SlideShare a Scribd company logo
1 of 21
NETWORK SECURITY
1012021:- Chiranjeev Shah
1012025:- Dhaval Bhatia
1012027:- Dipesh Ingawle
Introduction to Cryptography
 Cryptography is a word from Greek where crpyto 
means "hidden, secret"; and graphy means 
"writing" or "study“ . It is the practice and study of 
techniques for secure communication in the 
presence of third parties .
 More generally, it is about constructing and 
analyzing protocols that overcome the influence of 
adversaries and which are related to various 
aspects in information security such as data 
confidentiality, data integrity and authentication.
 
Applications of Cryptography
    Applications of cryptography include ATM 
cards, computer passwords, and electronic 
commerce.
German Lorenz cipher
 machine, used in
World War II to encrypt 
very-high-level 
general staff messages
Cryptography components
ALICE , BOB and EVE
 In cryptography, it is customary to use three
Characters in an information exchange.
 ALICE:- who Needs to send the DATA.
 BOB:- recipient of the DATA
 EVE:- person who somehow disturbs the
communication between Alice and Bob
Categories of cryptography
Symmetric-key cryptography
In symmetric-key cryptography, theIn symmetric-key cryptography, the
same key is used by the sendersame key is used by the sender
(for encryption)(for encryption)
and the receiver (for decryption).and the receiver (for decryption).
The key is shared.The key is shared.
Asymmetric-key cryptography
Keys used in cryptography
Comparison between two categories of cryptography
SECURITY SERVICESSECURITY SERVICES
Network security can provide five services. Four of theseNetwork security can provide five services. Four of these
services are related to the message exchanged using theservices are related to the message exchanged using the
network. The fifth service provides entity authenticationnetwork. The fifth service provides entity authentication
or identification.or identification.
Message ConfidentialityMessage Confidentiality
Message IntegrityMessage Integrity
Message AuthenticationMessage Authentication
Message NonrepudiationMessage Nonrepudiation
Entity AuthenticationEntity Authentication
Message Confidentiality
The concept of how to achieve message confidentiality or privacyThe concept of how to achieve message confidentiality or privacy
has not changed for thousands of years. The message must behas not changed for thousands of years. The message must be
encrypted at the sender site and decrypted at the receiver site.encrypted at the sender site and decrypted at the receiver site.
This can be done using either symmetric-key cryptography orThis can be done using either symmetric-key cryptography or
asymmetric-key cryptography.asymmetric-key cryptography.
Message confidentiality using symmetric keys in two directions
Message confidentiality using asymmetric keys
MESSAGE INTEGRITYMESSAGE INTEGRITY
 Encryption and decryption provide secrecy, or confidentiality,Encryption and decryption provide secrecy, or confidentiality,
but not integrity. However, on occasion we may not even needbut not integrity. However, on occasion we may not even need
secrecy, but instead must have integrity.secrecy, but instead must have integrity.
To preserve the integrity of a document,To preserve the integrity of a document,
both the document and the fingerprint areboth the document and the fingerprint are
needed.needed.
Message and message digest
The message digest needs to be kept secret.The message digest needs to be kept secret.
MESSAGE AUTHENTICATIONMESSAGE AUTHENTICATION
 A hash function per se cannot provide authentication. TheA hash function per se cannot provide authentication. The
digest created by a hash function can detect any modificationdigest created by a hash function can detect any modification
in the message, but not authentication.in the message, but not authentication.
DIGITAL SIGNATUREDIGITAL SIGNATURE
 When Alice sends a message to Bob, Bob needs to check theWhen Alice sends a message to Bob, Bob needs to check the
authenticity of the sender; he needs to be sure that theauthenticity of the sender; he needs to be sure that the
message comes from Alice and not Eve. Bob can ask Alice tomessage comes from Alice and not Eve. Bob can ask Alice to
sign the message electronically. In other words, an electronicsign the message electronically. In other words, an electronic
signature can prove the authenticity of Alice as the sender ofsignature can prove the authenticity of Alice as the sender of
the message. We refer to this type of signature as a digitalthe message. We refer to this type of signature as a digital
signature.signature.
A digital signature needs a public-key system.A digital signature needs a public-key system.
ENTITYAUTHENTICATIONENTITYAUTHENTICATION
 Entity authentication is a technique designedEntity authentication is a technique designed
to let one party prove the identity of anotherto let one party prove the identity of another
party. An entity can be a person, a process, aparty. An entity can be a person, a process, a
client, or a server. The entity whose identityclient, or a server. The entity whose identity
needs to be proved is called the claimant; theneeds to be proved is called the claimant; the
party that tries to prove the identity of theparty that tries to prove the identity of the
claimant is called the verifier.claimant is called the verifier.
 In challenge-response authentication,
the claimant proves that she knows a secret
without revealing it.
KEY MANAGEMENTKEY MANAGEMENT
 We never discussed how secret keys inWe never discussed how secret keys in
symmetric-key cryptography and how publicsymmetric-key cryptography and how public
keys in asymmetric-key cryptography arekeys in asymmetric-key cryptography are
distributed and maintained. In this section,distributed and maintained. In this section,
we touch on these two issues. We firstwe touch on these two issues. We first
discuss the distribution of symmetric keys;discuss the distribution of symmetric keys;
we then discuss the distribution ofwe then discuss the distribution of
asymmetric keys.asymmetric keys.
A session symmetric key between two parties isA session symmetric key between two parties is
used only once.used only once.
Thank You
K. J. SOMAIYA COLLEGE OF ENGINEERING
Electronics Engineering

More Related Content

What's hot

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)Soham Kansodaria
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introductionAsim Neupane
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital SignatureAsim Neupane
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overviewRishi Pathak
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?MSA Technosoft
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief IntroductionGanesh Kothe
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 

