SlideShare a Scribd company logo
1 of 25
Cryptography and authentication
GROUP 5
NAME handling
AMONG TEDDY
MBADHI BARNABAS
cryptography
LOMUDE GODFREY
NABAGESERA NULU
NABATANZI SHARON
authentication
Cryptography
Definition of 'Cryptography'
-the process of converting ordinary plain text into
unintelligible text and vice-versa.
-It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended
can read and process it. Cryptography not only protects
data from theft or alteration, but can also be used for user
authentication.
Modern cryptography concerns with:
• Confidentiality - Information cannot be understood by
anyone
• Integrity - Information cannot be altered.
• Non-repudiation - Sender cannot deny his/her intentions
in the transmission of the information at a later stage
• Authentication - Sender and receiver can confirm each
Three types of cryptographic techniques used in general.
1. Symmetric-key cryptography
- classical cryptography
- transposition chiper
- substitution chiper
- modern crytography
-stream chiper
-block chiper
2. Hash functions.
3. Public-key cryptography
Symmetric-key Cryptography
• Both the sender and receiver share a single key. The
sender uses this key to encrypt plaintext and send the
cipher text to the receiver. On the other side the receiver
applies the same key to decrypt the message and recover
the plain text.
Classfication of symmetric-key cryptography
Classical cyptography
• These inculde;-
- transposition chiper
- substitution chiper
Modern cryptography
modern cyptography
These inculde;-
- stream chiper
-block chiper
Public-Key Cryptography/Asymmetric-key cryptography
-This is the most revolutionary
concept in the last 300-400
years. In Public-Key
Cryptography two related keys
(public and private key) are
used.
-Public key may be freely
distributed, while its paired
private key, remains a secret.
-The public key is used for
encryption and for decryption
private key is used.
Hash Functions
Hash Functions: No key is used in this algorithm. A fixed-length
hash value is computed as per the plain text that makes it
impossible for the contents of the plain text to be recovered.
Hash functions are also used by many operating systems to
encrypt passwords.
-Hash function is an algorithm that can be run on data such as
an individual file or a password to produce a value called a
checksum
-Some commonly used cryptographic hash functions include
MD5 and SHA-1, although many others also exist.
Hash Functions
summary
Definition of 'Authentication'
Definition: Authentication is the
process of recognizing a user’s
identity. It is the mechanism of
associating an incoming request
with a set of identifying
credentials. The credentials
provided are compared to those
on a file in a database of the
authorized user’s information on
a local operating system or
within an authentication server
Authentication in cybersecurity
Authentication is important because it enables
organizations to keep their networks secure by permitting
only authenticated users (or processes) to access its
protected resources, which may include computer systems,
networks, databases, websites and other network-based
applications or services.
How authentication is used
User authentication occurs within most human-to-computer
interactions outside of guest accounts, automatically
logged-in accounts and kiosk computer systems.
Generally, a user has to choose a username or user ID and
provide a valid password to begin using a system. User
authentication authorizes human-to-machine interactions in
operating systems and applications, as well as both wired
and wireless networks to enable access to networked and
internet-connected systems, applications and resources
How authentication works
During authentication, credentials provided by the user are
compared to those on file in a database of authorized users'
information either on the local operating system or through
an authentication server. If the credentials match, and the
authenticated entity is authorized to use the resource, the
process is completed and the user is granted access. The
permissions and folders returned define both the
environment the user sees and the way he can interact with
it, including hours of access and other rights such as the
amount of resource storage space.
Authentication factors
Authenticating a user with a user ID and a password is usually
considered the most basic type of authentication, and it depends on
the user knowing two pieces of information: the user ID or
username, and the password. Since this type of authentication relies
on just one authentication factor, it is a type of single-factor
authentication.
Strong authentication is a term that has not been formally defined,
but usually is used to mean that the type of authentication being
used is more reliable and resistant to attack; achieving that is
generally acknowledged to require using at least two different types
of authentication factors
Currently used authentication factors include:
-Knowledge factor: "Something you know." The
knowledge factor may be any authentication credentials that
consist of information that the user possesses, including a
personal identification number (PIN), a user name, a
password or the answer to a secret question.
.
Possession factor: "Something you have." The
possession factor may be any credential based on items
that the user can own and carry with them, including
hardware devices like a security token or a mobile phone
used to accept a text message or to run an authentication
app that can generate a one-time password or PIN.
Inherence factor: "Something you are." The inherence
factor is typically based on some form of biometric
identification, including finger or thumb prints, facial
recognition, retina scan or any other form of biometric data
from the three above
Location factor: "Where you are." While it may be less
specific, the location factor is sometimes used as an adjunct
to the other factors. Location can be determined to
reasonable accuracy by devices equipped with GPS, or with
less accuracy by checking network routes. The location
factor cannot usually stand on its own for authentication, but
it can supplement the other factors by providing a means of
ruling out some requests. For example, it can prevent an
attacker located in a remote geographical area from posing
as a user who normally logs in only from home or office in
the organization's home country.
Time factor: "When you are authenticating." Like the
location factor, the time factor is not sufficient on its own,
but it can be a supplemental mechanism for weeding out
attackers who attempt to access a resource at a time when
that resource is not available to the authorized user. It may
also be used together with location as well. For example, if
the user was last authenticated at noon in the U.S., an
attempt to authenticate from Asia one hour later would be
rejected based on the combination of time and location.

