SlideShare a Scribd company logo
1 of 28
SRINIVASA INSTITUITE OF
TECHNOLOGY & SCIENCE
CRYPTOGRAPHY & NETWORK
SECURITY
Presented By
S.Sunanda
Contents
•Cryptography
Techniques
Encryption & Decryption
Categories Of Cryptography
Traditional ciphers
RSA algorithm
Applications
Contd…..
• Network Security
What is Network?
 About Network Security
Security Goals
Objective Of Security
Data Security
Problems & Attacks
Threats
Conclusion
CRYPTOGRAPHY
 It is derived from the Greek word that meant for secret
writing.
 Cryptography is a Software or hardware programs use
Mathematical Functions , Formulas(Algorithms) to
change text from one from to another.
 Cryptography is the science and art of transforming
messages to make them secure and immune to attacks.
 It provides Confidentiality, Integrity, Accuracy.
 Applications of cryptography includes ATM cards,
Computer passwords .
 It’s very useful to our Army & Police network to transfer
confidential data
TECHNIQUES
 The data is transferred by applying two
techniques
1. Encryption
2. Decryption
Encryption: The way of converting the plain text
to the Cipher text by the means of few keys is
called as the” Encryption”.
Decryption: The way of converting the Cipher text
to the Plain text by the use of keys that are
suitable to it is called as ”Decryption”.
Encryption & Decryption
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
 The implementation of a simple
cryptography using single key is done by
the Secret-key algorithms.
 Also known as SECRET KEY
CRYPTOGRAPHY. Sender & Receiver
uses same key and an Encryption/
Decryption Algorithm to Encrypt /
Decrypt data.( i.e ) The Key is shared
This can be done by p-box, s-box and
product cipher
SYMMETRIC KEY CRYPTOGRAPHY
SUBSTITUTION CIPHER
 Replacing of each letter
or group of letter or group of letters of
plain text into cipher text
by another letter is called
as “Substitution cipher”.
The substitution may be:
Monalphabetic Substitution
Polyalphabetic Substitution
TRANSPOSITION CIPHER
 The change offered in
The position of the text
i.e. By jumbling the
Words is called as
” Transposition Cipher”.
And the technique used
here is termed as ”Mass
Technique”.
ASYMMETRIC KEY CRYPTOGRAPHY
 Also known as PUBLIC KEY
CRYPTOGRAPHY . Sender & Receiver uses
different keys for Encryption & Decryption
namely PUBLIC & PRIVATE respectively.
RSA ALGORITHM
RSA is derived from the names of the
discoverers named Rivest, Shamir, Adleman.
The RSA algorithm is one of the widely used in
the key algorithms.
1. The main function of this algorithm is providing
approach to public key cryptography &
Encryption
2. In this the CIPHER TEXT are the integer’s
between 0 and n-1
APPLICATIONS
• Defense Services
• Secure Data Manipulation
• E- Commerce
• Business Transactions
• Internet Payment Systems
• User Identification Systems
• Access Control
• Data Security
WHAT IS NETWORK ?
 A network is an interconnection
 or a media between two or
more systems to share
information among them.
 The various threats caused to
network are:
* Remote login
* Operating System Bugs
*Spams & viruses etc.
NETWORK SECURITY
• The security provided to the
network is called network
security which at present is
looming on horizon as a
massive problem.
• There are two kinds of Network Security mainly
as:
Transit security : It just encrypts the packets to
be transferred
Traffic Security: It acts just as a screen between
hosts & remote sites
SECURITY GOALS
OBJECTIVE OF SECURITY
To avoid data threats
To avoid denial of services
To secure our data from masquerades
 To safeguard our data’s from traffic
analyzer
To not to make message for the third
person available
PASSWORD AUDITING
 Should not be in uppercase
 Must have at least 8 characters
 Must include alphabets, numeric keys & special
characters
 Password should not be the name of the user,
dictionary word etc.,
 It must be updated at least once a month
DATA SECURITY
• To monitor the user’s
ACCESS CONTROLS
• System that are connected in network
must be protected with firewalls
• To protect the integrity & availability of
the institution’s information asset’s
PROBLEMS & ATTACKS
There are few intertwined areas in network
security as:
 Secrecy
 Authentication
 Non-Repudiation
 Integrity control etc.
The threats are classified into two categories:
Passive Attacks: A passive attack is one in
which the attacker eavesdrops and listens to the
message but can’t modify the message.
• Active Attacks: An active attack is one in
which the attacker modifies, deletes,
replay or introduce new messages into the
stream of message.
THREATS
CONCLUSION
 However, through this Cryptography &
Network Security We Successfully
hiding and secure the data with the help
of Encryption & Decryption.
“ For every lock there is a key…..
It is better to keep safe your lock than
the key”
ANY QUIERIES????????

