Network security & cryptography

8,980 views

Published on

Published in: Technology, Education
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
8,980
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
661
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Network security & cryptography

  1. 1. It’s Presentations from Network Security &Cryptography
  2. 2. Friend
  3. 3. Presented & performed by Mr: Rahulprasad yadav Mr: Nakul Naikwade (Information Technology)Network Security & cryptography
  4. 4. Network Security & Cryptography
  5. 5. Synopsis Network security ->Objective of Security ->Password Auditing ->Data Security ->Authentication Cryptography ->Encryption & Decryption ->Public & Private Key Cryptography ->Digital Signatures ->RSA Algorithm Demonstration Conclusion Network Security & Cryptography
  6. 6. ETWORK SECURITY ->a small intro.... ->WHY it is needed? ->WHERE it is needed? ->HOW it is needed? Network Security& Cryptography
  7. 7. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades To safeguard our data’s from traffic analyzer To not to make massage for the third person available Network Security & Cryptography
  8. 8. PASSWORD AUDITING Should not be in uppercase Must have at least 8 characters Must include alphabets, numeric keys & special characters Password should not be the name of the user, dictionary word etc., It must be updated at least once a month Network Security & Cryptography
  9. 9. DATA SECURITY To monitor the user’s ACCESS CONTROLS System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s Network Security & Cryptography
  10. 10. RYTOGRAPHY->a small intro……keywords ->cryptography ->Encryption &Decryption ->Public& Private key cryptography ->Digital signature’s ->RSA Algorithm Network Security & Cryptography
  11. 11. CRYTOGRAPHY Cryptography is science of using mathematics toencrypt decrypt data Cryptography enable you to store sensitiveinformation or transmit it across insecure networks(likeinternet) so that it cannot be read by anyone except theintended recipient It’s very useful to our Army & Police network to transfor confidential data Network Security & Cryptography
  12. 12. ENCRYPTION AND DECRYPTION Encryption is a technique that convert’s the original text into an unreadable text The converted original text is called as Cipher text Decryption technique is used to convert the cipher text into the original text Authentication is the verification process which identifies the password & username Digital signature are signed to make the cipher text into unread- able Network Security &Cryptography
  13. 13. PUBLIC & PRIVATE KEYCRYPTOGRAPHY Public-key cryptography refers to a cryptography systemrequire 2 separate keys, one to lock or encrypt the plaintext& one to unlock or decrypt the cipher text Private-key ,a private or secret key is an encryptiondecryption key known only to the party or parties that exchangesecret massages a problem with PKC is that sender & receiver ofmessage must agree on a common key via alternative securechannel Network Security & Cryptography
  14. 14. RSA ALGORITHEM Published in 1978 by MIT,US (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1C=e M mod n m->message ,e->encryptionM=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime number’s =m e d mod n Network Security & Cryptography
  15. 15. PUBLIC KEY SYSTEM->a Demonstration
  16. 16. CONLUSION This paper describes a technique to successfullyhiding and secure the data or massage with the helpof Encryption or Decryption technique with theCryptography And Network Security.However ,this research work & software packageprovide a good starting point for anyone interested inlearning about Cryptography. Network Security & Cryptography
  17. 17. “for every lock there is a key………It is better to keep safe your lock than the key” “ Network Security & Cryptography
  18. 18. Bibliography References CCNA INTRO-wendell odom NETWORK ESSENTIALS-william stalings Website www.wikipedia.com www.securitymeasure.com Network Security & Cryptography

×