SlideShare a Scribd company logo
NETWORK SECURITY 
CRYPTOGRAPHY 
Presented BY 
Sankari.P(B.Sc[CS] S/F) 
Sadakathullah Appa College 
Tirunelveli -11. 
Guided by: 
Mrs.J .Jannathul Firthous ,M.sc,M.phil
WHAT IS NETWORK 
 A network is an interconnection 
or a media between two or more 
systems to share information 
among them. 
 The various threats caused to 
network are : 
 Remote Login 
 Application Backdoors 
 SMTP Session Hijackings 
 Operating System Bugs 
 Spams 
 Viruses etc.
NETWORK SECURITY 
 The security provided to the network 
is called network security which at 
present is looming on horizon as a 
massive problem. 
There are two kinds of Network 
Security mainly as : 
 Transit Security: It just encrypts 
the packets to be transferred. 
 Traffic Security : It acts just as a 
screen between hosts & remote 
sites.
SECURITY GOALS
OBJECTIVE OF SECURITY 
 To avoid data threats 
 To avoid denial of services 
 To secure our data from masquerades 
 To safeguard our data’s from traffic analyzer 
 To not to make massage for the third person available
PASSWORD AUDITING 
 Should not be in uppercase 
 Must have at least 8 characters 
 Must include alphabets, numeric keys & special 
characters 
 Password should not be the name of the user, 
dictionary word etc., 
 It must be updated at least once a month
DATA SECURITY 
 To monitor the user’s ACCESS 
CONTROLS 
 System that are connected in network must be protected 
with firewalls 
To protect the integrity & availability of the institution’s 
information asset’s
PROBLEMS & ATTACKS 
There are few intertwined areas in network security as: 
 Secrecy 
 Authentication 
 Non-Repudiation 
 Integrity Control etc. 
The threats are classified into two categories : 
Passive Attacks : 
A passive attack is one in which the attacker eavesdrops and 
listens to the message but can’t modify the message. 
Active Attacks : 
An active attack is one in which the attacker modifies, deletes, 
replay or introduce new messages into the stream of message.
THREATS :
CLICK
CRYPTOGRAPHY 
 It is derived from the Greek word that meant for secret writing. 
 Cryptography is a Software or Hardware programs 
use Mathematical Functions , Formulas(Algorithms) to 
change text from one form to another. 
 Cryptography is the science and art of transforming messages to 
make them secure and immune to attacks. 
 It provides Confidentiality, Integrity, Accuracy. 
 Applications of cryptography includes ATM cards, computer 
passwords, and electronic commerce. 
 It’s very useful to our Army & Police network to transfer 
confidential data
TECHNIQUES 
The data is transferred by applying two techniques 
1.Encryption 
2.Decryption 
Encryption :The way of converting the plain text to the 
cipher text by the means of few keys is called as the 
“Encryption”. 
Decryption :The way of converting the cipher text to 
the plain text by the use of keys that are suitable to it is 
called as “Decryption”.
ENCRYTION & DECRYPTION
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY 
 The implementation of a simple cryptography using 
single key is done by the secret-key algorithms. 
 Also known as SECRET KEY CRYPTOGRAPHY . 
Sender & Receiver uses same key and an Encryption / 