More Related Content

What's hot

basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryptionRashmi Burugupalli
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and AttacksShahbaz Anjam
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 

What's hot (20)

basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Ppt cns
Ppt cnsPpt cns
Ppt cns
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Sunanda cryptography ppt

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptxBisharSuleiman
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationRuchika Sinha
 

Similar to Sunanda cryptography ppt (20)

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Sunanda cryptography ppt

  • 3. Contents •Cryptography Techniques Encryption & Decryption Categories Of Cryptography Traditional ciphers RSA algorithm Applications
  • 4. Contd….. • Network Security What is Network?  About Network Security Security Goals Objective Of Security Data Security Problems & Attacks Threats Conclusion
  • 5. CRYPTOGRAPHY  It is derived from the Greek word that meant for secret writing.  Cryptography is a Software or hardware programs use Mathematical Functions , Formulas(Algorithms) to change text from one from to another.  Cryptography is the science and art of transforming messages to make them secure and immune to attacks.  It provides Confidentiality, Integrity, Accuracy.  Applications of cryptography includes ATM cards, Computer passwords .  It’s very useful to our Army & Police network to transfer confidential data
  • 6. TECHNIQUES  The data is transferred by applying two techniques 1. Encryption 2. Decryption Encryption: The way of converting the plain text to the Cipher text by the means of few keys is called as the” Encryption”. Decryption: The way of converting the Cipher text to the Plain text by the use of keys that are suitable to it is called as ”Decryption”.
  • 9. SYMMETRIC KEY CRYPTOGRAPHY  The implementation of a simple cryptography using single key is done by the Secret-key algorithms.  Also known as SECRET KEY CRYPTOGRAPHY. Sender & Receiver uses same key and an Encryption/ Decryption Algorithm to Encrypt / Decrypt data.( i.e ) The Key is shared This can be done by p-box, s-box and product cipher
  • 11.
  • 12. SUBSTITUTION CIPHER  Replacing of each letter or group of letter or group of letters of plain text into cipher text by another letter is called as “Substitution cipher”. The substitution may be: Monalphabetic Substitution Polyalphabetic Substitution
  • 13. TRANSPOSITION CIPHER  The change offered in The position of the text i.e. By jumbling the Words is called as ” Transposition Cipher”. And the technique used here is termed as ”Mass Technique”.
  • 14. ASYMMETRIC KEY CRYPTOGRAPHY  Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & Receiver uses different keys for Encryption & Decryption namely PUBLIC & PRIVATE respectively.
  • 15. RSA ALGORITHM RSA is derived from the names of the discoverers named Rivest, Shamir, Adleman. The RSA algorithm is one of the widely used in the key algorithms. 1. The main function of this algorithm is providing approach to public key cryptography & Encryption 2. In this the CIPHER TEXT are the integer’s between 0 and n-1
  • 16.
  • 17. APPLICATIONS • Defense Services • Secure Data Manipulation • E- Commerce • Business Transactions • Internet Payment Systems • User Identification Systems • Access Control • Data Security
  • 18. WHAT IS NETWORK ?  A network is an interconnection  or a media between two or more systems to share information among them.  The various threats caused to network are: * Remote login * Operating System Bugs *Spams & viruses etc.
  • 19. NETWORK SECURITY • The security provided to the network is called network security which at present is looming on horizon as a massive problem. • There are two kinds of Network Security mainly as: Transit security : It just encrypts the packets to be transferred Traffic Security: It acts just as a screen between hosts & remote sites
  • 21. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades  To safeguard our data’s from traffic analyzer To not to make message for the third person available
  • 22. PASSWORD AUDITING  Should not be in uppercase  Must have at least 8 characters  Must include alphabets, numeric keys & special characters  Password should not be the name of the user, dictionary word etc.,  It must be updated at least once a month
  • 23. DATA SECURITY • To monitor the user’s ACCESS CONTROLS • System that are connected in network must be protected with firewalls • To protect the integrity & availability of the institution’s information asset’s
  • 24. PROBLEMS & ATTACKS There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity control etc. The threats are classified into two categories: Passive Attacks: A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message.
  • 25. • Active Attacks: An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message. THREATS
  • 26. CONCLUSION  However, through this Cryptography & Network Security We Successfully hiding and secure the data with the help of Encryption & Decryption.
  • 27. “ For every lock there is a key….. It is better to keep safe your lock than the key”