SlideShare a Scribd company logo
1 of 20
NADARSARASWATHICOLLEGEOFARTS
ANDSCIENCE
VADAPUTHUPATTI,THENI–625531
Department of Computer Science and Information Technology
PRESENTED BY
NIBIYA.G
I-MSC(INFORMATION TECHONOLGY)
NETWORKAND
INTERNET SECURITY
TOPIC:-WIRELESS APPLICATION PROTOCOL SECURITY(
WAP )
PEM(privacy enhanced mail)
 It is an internet standard adopted by IAS (internet architecture
Board) for secure electronic mail communication over internet.
Described in four specification documents which are RFC
no.1421 to 1424
PEM(privacy enhanced mail)
To keep message secrete Message received is truly from person
from other person who claim to have sent it.
Message hasn’t be modified during
transport from sender
1.confidentiality 2.Authentication
3.Message
integrity
Fig. – security features provides
Working of PEM:-
Broad steps in PEM are:-
Canonical conversion
Digital signature
Encryption
Base – 64 - encoding
1. CANONICAL CONVERSION
Transfer each email message in an abstract, canonical
representation
Regardless of architecture and OS of sending and receiving
computer, email message travel in uniform, independent format.
Ensure uniform presentation syntax among a heterogeneous
collection of computer system.
2. DIGITAL SINGNATURE
Create the message using MD 5 or MD 2.
Then it is encrypted with the sender’s private key to form the
sender’s digital signature.
3. ENCRYPTION
4. BASE 64 ENCODING
Also called as radix 64 encoding or ASCII armour.
Binary input is processed in the block of 3 octates or 24 bits.
These 24 bits are considered to be made up of 4sets, each of
6bits.
Each such set of 6bits is mapped into an 8bit output character
Base – 64 encoding example
WHAT IS SSL?
It is an internet protocol for secure exchange of information between a web
browser and a web server
It provides
Authentication
Confidentiality
Developed by Netscape corporation in 1994
Currently comes in three versions : 2,3 and 3.1
POSITION OF SSL IN TCP/IP
DATA EXCHANGE USING TCP/IP LAYERS
DATA TRANSMISSION USING SSL
SSL ARCHITECTURE
SSL SUB - PROTOCOLS
Handshake protocol
Record protocol
change cipher protocol
Alert protocol
“ASK YOUR DOUBTS”
NETWORK AND INTERNET SECURITY

More Related Content

What's hot

Introduction to the osi 7 layer model
Introduction to the osi 7 layer modelIntroduction to the osi 7 layer model
Introduction to the osi 7 layer model
nvjphillips
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 

What's hot (19)

Osi model
Osi model Osi model
Osi model
 
Osi model
Osi modelOsi model
Osi model
 
Presentation on OSI Model
Presentation on OSI ModelPresentation on OSI Model
Presentation on OSI Model
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform ...
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
ELEC2 - Lecture 1
ELEC2 - Lecture 1ELEC2 - Lecture 1
ELEC2 - Lecture 1
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Introduction to the osi 7 layer model
Introduction to the osi 7 layer modelIntroduction to the osi 7 layer model
Introduction to the osi 7 layer model
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 
The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Chapter02 -- networking standards and the osi model
Chapter02  -- networking standards and the osi modelChapter02  -- networking standards and the osi model
Chapter02 -- networking standards and the osi model
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 

Similar to NETWORK AND INTERNET SECURITY

Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
Alexander Decker
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
Alexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Alexander Decker
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 

Similar to NETWORK AND INTERNET SECURITY (20)

Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
Itmg360 chapter one_v05
Itmg360 chapter one_v05Itmg360 chapter one_v05
Itmg360 chapter one_v05
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
 
DanOlaru-cv-IT
DanOlaru-cv-ITDanOlaru-cv-IT
DanOlaru-cv-IT
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 

More from nibiganesh

More from nibiganesh (15)

soft computing.pptx
soft computing.pptxsoft computing.pptx
soft computing.pptx
 
object oriented analysis data.pptx
object oriented analysis data.pptxobject oriented analysis data.pptx
object oriented analysis data.pptx
 
advance computer architecture.pptx
advance computer architecture.pptxadvance computer architecture.pptx
advance computer architecture.pptx
 
Women empowerment.pptx
Women empowerment.pptxWomen empowerment.pptx
Women empowerment.pptx
 
internet of things.pptx
internet of things.pptxinternet of things.pptx
internet of things.pptx
 
digital image processing.pptx
digital image processing.pptxdigital image processing.pptx
digital image processing.pptx
 
big data analysis.pptx
big data analysis.pptxbig data analysis.pptx
big data analysis.pptx
 
client server computing.pptx
client server computing.pptxclient server computing.pptx
client server computing.pptx
 
python&programming
python&programmingpython&programming
python&programming
 
distributing computing
distributing computingdistributing computing
distributing computing
 
Datamining & warehouse
Datamining & warehouseDatamining & warehouse
Datamining & warehouse
 
Artifical intelligent
Artifical intelligentArtifical intelligent
Artifical intelligent
 
Advanced java programming
Advanced java programmingAdvanced java programming
Advanced java programming
 
Advanced Computer Architecture
Advanced Computer ArchitectureAdvanced Computer Architecture
Advanced Computer Architecture
 
Data Structure Algorithm
Data Structure AlgorithmData Structure Algorithm
Data Structure Algorithm
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

NETWORK AND INTERNET SECURITY