Decryption Algorithm to Encrypt / Decrypt data . 
(i.e ) The Key is Shared 
 This can be done by p-box, s-box and product cipher
SYMMETRIC KEY CRYPTOGRAPHY
SUBSTITUTION CIPHER 
Replacing of each letter or 
group of letters of plain text 
into cipher text by another 
letters is called as 
“Substitution cipher”. 
The substitution may be : 
Monoalphabetic Substitution 
Polyalphabetic Substitution
TRANSPOSITION CIPHER 
 The change offered in 
the position of the text 
i.e. By jumbling the 
words is called as 
“Transposition cipher”. 
 And the technique used 
here is termed as “Mass 
Technique”.
ASYMMETRIC KEY CRYPTOGRAPHY 
 Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & 
Receiver uses different keys for Encryption & Decryption 
namely PUBLIC & PRIVATE respectively 
 Public key algorithms are formed when it satisfies the 
following requirements: 
o D(E(P))=P. 
o Difficulty to deduce D from E. 
o E cannot be broken by a chosen plain text attack. 
D -> Deciphering E -> Enciphering
ASYMMETRIC KEY CRYPTOGRAPHY
RSA ALGORITHM 
 RSA is derived from the names of the 3 discoverers 
named Rivest, Shamir, Adleman. 
 The RSA algorithm is one of the widely used in the key 
algorithms. 
(1)The main function of this algorithm is providing 
approach to public key cryptography & Encryption 
(2) In this the CIPHER TEXT are the integer’s 
between 0 to n-1 
C =e M mod n m->message ,e->encryption 
M=d C mod n C->cipher text ,d->decryption 
=(e M) d mod n n-> integer’s (r*a) r & a are prime 
=m e d mod n number’s
Symmetric key 
cryptography 
• Only 1 shared key is involved. 
• The same key encrypts and 
decrypts the plaintext. 
• The shared key is kept secret 
between Alice and Bob. 
• Examples of Symmetric 
algorithms: 
– DES, 3DES, AES, IDEA, 
BLOWFISH, TWOFISH, RC4, 
RC5, SAFER etc. 
Asymmetric key 
cryptography 
• Here 2 keys : a private and a 
public key are involved. 
• The Public key encrypts the 
plaintext while the private key 
decrypts it. 
• The private key is just kept 
secret by the Bob while the 
public key is made public. 
• Examples of Asymmetric 
algorithms: 
– Diffie-Hellman, RSA, El Gamal, 
Elliptic Curve Cryptography 
(ECC) etc.
APPLICATIONS 
• Defense Services 
• Secure Data Manipulation 
• E – Commerce 
• Business Transactions 
• Internet Payment Systems 
• User Identification Systems 
• Access Control 
• Data Security
PROPOSED CONCEPT 
 As known the data has been easily hacked 
even for the 52- bit encryption too. So, the 
encryption bits of 52-bits should be given 
with the combination of both numerals and 
alphabets ( for example one alphabet is 
placed for 13-bits each). 
 The placement of alphabet is known only to 
the particular sender & receiver such that it 
secures the data to be sent.
CONLUSION 
 This paper describes a technique to successfully 
hiding and secure the data or massage with the 
help of Encryption or Decryption technique with 
the Cryptography And Network Security. 
 However ,this research work & software package 
provide a good starting point for anyone 
interested in learning about Cryptography.
“For every lock there is a key……… 
It is better to keep safe your lock than the key”

