Network Security
and Cryp ography
Ansh Bhawnani
“Your network is your net worth.
2
2
Network Security and Cryptography
3
Network Security
Network Security
4
What is Security?
Network Security
5
Network Security Principles
Confidentiality
6
1
Integrity
7
2
Availability
8
3
Network Security
9
Network Security
10
But why Security?
Network Security
▰ Only allow access to those who need it
▰ Provide authentication and access
control
▰ Guarantee availability of resources
▰ To not lose millions!
11
Network Security
12
Network Security Attacks
“The way the networking works, is
actually it’s own weakness.
13
13
Network Security
14
1.Passive Attacks
Network Security
15
Network Security
16
2. Active Attacks
Network Security
17
Network Security
18
1.Man in the Middle
Attack
This is where the destruction begins
Man in the Middle Attack (MiTM)
19
Man in the Middle Attack (MiTM)
20
How does it happen?
ARP Poisoning
Man in the Middle Attack (MiTM)
21
▰ ARP- Links IP address with MAC addresses
▰ ARP Poisoning/spoofing means faking a network
device
▰ Attacker will exploit working of the ARP protocol
▰ Attacker can forge an ARP packet with his MAC for a
legitimate IP address
ARP Poisoning 22
ARP Working
ARP Poisoning 23
ARP Poisoning
DNS Poisoning/Spoofing
Man in the Middle Attack (MiTM)
24
▰ Consequence of MiTM attack
▰ Exploitation of the DNS system
▰ Attacker is in the middle of DNS server and victim
▰ Attacker sends any IP he wants in response
DNS Poisoning 25
DNS Poisoning
Network Security
26
2. Denial of Service
DoS Attack 27
Denial of Service (DoS)
DDoS Attack 28
Distributed Denial of Service (DDoS)
Network Security
29
3. Eavesdropping
Network Security
30
4. Password Based Attacks
Password Based Attacks
Brute Force
▰ Simultaneously
try any huge
number of
random strings
Dictionary Based
▰ Target Specific
▰ Try every
combination from
a text/dictionary
file
Rainbow Tables
▰ Large file with
precomputed
hashes of strings
▰ Cracking very
fast, matter of
seconds
31
Network Security
32
5. Social Engineering
Which has no cure.
Network Security
33
What about “Security” then?
Network Security and Cryptography
34
Cryptography
Cryptography
▰ Study of techniques for secure communications
through insecure channels
▰ Fulfills confidentiality, integrity and non-repudiation
▰ Teaches how to convert sensible data into random
junk!
35
Cryptography
36
Cryptography
37
Cryptography
38
Cryptography Terms
Cryptography
Plaintext
▰ Original message
▰ Anyone can read
▰ E.g, “Alice”
Cipher key
▰ Cryptographic
function
▰ Tells how to
transform
plaintext into that
random junk
Cipher text
▰ That random junk
we got after
applying cipher
key on plaintext
▰ Unreadable,
useless
▰ E.g., “#r4Tf2%#”
39
Cryptography
Hash
▰ Random fixed length string
▰ Irreversible one way function
▰ Provides integrity
▰ E.g., MD5, SHA-1
Salt
▰ Additional security
▰ Eradicates brute force and
cracking
▰ Appended at beginning or end of
plaintext
40
Cryptography
Block cipher
▰ Divide a message into fixed size
blocks
▰ Encrypt each block individually
▰ Integrate all the outputs to obtain
final ciphertext
Stream Cipher
▰ Encrypt the message as a
sequence of bytes
▰ Encrypt the data bit by bit
41
Cryptography
Private key
▰ No question of sharing!
▰ Used for decrypting
▰ Completely confidential
▰ Limit only to yourself, that too in
your deepest vaults!
42
Public key
▰ Used for encrypting data
▰ Not confidential, boast about it!
▰ Your partner should have it!
Cryptography
43
Cryptanalysis
▰ Study of ciphertext and cryptosystems
▰ To find how they work, internally
▰ To break them
▰ Reversing the techniques of cryptography
Cryptography
44
Types of Cryptography
Types of Cryptography
45
Cryptography
46
1. Symmetric Encryption
Symmetric Cryptography
47
Cryptography
48
Encryption Standards
Cryptography
Advanced Encryption Standard (AES)
▰ Block cipher based on Rjindael
▰ Used for decrypting
▰ Completely confidential
▰ Limit only to yourself, that too
in your deepest vaults!
49
Data Encryption Standard (DES)
▰ Most widely used block cipher
▰ Introduced in 1977 by NIST
▰ Block Size- 64 bit
▰ Key size- 56 bit
Cryptography
50
Disadvantages of Symmetric Encryption
▰ Problem of key exchange
▰ Digital Signatures not applicable
▰ Known attacks
Cryptography
51
2. Asymmetric Encryption/
Public Key Cryptography
Asymmetric Cryptography
52
Cryptography
53
Types of Public Key Cryptography
▰ Rivest Shamir Adleman (RSA)
▰ Elgamal
▰ Diffie Hellman
▰ Elliptical Curve
Cryptography
54
Applications of Cryptography
▰ Secure Communications over insecure channels (public)
▰ End to End Encryption
▰ Asymmetric- Exchanging session keys for symmetric
communications
▰ Protecting data at rest (passwords, social, card numbers,
etc.)
▰ Digital Signatures
Network Security
55
Firewalls
Network Security
56
Intrusion Detection
Systems (IDS/IPS)
Network Security
57
UPDATE, UPDATE, UPDATE!!
Network Security
58
Stay smart, Boycott Stupidity
Network Security is not singular
59
Network Security and Cryptography
Neglecting security
in life is where IoT
becomes Internet
of Threats.
60
80%<
This much companies face lack of
expertise in cyber security, in India!
61
62
THANKS!
Any questions?

Network Security and Cryptography.pdf