A B C CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 11. Attacks Threatening Availability โ€ข Attacks Denial of service (DoS) is a very common attack. It may slow down or totally interrupt the service of a system A B C CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 12. โ€ข Passive attack: The goal of the opponent is to obtain information that is being transmitted. โ€ข Active attack :Involve some modification of the data stream or the creation of a false stream CSPIT-Department Of Information Technology Prepared By: Neha Patel Passive versus Active Attacks [Forouzan]
  • 13. Cryptanalysis objective to recover key not just message โ€ข general approaches: โ€“ cryptanalytic attack โ€“ brute-force attack โ€ข if either succeed all key use compromised CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 14. Kerckhoffโ€™s Principle [Forouzan] Based on Kerckhoffโ€™s principle, one should always assume that the adversary, Eve, knows the encryption/decryption algorithm. The resistance of the cipher to attack must be based only on the secrecy of the key. CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 15. Cryptanalytic Attacks ๏ƒ˜ ciphertext only ๏‚ง only know algorithm & ciphertext, is statistical, know or can identify plaintext ๏ƒ˜ known plaintext ๏‚ง know/suspect plaintext & ciphertext ๏ƒ˜ chosen plaintext ๏‚ง select plaintext and obtain ciphertext ๏ƒ˜ chosen ciphertext ๏‚ง select ciphertext and obtain plaintext
  • 16. Brute-force attack โ€ข The attacker tries every possible key on a piece of ciphper text until an intelligent translation into plaintext is obtained. On average half of all possible keys must be tried CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 17. The OSI Security Architecture [William Stalling] โ€ข ITU-T provides some security services and some mechanisms to achieve security goals services. Security services and mechanisms are closely related because a mechanism or combination of mechanisms are used to provide a service.. โ€ข Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. โ€ข Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack. โ€“ Methods or techniques to achieve security services. Note : For detail study refer Textbook and Reference book CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 18. Security Services [Forouzan] CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 19. Security mechanisms[Forouzan] CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 20. Relation between Services and Mechanisms[William Stalling] CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 21. About Subject โ€ข In this subject you will learn different security mechanism/techniques to achieve security goals and services. โ€ข There are many cryptanalytic techniques. CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 22. 1.22 Encipher Techniques โ€ข The actual implementation of security goals needs some techniques. Two techniques are prevalent today: cryptography and steganography. โ€ข Cryptography : o Cryptography, a word with Greek origins, means โ€œsecret writing.โ€ However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. โ€ข Steganography o The word steganography, with origin in Greek, means โ€œcovered/Hide writing,โ€ in contrast with cryptography, which means โ€œsecret writing.โ€ CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 23. Cryptography Characteristics โ€ข can characterize cryptographic system by: โ€“ type of encryption operations used โ€ข substitution โ€ข transposition โ€ข product โ€“ number of keys used โ€ข single-key or private โ€ข two-key or public โ€“ way in which plaintext is processed โ€ข block โ€ข stream CSPIT-Department Of Information Technology Prepared By: Neha Patel
  • 24. THE REST OF THE BOOK The rest of this book is divided into four parts. Part One: Symmetric-Key Enciphermen Part Two: Asymmetric-Key Encipherment Part Three: Integrity, Authentication, and Key Management Part Four: Network Security CSPIT-Department Of Information Technology Prepared By: Neha Patel