Cryptography and Network Security

Published on March 2017 | Categories: Documents | Downloads: 24 | Comments: 0 | Views: 599
of 11
Download PDF   Embed   Report

Comments

Content

 

A PAPER PRESENTATION ON CRYPTOGRAPHY CRYPTOGRAPH Y AND NETWORK  SECURITY

 

Contents: Abstract •



Introduction  Network Security Problems



Key process Techniques



Advanced cryptographic technique 1

 

 •

Steganography

Cryptographic technologies  

Based on layers Based on algorithms



Applications of cryptography



Application of network security



Conclusion

 

CRYPTOGRAPHY

2

 

NETWORK SECURITY   

CRYPTOGRAPHY AND CRYPTOGRAPHY NETWORKSECURITY ABSTRACT “SECURITY” in this

Movie gangsters “case the joint”; soldiers “scout the area”. This is also true in the cyber world. Here the “bad guys” are referred to as intruders, eavesdroppers,

contemporary scenarios has become a

hackers, hijackers, etc. The intruders

more sensible issue either it may be in the

would first have a panoramic view of the

“REAL WORLD” or in the “CYBER 

victims network and then start digging

WORLD”. In the real world as opposed

the holes.

to the cyber world an attack is often  preceded  precede d by information information gathering gathering..

Today the illicit activities of  the hackers are growing by leaps and

3

 

 bounds, viz., viz., “THE RECENT RECENT ATTAC ATTACK  K 

technological prowess has been

ON THE DNS SERVERS HAS

stupendously developed to defy against

CAUSED A LOT OF HULLABALOO

each of the assaults. Our paper covers

ALL OVER OVER THE WORLD”. However,

the ADVANCED technical combats that

fortunately, the antagonists reacted

have been devised all through the way,

 promptly  promp tly and resurr resurrected ected the Internet Internet

thus giving birth to the notion of 

world from the brink of prostration.

“NETWORK -SECURITY”. Various

Since the inception of 

antidotes that are in fact inextricable with

conglomerating Computers with

security issues are – Cryptography,

 Networks  Networ ks the consequence consequence of which

Authentication, Integrity and Non

shrunk the communication

Repudiation, Key Distribution and

world,hitherto, umpteen ilks of security

certification, Access control by

 breaches took their their origin. origin. Tersely Tersely

implementing Firewalls etc.

quoting some security ditherers –  Eavesdropping, Hacking, Hijacking,

To satiate the flaws in the network 

Mapping, Packet Sniffing, 1Spoofing,

security more and more advanced

DoS & DDoS attacks, etc.

security notions are being devised day by

 Newton’s  Newto n’s law says says “Every “Every action has has got

day. Our paper covers a wide wide perspective

an equal but but opposite reaction”. So is the

of such arenas where the contemporary

case with this. Nevertheless the security

cyber world is revolving around viz.

 breaches and eavesdroppe eavesdroppers, rs, the .

Introduction:

 Network  Networ k security security deals with the problems problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing  platform.  platfor m. The action action in question question can can be reduced to operations of access, modification and deletion. Many people  pay great great amounts amounts of lip lip service service to

security but do not want to be bothered with it when it gets in their way. It’s important to build systems and networks in such a way that the user is not constantly reminded of the security system. Users who find security policies and systems to restrictive will find ways around them. It’s important to get their  feed back to understand what can be improved, the sorts of risks that are

4

 

deemed unacceptable, and what has been

Cryptography enables you to store

done to minimize the organizations

sensitive information or transmit it across

exposure to them. Network security

insecure networks (like the internet)

 problems  proble ms can be divided roughly roughly into into

So that it cannot be read by anyone

four intertwined areas:

expect the intended recipient. While

Secrecy, Authentication, Authentication,

cryptography is the science of securing

Nonrepudation, and Integrity control.

data, cryptanalysts are also called



Secrecy has to do with keeping

attackers. Cryptology embraces both

information out of the hands of 

cryptography and cryptanalysis.

unauthorized users. •

Authentication deals with

 

whom you are talking to before revealing sensitive information or  entering into a business deal. •

Nonrepudation deals with signatures.



Integrity control deals with long enterprises like  banking, online online networking. networking.

KEY PROCESSTE PROCESSTECHNIQUES: CHNIQUES: There are three key process techniques. They are: •

Symmetric-key encryption

cryptography, which provides means and



A symmetric-key encryption

methods of converting data into



Hash functions

These problems can be handled by using

unreadable from, so that valid User can access Information at the Destination.

Cryptography  is the science of  using mathematics to encrypt and decrypt

Symmetric-key Symmetric-k ey encryption

data.

(one key):

5

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close