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography ppt
Cryptography pptCryptography ppt
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
NEHA PATEL
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
cryptography
cryptographycryptography
cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Network security and cryptography

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
Soma Subbama
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 

Similar to Network security and cryptography (20)

Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 

Recently uploaded

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

Network security and cryptography

  • 1. NETWORK SECURITY CRYPTOGRAPHY Presented BY Sankari.P(B.Sc[CS] S/F) Sadakathullah Appa College Tirunelveli -11. Guided by: Mrs.J .Jannathul Firthous ,M.sc,M.phil
  • 2. WHAT IS NETWORK  A network is an interconnection or a media between two or more systems to share information among them.  The various threats caused to network are :  Remote Login  Application Backdoors  SMTP Session Hijackings  Operating System Bugs  Spams  Viruses etc.
  • 3. NETWORK SECURITY  The security provided to the network is called network security which at present is looming on horizon as a massive problem. There are two kinds of Network Security mainly as :  Transit Security: It just encrypts the packets to be transferred.  Traffic Security : It acts just as a screen between hosts & remote sites.
  • 5. OBJECTIVE OF SECURITY  To avoid data threats  To avoid denial of services  To secure our data from masquerades  To safeguard our data’s from traffic analyzer  To not to make massage for the third person available
  • 6. PASSWORD AUDITING  Should not be in uppercase  Must have at least 8 characters  Must include alphabets, numeric keys & special characters  Password should not be the name of the user, dictionary word etc.,  It must be updated at least once a month
  • 7. DATA SECURITY  To monitor the user’s ACCESS CONTROLS  System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s
  • 8. PROBLEMS & ATTACKS There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity Control etc. The threats are classified into two categories : Passive Attacks : A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message. Active Attacks : An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message.
  • 10. CLICK
  • 11. CRYPTOGRAPHY  It is derived from the Greek word that meant for secret writing.  Cryptography is a Software or Hardware programs use Mathematical Functions , Formulas(Algorithms) to change text from one form to another.  Cryptography is the science and art of transforming messages to make them secure and immune to attacks.  It provides Confidentiality, Integrity, Accuracy.  Applications of cryptography includes ATM cards, computer passwords, and electronic commerce.  It’s very useful to our Army & Police network to transfer confidential data
  • 12. TECHNIQUES The data is transferred by applying two techniques 1.Encryption 2.Decryption Encryption :The way of converting the plain text to the cipher text by the means of few keys is called as the “Encryption”. Decryption :The way of converting the cipher text to the plain text by the use of keys that are suitable to it is called as “Decryption”.
  • 15. SYMMETRIC KEY CRYPTOGRAPHY  The implementation of a simple cryptography using single key is done by the secret-key algorithms.  Also known as SECRET KEY CRYPTOGRAPHY . Sender & Receiver uses same key and an Encryption / Decryption Algorithm to Encrypt / Decrypt data . (i.e ) The Key is Shared  This can be done by p-box, s-box and product cipher
  • 17.
  • 18. SUBSTITUTION CIPHER Replacing of each letter or group of letters of plain text into cipher text by another letters is called as “Substitution cipher”. The substitution may be : Monoalphabetic Substitution Polyalphabetic Substitution
  • 19. TRANSPOSITION CIPHER  The change offered in the position of the text i.e. By jumbling the words is called as “Transposition cipher”.  And the technique used here is termed as “Mass Technique”.
  • 20. ASYMMETRIC KEY CRYPTOGRAPHY  Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & Receiver uses different keys for Encryption & Decryption namely PUBLIC & PRIVATE respectively  Public key algorithms are formed when it satisfies the following requirements: o D(E(P))=P. o Difficulty to deduce D from E. o E cannot be broken by a chosen plain text attack. D -> Deciphering E -> Enciphering
  • 22. RSA ALGORITHM  RSA is derived from the names of the 3 discoverers named Rivest, Shamir, Adleman.  The RSA algorithm is one of the widely used in the key algorithms. (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1 C =e M mod n m->message ,e->encryption M=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime =m e d mod n number’s
  • 23.
  • 24. Symmetric key cryptography • Only 1 shared key is involved. • The same key encrypts and decrypts the plaintext. • The shared key is kept secret between Alice and Bob. • Examples of Symmetric algorithms: – DES, 3DES, AES, IDEA, BLOWFISH, TWOFISH, RC4, RC5, SAFER etc. Asymmetric key cryptography • Here 2 keys : a private and a public key are involved. • The Public key encrypts the plaintext while the private key decrypts it. • The private key is just kept secret by the Bob while the public key is made public. • Examples of Asymmetric algorithms: – Diffie-Hellman, RSA, El Gamal, Elliptic Curve Cryptography (ECC) etc.
  • 25. APPLICATIONS • Defense Services • Secure Data Manipulation • E – Commerce • Business Transactions • Internet Payment Systems • User Identification Systems • Access Control • Data Security
  • 26. PROPOSED CONCEPT  As known the data has been easily hacked even for the 52- bit encryption too. So, the encryption bits of 52-bits should be given with the combination of both numerals and alphabets ( for example one alphabet is placed for 13-bits each).  The placement of alphabet is known only to the particular sender & receiver such that it secures the data to be sent.
  • 27. CONLUSION  This paper describes a technique to successfully hiding and secure the data or massage with the help of Encryption or Decryption technique with the Cryptography And Network Security.  However ,this research work & software package provide a good starting point for anyone interested in learning about Cryptography.
  • 28. “For every lock there is a key……… It is better to keep safe your lock than the key”