SlideShare a Scribd company logo
1 of 29
CRYPTOGRAPHY
AND NETWORK
SECURITY
By
VARNIKA JOSHI (10104707)
RICHA CHATURVEDI (10104728)
MAHIPESH SATIJA (10103558)
SUPERVISOR : DR. CHETNA DABAS
INTRODUCTION
• CRYPTOGRAPHY :
The practice and study of techniques for secure
communication in the presence of third parties
(called adversaries). More generally, it is about
constructing and analyzing protocols that
overcome the influence of adversaries and
which are related to various aspects of
information security such as data
confidentiality, data integrity, authentication,
and non-repudiation.
INTRODUCTION..
• NETWORK SECURITY
Provisions and policies to prevent and monitor
unauthorized access, misuse, modification, or
denial of a computer network and network-
accessible resources. It involves authorization
of access to data in a network, which is
controlled by the network administrator.
NOVELTY OF CONCEPT
We have attempted to club the various known
algorithms of Cryptography in a manner, so that
the shortcomings of one can be compensated by
the other and this way we can get a secure and
optimized algorithm for protecting our files from
hacking.
ALGORITHMS USED
Till now, we have implemented the following algorithms
for securing file sharing:
•Tiny Algorithm
•Image Steganography
•Rijndael Algorithm
•Video Cryptography via DCT Algorithm
•Audio Stegnography
•Hybrid Port Knocking System
Diagram
TINY ALGORITHM
• Is a block cipher
• Operates on 32-bit unsigned integers
• Uses 128 bit key
• Has a Fiestal Structure with a suggested 64 round,
typically implemented in pair termed cycles.
• Creates an array of the integers, converts them in
binary, and then applies XOR gate in pairs to derive a
final key. Decryption can be done only and only with
that key, otherwise item stays encrypted.
FIESTAL STRUCTURE
WEAKNESSES
• Suffers from equivalent keys, each key is
equivalent to three others, which means
effective key size is only 126 bits.
• Is bad as a Cryptographic Hash Function
• Is also susceptible to a Related Key Attack
which requires 2^23 chosen plaintexts under a
related key pair, with 2^32 time complexity.
IMAGE STEGANOGRAPHY
• The art of concealing a file in an image.
• The advantage of Steganography over Cryptography is
that the intended secret message does not attract
attention to itself as an object of scrutiny.
• 128 bit Advanced Encryption Standard (AES)
encryption is used to securely transfer a text message
even if its presence were to be detected. Currently, no
methods are used for breaking this kind of encryption
within a reasonable period of time. Additionally,
compression is used to maximize the space available in
an image.
RIJNDAEL ALGORITHM
• Is also a block cipher
• It uses 125-bit,192-bit or 256-bit keys
• Encrypts 128-bit blocks
• Symmetric key algo (same key used for both
encryption and decryption)
SUB BYTES STEP
In the SubBytes step, each byte in the state is replaced with its
entry in a fixed 8-bit lookup table, S;
B[I,j]=S(a[I,j])
SHIFT ROW STEP
Bytes in each row are shifted cyclically to the left. The
number of places of each byte is shifted differs for each row.
MIX COLUMNS STEPS
In the MixColumns step , each column of the state is
multiplied with a fixed matrix
ADD ROUND KEY STEP
Each byte of the state is combined with a byte of the round
subkey using the XOR operation
STEPS FOR PERFORMING
• Create a buffer for encryption and decryption.
• Provide three macros to convert the keybits values to closely
related values.
• Encryption and Decryption are performed one block at a time.
• It is advisable to clear and delete the buffers after the process is
finished.
• It encrypts the standard input (padding it with spaces, if
necessary), and writes the result to the specified cryptofile.
• It then decrypts the cryptofile contents and sends the results to
the standard output.
VIDEO CRYPTOGRAPHY
THUS VIDEO CRYPTOGRAPHY IS A VERY SECURE
OPTION
DCT ALGORITHM FOR
VIDEO CRYPTOGRAPHY
There are different steps in DCT technique to compress the image.
1.The image is broken into N*N blocks of pixels. Here N may be 4, 8,
16,etc.
2. Working from left to right, top to bottom, the DCT is applied to
each block.
3. Each block’s elements are compressed through
quantization means dividing by some specific value.
4. The array of compressed blocks that constitute the
image is stored in a drastically reduced amount of space
FORMULA FOR DCT
COMPRESSION
Hybrid Port Knocking
(HPK) Algorithm
• In computer networking port knocking is a method of
externally opening ports on a firewall by generating a
connection attempt on a set of prespecified closed
ports. Once a correct sequence of connection
attempts is received, the firewall rules are dynamically
modified to allow the host which sent the connection
attempts to connect over specific port(s). A variant
called Single Packet Authorization exists, where only a
single "knock" is needed, consisting of
an encrypted packet.
port knocking in 4 easy
steps
step 1 (A) client
cannot connect to
application listening
on port n; (B) client
cannot establish
connection to any
port
step 2 | (1,2,3,4) client
connects to a well-defined
set of ports in a sequence
that contains an encrypted
message by sending SYN
packets; client has a priori
knowledge of the port
knocking daemon and its
configuration, but receives
no acknowledgement during
this phase because firewall
rules preclude any response
step 3 | (A) server process (a
port knocking daemon)
intercepts connection
attempts and interprets
(decrypts and decodes) them
as comprising an authentic
"port knock"; server carries
out specific task based on
content of port knock, such
as opening port n to client
step 4 | (A) client
connects to port n
and authenticates
using applications
regular mechanism
The Proposed HPK
Technique
• The HPK technique consists of seven main steps. In what FOLLOWS,
• Traffic monitoring
• Traffic capturing
• Image processing
• Client authenticating
• Server authentication
• Proving the identity of the client
• Port closing
Security Measurements and Evaluation
• In order to evaluate the security of the HPK technique, a
• number of hacking scenarios were compared with two
• other well known port-knocking techniques (Traditional
• Port-knocking, and Single Packet Authorization). The
• scenarios performed were the following:
• 1. TCP replay attack
• 2. DoS attack
Least Significant bit
• For Hiding the information via Audio Steganography
we have applied the Least significant bit
• In computing, the least significant bit (lsb) is
the bit position in a binary integer giving the units
value, that is, determining whether the number is even
or odd. The lsb is sometimes referred to as the right-
most bit, due to the convention in positional notation
of writing less significant digits further to the right. It
is analogous to the least significant digit of a decimal
integer, which is the digit in the ones (right-most)
position.
Time Complexities
• The most Efficient is the Rijndael (AES)
enc/dec system as it uses 3 levels of 128, 196
and 256 bits of block sizes and has a time
complexity GF(28)
• Whereas, the Neural networks are NP-
complete , so breaking the security of neural
key exchange belongs to the complexity class
NP.
• The Tiny algorithm time complexity are 2^32
(for 64 bit) and 2^126 for 128 bit .
 Cryptography and network security

