SlideShare a Scribd company logo
1 of 20
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.1
Chapter 1
Introduction
Cryptography and Network
Security
CRYPTOGRAPHY AND
NETWORK SECURITY
3e
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.2
● To define the three security goals
● To explain security attacks that threaten
confidentiality, integrity, and availability
● To infer to the different categories of cryptographic
attacks
● To relate to the relationship between security
services and their mechanisms.
● To outline the different techniques needed for
implementing security goals.
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.3
This section defines three security goals.
1.1.1 Confidentiality
1.1.2 Integrity
1.1.3 Availability
SECURITY GOALS
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.4
Security
Goals
Confidentiality
Integrity
Availability
Taxonomy of Security Goals
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.5
 It is probably the most common aspect of
information security.
 We need to protect our confidential information.
 An organization needs to guard against those
malicious actions that endanger the confidentiality of
its information.
Confidentiality
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.6
 Information needs to be changed constantly.
 Integrity means that changes need to be done only
by authorized entities and through authorized
mechanisms.
Integrity
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.7
 The third component of information security is
availability.
 The information created and stored by an
organization needs to be available to authorized
entities.
 Information needs to be constantly changed, which
means it must be accessible to authorized entities.
Availability
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.8
The three goals of security - confidentiality, integrity,
and availability - can be threatened by security attacks.
1.2.1 Attacks Threatening Confidentiality
1.2.2 Attacks Threatening Integrity
1.2.3 Attacks Threatening Availability
1.2.4 Passive versus Active Attacks
Topics discussed in this section:
CRYPTOGRAPHIC ATTACKS
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.9
Figure : Taxonomy of attacks with relation to security goals
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.10
Snooping refers to unauthorized access to or
interception of data.
Traffic analysis refers to obtaining some
other type of information by monitoring
online traffic.
Attacks Threatening Confidentiality
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.11
Attacks Threatening Integrity
1) Modification means that the attacker intercepts the
message and changes it.
2) Masquerading or spoofing happens when the attacker
impersonates somebody else.
3) Replaying means the attacker obtains a copy
of a message sent by a user and later tries to replay it.
4) Repudiation means that sender of the message might
later deny that she has sent the message; the receiver of
the message might later deny that he has received the
message.
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.12
Attacks Threatening Integrity
Denial of service (DoS) is a very common
attack. It may slow down or totally interrupt
the service of a system.
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.13
Table 1.1 Categorization of passive and active attacks
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.14
Figure 1.3 Security services
Security Services
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.15
Figure: Security mechanisms
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.16
Table: Relation between security services and mechanisms
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.17
Mechanisms discussed in the previous sections are only
theoretical recipes to implement security. The actual
implementation of security goals needs some
techniques. Two techniques are prevalent today:
cryptography and steganography.
1.4.1 Cryptography
1.4.2 Steganography
Topics discussed in this section:
TECHNIQUES
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.18
Cryptography, a word with Greek origins, means
“secret writing.” However, we use the term to refer to
the science and art of transforming messages to make
them secure and immune to attacks.
Cryptography
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.19
The word steganography, with origin in Greek, means
“covered writing,” in contrast with cryptography, which
means “secret writing.”
Example: covering data with text
Steganography
Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved.
1.20
Example: using dictionary
Example: covering data under color image
Continued…

More Related Content

Similar to CNS PPT.ppt

ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 

Similar to CNS PPT.ppt (20)

3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Introduction to Ford Motors Projects.pdf
Introduction to Ford Motors Projects.pdfIntroduction to Ford Motors Projects.pdf
Introduction to Ford Motors Projects.pdf
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Module 4.pdf
Module 4.pdfModule 4.pdf
Module 4.pdf
 
Module 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe GuardsModule 4 Cyber Security Vulnerabilities& Safe Guards
Module 4 Cyber Security Vulnerabilities& Safe Guards
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
R20BM564.pptx
R20BM564.pptxR20BM564.pptx
R20BM564.pptx
 
R20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptxR20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 