More Related Content

What's hot (20)

Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Cryptography
CryptographyCryptography
Cryptography
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Hash function
Hash function Hash function
Hash function
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
S/MIME
S/MIMES/MIME
S/MIME
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Ch12
Ch12Ch12
Ch12
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
User authentication
User authenticationUser authentication
User authentication
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 

Similar to Cryptography and authentication

Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization OnMaximaSheffield592
 
Lecture13.ppt
Lecture13.pptLecture13.ppt
Lecture13.pptImXaib
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeSysfore Technologies
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanAsad Zaman
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
Authentication and authorization difference
Authentication and authorization differenceAuthentication and authorization difference
Authentication and authorization differenceSaurabh846965
 
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...Equnix Business Solutions
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 

Similar to Cryptography and authentication (20)

Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Security
SecuritySecurity
Security
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Lecture13.ppt
Lecture13.pptLecture13.ppt
Lecture13.ppt
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
C02
C02C02
C02
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Chapter006
Chapter006Chapter006
Chapter006
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Authentication and authorization difference
Authentication and authorization differenceAuthentication and authorization difference
Authentication and authorization difference
 
Class paper final
Class paper finalClass paper final
Class paper final
 
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...Kebocoran Data_  Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Cryptography and authentication

  • 1. Cryptography and authentication GROUP 5 NAME handling AMONG TEDDY MBADHI BARNABAS cryptography LOMUDE GODFREY NABAGESERA NULU NABATANZI SHARON authentication
  • 2. Cryptography Definition of 'Cryptography' -the process of converting ordinary plain text into unintelligible text and vice-versa. -It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.
  • 3. Modern cryptography concerns with: • Confidentiality - Information cannot be understood by anyone • Integrity - Information cannot be altered. • Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stage • Authentication - Sender and receiver can confirm each
  • 4. Three types of cryptographic techniques used in general. 1. Symmetric-key cryptography - classical cryptography - transposition chiper - substitution chiper - modern crytography -stream chiper -block chiper 2. Hash functions. 3. Public-key cryptography
  • 5. Symmetric-key Cryptography • Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text.
  • 6. Classfication of symmetric-key cryptography Classical cyptography • These inculde;- - transposition chiper - substitution chiper
  • 7.
  • 8.
  • 9. Modern cryptography modern cyptography These inculde;- - stream chiper -block chiper
  • 10.
  • 11.
  • 12. Public-Key Cryptography/Asymmetric-key cryptography -This is the most revolutionary concept in the last 300-400 years. In Public-Key Cryptography two related keys (public and private key) are used. -Public key may be freely distributed, while its paired private key, remains a secret. -The public key is used for encryption and for decryption private key is used.
  • 13. Hash Functions Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per the plain text that makes it impossible for the contents of the plain text to be recovered. Hash functions are also used by many operating systems to encrypt passwords. -Hash function is an algorithm that can be run on data such as an individual file or a password to produce a value called a checksum -Some commonly used cryptographic hash functions include MD5 and SHA-1, although many others also exist.
  • 16. Definition of 'Authentication' Definition: Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a set of identifying credentials. The credentials provided are compared to those on a file in a database of the authorized user’s information on a local operating system or within an authentication server
  • 17. Authentication in cybersecurity Authentication is important because it enables organizations to keep their networks secure by permitting only authenticated users (or processes) to access its protected resources, which may include computer systems, networks, databases, websites and other network-based applications or services.
  • 18. How authentication is used User authentication occurs within most human-to-computer interactions outside of guest accounts, automatically logged-in accounts and kiosk computer systems. Generally, a user has to choose a username or user ID and provide a valid password to begin using a system. User authentication authorizes human-to-machine interactions in operating systems and applications, as well as both wired and wireless networks to enable access to networked and internet-connected systems, applications and resources
  • 19. How authentication works During authentication, credentials provided by the user are compared to those on file in a database of authorized users' information either on the local operating system or through an authentication server. If the credentials match, and the authenticated entity is authorized to use the resource, the process is completed and the user is granted access. The permissions and folders returned define both the environment the user sees and the way he can interact with it, including hours of access and other rights such as the amount of resource storage space.
  • 20. Authentication factors Authenticating a user with a user ID and a password is usually considered the most basic type of authentication, and it depends on the user knowing two pieces of information: the user ID or username, and the password. Since this type of authentication relies on just one authentication factor, it is a type of single-factor authentication. Strong authentication is a term that has not been formally defined, but usually is used to mean that the type of authentication being used is more reliable and resistant to attack; achieving that is generally acknowledged to require using at least two different types of authentication factors
  • 21. Currently used authentication factors include: -Knowledge factor: "Something you know." The knowledge factor may be any authentication credentials that consist of information that the user possesses, including a personal identification number (PIN), a user name, a password or the answer to a secret question. .
  • 22. Possession factor: "Something you have." The possession factor may be any credential based on items that the user can own and carry with them, including hardware devices like a security token or a mobile phone used to accept a text message or to run an authentication app that can generate a one-time password or PIN.
  • 23. Inherence factor: "Something you are." The inherence factor is typically based on some form of biometric identification, including finger or thumb prints, facial recognition, retina scan or any other form of biometric data from the three above
  • 24. Location factor: "Where you are." While it may be less specific, the location factor is sometimes used as an adjunct to the other factors. Location can be determined to reasonable accuracy by devices equipped with GPS, or with less accuracy by checking network routes. The location factor cannot usually stand on its own for authentication, but it can supplement the other factors by providing a means of ruling out some requests. For example, it can prevent an attacker located in a remote geographical area from posing as a user who normally logs in only from home or office in the organization's home country.
  • 25. Time factor: "When you are authenticating." Like the location factor, the time factor is not sufficient on its own, but it can be a supplemental mechanism for weeding out attackers who attempt to access a resource at a time when that resource is not available to the authorized user. It may also be used together with location as well. For example, if the user was last authenticated at noon in the U.S., an attempt to authenticate from Asia one hour later would be rejected based on the combination of time and location.