It’s Presentations from




         Network Security &Cryptography
Friend
Presented & performed by


              Mr: Rahulprasad yadav
              Mr: Nakul Naikwade
            (Information Technology)




Network Security & cryptography
Network Security & Cryptography
Synopsis
       Network security
        ->Objective of Security
        ->Password Auditing
        ->Data Security
        ->Authentication
      Cryptography
       ->Encryption & Decryption
       ->Public & Private Key Cryptography
       ->Digital Signatures
       ->RSA Algorithm
      Demonstration
      Conclusion
                  Network Security & Cryptography
ETWORK SECURITY ->a small intro....


    ->WHY it is needed?
   ->WHERE it is needed?
    ->HOW it is needed?
    Network Security& Cryptography
OBJECTIVE OF SECURITY
     To avoid data threats

     To avoid denial of services

     To secure our data from masquerades

     To safeguard our data’s from traffic analyzer

    To not to make massage for the third person available




        Network Security & Cryptography
PASSWORD AUDITING
  Should not be in uppercase

  Must have at least 8 characters

  Must include alphabets, numeric keys & special
  characters
  Password should not be the name of the user,
  dictionary word etc.,

  It must be updated at least once a month

       Network Security & Cryptography
DATA SECURITY

 To monitor the user’s ACCESS CONTROLS

 System that are connected in network must be protected
  with firewalls

  To protect the integrity & availability of the institution’s
  information asset’s

            Network Security & Cryptography
RYTOGRAPHY->a small intro……

keywords
    ->cryptography
    ->Encryption &Decryption
   ->Public& Private key cryptography
    ->Digital signature’s
    ->RSA Algorithm


          Network Security & Cryptography
CRYTOGRAPHY

    Cryptography is science of using mathematics to
encrypt decrypt data

     Cryptography enable you to store sensitive
information or transmit it across insecure networks(like
internet) so that it cannot be read by anyone except the
intended recipient

    It’s very useful to our Army & Police network to trans
for confidential data
               Network Security & Cryptography
ENCRYPTION AND DECRYPTION

  Encryption is a technique that convert’s the original
  text into an unreadable text

 The converted original text is called as Cipher text

 Decryption technique is used to convert the cipher text
 into the original text
 Authentication is the verification process which identifies
 the password & username
 Digital signature are signed to make the cipher text into unread-
 able

             Network Security &Cryptography
PUBLIC & PRIVATE KEY
CRYPTOGRAPHY

     Public-key cryptography refers to a cryptography system
require 2 separate keys, one to lock or encrypt the plaintext
& one to unlock or decrypt the cipher text

    Private-key ,a private or secret key is an encryption
decryption key known only to the party or parties that exchange
secret massages a problem with PKC is that sender & receiver of
message must agree on a common key via alternative secure
channel

               Network Security & Cryptography
RSA ALGORITHEM

        Published in 1978 by MIT,US
   (1)The main function of this algorithm is providing approach
    to public key cryptography & Encryption
   (2) In this the CIPHER TEXT are the integer’s between 0 to n-1

C=e M mod n           m->message ,e->encryption
M=d C mod n           C->cipher text ,d->decryption
  =(e M) d mod n      n-> integer’s (r*a) r & a are prime number’s
  =m e d mod n




               Network Security & Cryptography
PUBLIC KEY SYSTEM->a Demonstration
CONLUSION
   This paper describes a technique to successfully
hiding and secure the data or massage with the help
of Encryption or Decryption technique with the
Cryptography And Network Security.
However ,this research work & software package
provide a good starting point for anyone interested in
learning about Cryptography.



            Network Security & Cryptography
“for every lock there is a key………
It is better to keep safe your lock than the key”

                 “




          Network Security & Cryptography
Bibliography

    References
     CCNA INTRO-wendell odom
     NETWORK ESSENTIALS-william stalings
  Website
     www.wikipedia.com
     www.securitymeasure.com


         Network Security & Cryptography

Network security & cryptography

  • 1.
    It’s Presentations from Network Security &Cryptography
  • 4.
  • 5.
    Presented & performedby Mr: Rahulprasad yadav Mr: Nakul Naikwade (Information Technology) Network Security & cryptography
  • 6.
    Network Security &Cryptography
  • 7.
    Synopsis Network security ->Objective of Security ->Password Auditing ->Data Security ->Authentication Cryptography ->Encryption & Decryption ->Public & Private Key Cryptography ->Digital Signatures ->RSA Algorithm Demonstration Conclusion Network Security & Cryptography
  • 8.
    ETWORK SECURITY ->asmall intro.... ->WHY it is needed? ->WHERE it is needed? ->HOW it is needed? Network Security& Cryptography
  • 9.
    OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades To safeguard our data’s from traffic analyzer To not to make massage for the third person available Network Security & Cryptography
  • 10.
    PASSWORD AUDITING Should not be in uppercase Must have at least 8 characters Must include alphabets, numeric keys & special characters Password should not be the name of the user, dictionary word etc., It must be updated at least once a month Network Security & Cryptography
  • 11.
    DATA SECURITY Tomonitor the user’s ACCESS CONTROLS System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s Network Security & Cryptography
  • 12.
    RYTOGRAPHY->a small intro…… keywords ->cryptography ->Encryption &Decryption ->Public& Private key cryptography ->Digital signature’s ->RSA Algorithm Network Security & Cryptography
  • 13.
    CRYTOGRAPHY Cryptography is science of using mathematics to encrypt decrypt data Cryptography enable you to store sensitive information or transmit it across insecure networks(like internet) so that it cannot be read by anyone except the intended recipient It’s very useful to our Army & Police network to trans for confidential data Network Security & Cryptography
  • 14.
    ENCRYPTION AND DECRYPTION Encryption is a technique that convert’s the original text into an unreadable text The converted original text is called as Cipher text Decryption technique is used to convert the cipher text into the original text Authentication is the verification process which identifies the password & username Digital signature are signed to make the cipher text into unread- able Network Security &Cryptography
  • 15.
    PUBLIC & PRIVATEKEY CRYPTOGRAPHY Public-key cryptography refers to a cryptography system require 2 separate keys, one to lock or encrypt the plaintext & one to unlock or decrypt the cipher text Private-key ,a private or secret key is an encryption decryption key known only to the party or parties that exchange secret massages a problem with PKC is that sender & receiver of message must agree on a common key via alternative secure channel Network Security & Cryptography
  • 16.
    RSA ALGORITHEM Published in 1978 by MIT,US (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1 C=e M mod n m->message ,e->encryption M=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime number’s =m e d mod n Network Security & Cryptography
  • 17.
    PUBLIC KEY SYSTEM->aDemonstration
  • 18.
    CONLUSION This paper describes a technique to successfully hiding and secure the data or massage with the help of Encryption or Decryption technique with the Cryptography And Network Security. However ,this research work & software package provide a good starting point for anyone interested in learning about Cryptography. Network Security & Cryptography
  • 19.
    “for every lockthere is a key……… It is better to keep safe your lock than the key” “ Network Security & Cryptography
  • 20.
    Bibliography References CCNA INTRO-wendell odom NETWORK ESSENTIALS-william stalings Website www.wikipedia.com www.securitymeasure.com Network Security & Cryptography