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 

What's hot (20)

CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
cryptography
cryptographycryptography
cryptography
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 

Viewers also liked

Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographypinkutinku26
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cloud Computing Course
Cloud Computing Course Cloud Computing Course
Cloud Computing Course Arshdeep Bahga
 
Cs6703 grid and cloud computing book
Cs6703 grid and cloud computing bookCs6703 grid and cloud computing book
Cs6703 grid and cloud computing bookkaleeswaranme
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Message Hiding
Message HidingMessage Hiding
Message Hidingappynikki
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Jorge Salazar
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Tania Agni
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threatsrashidalkamdah
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Network and network security
Network and network securityNetwork and network security
Network and network securityRuchi Gupta
 

Viewers also liked (20)

Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cloud Computing Course
Cloud Computing Course Cloud Computing Course
Cloud Computing Course
 
Cs6703 grid and cloud computing book
Cs6703 grid and cloud computing bookCs6703 grid and cloud computing book
Cs6703 grid and cloud computing book
 
13. Casting
13. Casting13. Casting
13. Casting
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Message Hiding
Message HidingMessage Hiding
Message Hiding
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
E securty
E securtyE securty
E securty
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network and network security
Network and network securityNetwork and network security
Network and network security
 

Similar to Cryptography and network security

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 

Similar to Cryptography and network security (20)