What's hot (19)

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Ds over
Ds overDs over
Ds over
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Viewers also liked

Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (8)

Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Network securities cn

Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)Wail Hassan
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!jmoquendo
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Michele Orru'
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxKuntalSasmal1
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_emadunix
 

Similar to Network securities cn (20)

Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Ao318992
Ao318992Ao318992
Ao318992
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Public private key
Public private keyPublic private key
Public private key
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_e
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Network securities cn

  • 1. NETWORK SECURITY 1012021:- Chiranjeev Shah 1012025:- Dhaval Bhatia 1012027:- Dipesh Ingawle
  • 2. Introduction to Cryptography  Cryptography is a word from Greek where crpyto  means "hidden, secret"; and graphy means  "writing" or "study“ . It is the practice and study of  techniques for secure communication in the  presence of third parties .  More generally, it is about constructing and  analyzing protocols that overcome the influence of  adversaries and which are related to various  aspects in information security such as data  confidentiality, data integrity and authentication.  
  • 5. ALICE , BOB and EVE  In cryptography, it is customary to use three Characters in an information exchange.  ALICE:- who Needs to send the DATA.  BOB:- recipient of the DATA  EVE:- person who somehow disturbs the communication between Alice and Bob
  • 7. Symmetric-key cryptography In symmetric-key cryptography, theIn symmetric-key cryptography, the same key is used by the sendersame key is used by the sender (for encryption)(for encryption) and the receiver (for decryption).and the receiver (for decryption). The key is shared.The key is shared.
  • 9. Keys used in cryptography
  • 10. Comparison between two categories of cryptography
  • 11. SECURITY SERVICESSECURITY SERVICES Network security can provide five services. Four of theseNetwork security can provide five services. Four of these services are related to the message exchanged using theservices are related to the message exchanged using the network. The fifth service provides entity authenticationnetwork. The fifth service provides entity authentication or identification.or identification. Message ConfidentialityMessage Confidentiality Message IntegrityMessage Integrity Message AuthenticationMessage Authentication Message NonrepudiationMessage Nonrepudiation Entity AuthenticationEntity Authentication
  • 12. Message Confidentiality The concept of how to achieve message confidentiality or privacyThe concept of how to achieve message confidentiality or privacy has not changed for thousands of years. The message must behas not changed for thousands of years. The message must be encrypted at the sender site and decrypted at the receiver site.encrypted at the sender site and decrypted at the receiver site. This can be done using either symmetric-key cryptography orThis can be done using either symmetric-key cryptography or asymmetric-key cryptography.asymmetric-key cryptography.
  • 13. Message confidentiality using symmetric keys in two directions
  • 14. Message confidentiality using asymmetric keys
  • 15. MESSAGE INTEGRITYMESSAGE INTEGRITY  Encryption and decryption provide secrecy, or confidentiality,Encryption and decryption provide secrecy, or confidentiality, but not integrity. However, on occasion we may not even needbut not integrity. However, on occasion we may not even need secrecy, but instead must have integrity.secrecy, but instead must have integrity. To preserve the integrity of a document,To preserve the integrity of a document, both the document and the fingerprint areboth the document and the fingerprint are needed.needed.
  • 16. Message and message digest The message digest needs to be kept secret.The message digest needs to be kept secret.
  • 17. MESSAGE AUTHENTICATIONMESSAGE AUTHENTICATION  A hash function per se cannot provide authentication. TheA hash function per se cannot provide authentication. The digest created by a hash function can detect any modificationdigest created by a hash function can detect any modification in the message, but not authentication.in the message, but not authentication.
  • 18. DIGITAL SIGNATUREDIGITAL SIGNATURE  When Alice sends a message to Bob, Bob needs to check theWhen Alice sends a message to Bob, Bob needs to check the authenticity of the sender; he needs to be sure that theauthenticity of the sender; he needs to be sure that the message comes from Alice and not Eve. Bob can ask Alice tomessage comes from Alice and not Eve. Bob can ask Alice to sign the message electronically. In other words, an electronicsign the message electronically. In other words, an electronic signature can prove the authenticity of Alice as the sender ofsignature can prove the authenticity of Alice as the sender of the message. We refer to this type of signature as a digitalthe message. We refer to this type of signature as a digital signature.signature. A digital signature needs a public-key system.A digital signature needs a public-key system.
  • 19. ENTITYAUTHENTICATIONENTITYAUTHENTICATION  Entity authentication is a technique designedEntity authentication is a technique designed to let one party prove the identity of anotherto let one party prove the identity of another party. An entity can be a person, a process, aparty. An entity can be a person, a process, a client, or a server. The entity whose identityclient, or a server. The entity whose identity needs to be proved is called the claimant; theneeds to be proved is called the claimant; the party that tries to prove the identity of theparty that tries to prove the identity of the claimant is called the verifier.claimant is called the verifier.  In challenge-response authentication, the claimant proves that she knows a secret without revealing it.
  • 20. KEY MANAGEMENTKEY MANAGEMENT  We never discussed how secret keys inWe never discussed how secret keys in symmetric-key cryptography and how publicsymmetric-key cryptography and how public keys in asymmetric-key cryptography arekeys in asymmetric-key cryptography are distributed and maintained. In this section,distributed and maintained. In this section, we touch on these two issues. We firstwe touch on these two issues. We first discuss the distribution of symmetric keys;discuss the distribution of symmetric keys; we then discuss the distribution ofwe then discuss the distribution of asymmetric keys.asymmetric keys. A session symmetric key between two parties isA session symmetric key between two parties is used only once.used only once.
  • 21. Thank You K. J. SOMAIYA COLLEGE OF ENGINEERING Electronics Engineering