A PAPER PRESENTATION ON CRYPTOGRAPHY CRYPTOGRAPH Y AND NETWORK SECURITY
Contents: Abstract •
•
Introduction Network Security Problems
•
Key process Techniques
•
Advanced cryptographic technique 1
•
Steganography
Cryptographic technologies
Based on layers Based on algorithms
•
Applications of cryptography
•
Application of network security
•
Conclusion
CRYPTOGRAPHY
2
NETWORK SECURITY
CRYPTOGRAPHY AND CRYPTOGRAPHY NETWORKSECURITY ABSTRACT “SECURITY” in this
Movie gangsters “case the joint”; soldiers “scout the area”. This is also true in the cyber world. Here the “bad guys” are referred to as intruders, eavesdroppers,
contemporary scenarios has become a
hackers, hijackers, etc. The intruders
more sensible issue either it may be in the
would first have a panoramic view of the
“REAL WORLD” or in the “CYBER
victims network and then start digging
WORLD”. In the real world as opposed
the holes.
to the cyber world an attack is often preceded precede d by information information gathering gathering..
Today the illicit activities of the hackers are growing by leaps and
3
bounds, viz., viz., “THE RECENT RECENT ATTAC ATTACK K
technological prowess has been
ON THE DNS SERVERS HAS
stupendously developed to defy against
CAUSED A LOT OF HULLABALOO
each of the assaults. Our paper covers
ALL OVER OVER THE WORLD”. However,
the ADVANCED technical combats that
fortunately, the antagonists reacted
have been devised all through the way,
promptly promp tly and resurr resurrected ected the Internet Internet
thus giving birth to the notion of
world from the brink of prostration.
“NETWORK -SECURITY”. Various
Since the inception of
antidotes that are in fact inextricable with
conglomerating Computers with
security issues are – Cryptography,
Networks Networ ks the consequence consequence of which
Authentication, Integrity and Non
shrunk the communication
Repudiation, Key Distribution and
world,hitherto, umpteen ilks of security
certification, Access control by
breaches took their their origin. origin. Tersely Tersely
implementing Firewalls etc.
quoting some security ditherers – Eavesdropping, Hacking, Hijacking,
To satiate the flaws in the network
Mapping, Packet Sniffing, 1Spoofing,
security more and more advanced
DoS & DDoS attacks, etc.
security notions are being devised day by
Newton’s Newto n’s law says says “Every “Every action has has got
day. Our paper covers a wide wide perspective
an equal but but opposite reaction”. So is the
of such arenas where the contemporary
case with this. Nevertheless the security
cyber world is revolving around viz.
breaches and eavesdroppe eavesdroppers, rs, the .
Introduction:
Network Networ k security security deals with the problems problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. platfor m. The action action in question question can can be reduced to operations of access, modification and deletion. Many people pay great great amounts amounts of lip lip service service to
security but do not want to be bothered with it when it gets in their way. It’s important to build systems and networks in such a way that the user is not constantly reminded of the security system. Users who find security policies and systems to restrictive will find ways around them. It’s important to get their feed back to understand what can be improved, the sorts of risks that are
4
deemed unacceptable, and what has been
Cryptography enables you to store
done to minimize the organizations
sensitive information or transmit it across
exposure to them. Network security
insecure networks (like the internet)
problems proble ms can be divided roughly roughly into into
So that it cannot be read by anyone
four intertwined areas:
expect the intended recipient. While
Secrecy, Authentication, Authentication,
cryptography is the science of securing
Nonrepudation, and Integrity control.
data, cryptanalysts are also called
•
Secrecy has to do with keeping
attackers. Cryptology embraces both
information out of the hands of
cryptography and cryptanalysis.
unauthorized users. •
Authentication deals with
whom you are talking to before revealing sensitive information or entering into a business deal. •
Nonrepudation deals with signatures.
•
Integrity control deals with long enterprises like banking, online online networking. networking.
KEY PROCESSTE PROCESSTECHNIQUES: CHNIQUES: There are three key process techniques. They are: •
Symmetric-key encryption
cryptography, which provides means and
•
A symmetric-key encryption
methods of converting data into
•
Hash functions
These problems can be handled by using
unreadable from, so that valid User can access Information at the Destination.
Cryptography is the science of using mathematics to encrypt and decrypt