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

Cryptography and network security

  • 1. CRYPTOGRAPHY AND NETWORK SECURITY By VARNIKA JOSHI (10104707) RICHA CHATURVEDI (10104728) MAHIPESH SATIJA (10103558) SUPERVISOR : DR. CHETNA DABAS
  • 2. INTRODUCTION • CRYPTOGRAPHY : The practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects of information security such as data confidentiality, data integrity, authentication, and non-repudiation.
  • 3. INTRODUCTION.. • NETWORK SECURITY Provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. It involves authorization of access to data in a network, which is controlled by the network administrator.
  • 4. NOVELTY OF CONCEPT We have attempted to club the various known algorithms of Cryptography in a manner, so that the shortcomings of one can be compensated by the other and this way we can get a secure and optimized algorithm for protecting our files from hacking.
  • 5. ALGORITHMS USED Till now, we have implemented the following algorithms for securing file sharing: •Tiny Algorithm •Image Steganography •Rijndael Algorithm •Video Cryptography via DCT Algorithm •Audio Stegnography •Hybrid Port Knocking System
  • 7. TINY ALGORITHM • Is a block cipher • Operates on 32-bit unsigned integers • Uses 128 bit key • Has a Fiestal Structure with a suggested 64 round, typically implemented in pair termed cycles. • Creates an array of the integers, converts them in binary, and then applies XOR gate in pairs to derive a final key. Decryption can be done only and only with that key, otherwise item stays encrypted.
  • 9. WEAKNESSES • Suffers from equivalent keys, each key is equivalent to three others, which means effective key size is only 126 bits. • Is bad as a Cryptographic Hash Function • Is also susceptible to a Related Key Attack which requires 2^23 chosen plaintexts under a related key pair, with 2^32 time complexity.
  • 10. IMAGE STEGANOGRAPHY • The art of concealing a file in an image. • The advantage of Steganography over Cryptography is that the intended secret message does not attract attention to itself as an object of scrutiny. • 128 bit Advanced Encryption Standard (AES) encryption is used to securely transfer a text message even if its presence were to be detected. Currently, no methods are used for breaking this kind of encryption within a reasonable period of time. Additionally, compression is used to maximize the space available in an image.
  • 11. RIJNDAEL ALGORITHM • Is also a block cipher • It uses 125-bit,192-bit or 256-bit keys • Encrypts 128-bit blocks • Symmetric key algo (same key used for both encryption and decryption)
  • 12. SUB BYTES STEP In the SubBytes step, each byte in the state is replaced with its entry in a fixed 8-bit lookup table, S; B[I,j]=S(a[I,j])
  • 13. SHIFT ROW STEP Bytes in each row are shifted cyclically to the left. The number of places of each byte is shifted differs for each row.
  • 14. MIX COLUMNS STEPS In the MixColumns step , each column of the state is multiplied with a fixed matrix
  • 15. ADD ROUND KEY STEP Each byte of the state is combined with a byte of the round subkey using the XOR operation
  • 16. STEPS FOR PERFORMING • Create a buffer for encryption and decryption. • Provide three macros to convert the keybits values to closely related values. • Encryption and Decryption are performed one block at a time. • It is advisable to clear and delete the buffers after the process is finished. • It encrypts the standard input (padding it with spaces, if necessary), and writes the result to the specified cryptofile. • It then decrypts the cryptofile contents and sends the results to the standard output.
  • 17. VIDEO CRYPTOGRAPHY THUS VIDEO CRYPTOGRAPHY IS A VERY SECURE OPTION
  • 18. DCT ALGORITHM FOR VIDEO CRYPTOGRAPHY There are different steps in DCT technique to compress the image. 1.The image is broken into N*N blocks of pixels. Here N may be 4, 8, 16,etc. 2. Working from left to right, top to bottom, the DCT is applied to each block. 3. Each block’s elements are compressed through quantization means dividing by some specific value. 4. The array of compressed blocks that constitute the image is stored in a drastically reduced amount of space
  • 20. Hybrid Port Knocking (HPK) Algorithm • In computer networking port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called Single Packet Authorization exists, where only a single "knock" is needed, consisting of an encrypted packet.
  • 21. port knocking in 4 easy steps step 1 (A) client cannot connect to application listening on port n; (B) client cannot establish connection to any port step 2 | (1,2,3,4) client connects to a well-defined set of ports in a sequence that contains an encrypted message by sending SYN packets; client has a priori knowledge of the port knocking daemon and its configuration, but receives no acknowledgement during this phase because firewall rules preclude any response step 3 | (A) server process (a port knocking daemon) intercepts connection attempts and interprets (decrypts and decodes) them as comprising an authentic "port knock"; server carries out specific task based on content of port knock, such as opening port n to client step 4 | (A) client connects to port n and authenticates using applications regular mechanism
  • 22. The Proposed HPK Technique • The HPK technique consists of seven main steps. In what FOLLOWS, • Traffic monitoring • Traffic capturing • Image processing • Client authenticating • Server authentication • Proving the identity of the client • Port closing
  • 23. Security Measurements and Evaluation • In order to evaluate the security of the HPK technique, a • number of hacking scenarios were compared with two • other well known port-knocking techniques (Traditional • Port-knocking, and Single Packet Authorization). The • scenarios performed were the following: • 1. TCP replay attack • 2. DoS attack
  • 24.
  • 25.
  • 26.
  • 27. Least Significant bit • For Hiding the information via Audio Steganography we have applied the Least significant bit • In computing, the least significant bit (lsb) is the bit position in a binary integer giving the units value, that is, determining whether the number is even or odd. The lsb is sometimes referred to as the right- most bit, due to the convention in positional notation of writing less significant digits further to the right. It is analogous to the least significant digit of a decimal integer, which is the digit in the ones (right-most) position.
  • 28. Time Complexities • The most Efficient is the Rijndael (AES) enc/dec system as it uses 3 levels of 128, 196 and 256 bits of block sizes and has a time complexity GF(28) • Whereas, the Neural networks are NP- complete , so breaking the security of neural key exchange belongs to the complexity class NP. • The Tiny algorithm time complexity are 2^32 (for 64 bit) and 2^126 for 128 bit .