More from Sri Latha (11)

key management in cryptography and network security
key management in cryptography and network securitykey management in cryptography and network security
key management in cryptography and network security
 
owasp features in secure coding techniques
owasp  features in secure coding techniquesowasp  features in secure coding techniques
owasp features in secure coding techniques
 
supraja technologies material for secure coding
supraja technologies material for secure codingsupraja technologies material for secure coding
supraja technologies material for secure coding
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
 
Ml Fundamentals and applications using python
Ml Fundamentals and applications using pythonMl Fundamentals and applications using python
Ml Fundamentals and applications using python
 
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
 
UNIT-4.ppt
UNIT-4.pptUNIT-4.ppt
UNIT-4.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
unit5 graphs (DS).pptx
unit5 graphs (DS).pptxunit5 graphs (DS).pptx
unit5 graphs (DS).pptx
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
introdution-to-html.ppt
introdution-to-html.pptintrodution-to-html.ppt
introdution-to-html.ppt
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

CNS PPT.ppt

  • 1. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.1 Chapter 1 Introduction Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY 3e
  • 2. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.2 ● To define the three security goals ● To explain security attacks that threaten confidentiality, integrity, and availability ● To infer to the different categories of cryptographic attacks ● To relate to the relationship between security services and their mechanisms. ● To outline the different techniques needed for implementing security goals.
  • 3. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.3 This section defines three security goals. 1.1.1 Confidentiality 1.1.2 Integrity 1.1.3 Availability SECURITY GOALS
  • 4. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.4 Security Goals Confidentiality Integrity Availability Taxonomy of Security Goals
  • 5. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.5  It is probably the most common aspect of information security.  We need to protect our confidential information.  An organization needs to guard against those malicious actions that endanger the confidentiality of its information. Confidentiality
  • 6. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.6  Information needs to be changed constantly.  Integrity means that changes need to be done only by authorized entities and through authorized mechanisms. Integrity
  • 7. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.7  The third component of information security is availability.  The information created and stored by an organization needs to be available to authorized entities.  Information needs to be constantly changed, which means it must be accessible to authorized entities. Availability
  • 8. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.8 The three goals of security - confidentiality, integrity, and availability - can be threatened by security attacks. 1.2.1 Attacks Threatening Confidentiality 1.2.2 Attacks Threatening Integrity 1.2.3 Attacks Threatening Availability 1.2.4 Passive versus Active Attacks Topics discussed in this section: CRYPTOGRAPHIC ATTACKS
  • 9. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.9 Figure : Taxonomy of attacks with relation to security goals
  • 10. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.10 Snooping refers to unauthorized access to or interception of data. Traffic analysis refers to obtaining some other type of information by monitoring online traffic. Attacks Threatening Confidentiality
  • 11. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.11 Attacks Threatening Integrity 1) Modification means that the attacker intercepts the message and changes it. 2) Masquerading or spoofing happens when the attacker impersonates somebody else. 3) Replaying means the attacker obtains a copy of a message sent by a user and later tries to replay it. 4) Repudiation means that sender of the message might later deny that she has sent the message; the receiver of the message might later deny that he has received the message.
  • 12. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.12 Attacks Threatening Integrity Denial of service (DoS) is a very common attack. It may slow down or totally interrupt the service of a system.
  • 13. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.13 Table 1.1 Categorization of passive and active attacks
  • 14. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.14 Figure 1.3 Security services Security Services
  • 15. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.15 Figure: Security mechanisms
  • 16. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.16 Table: Relation between security services and mechanisms
  • 17. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.17 Mechanisms discussed in the previous sections are only theoretical recipes to implement security. The actual implementation of security goals needs some techniques. Two techniques are prevalent today: cryptography and steganography. 1.4.1 Cryptography 1.4.2 Steganography Topics discussed in this section: TECHNIQUES
  • 18. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.18 Cryptography, a word with Greek origins, means “secret writing.” However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. Cryptography
  • 19. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.19 The word steganography, with origin in Greek, means “covered writing,” in contrast with cryptography, which means “secret writing.” Example: covering data with text Steganography
  • 20. Copyright © 2015 by McGraw Hill Education (India) Private Limited. All rights reserved. 1.20 Example: using dictionary Example: covering data under color image Continued…