Cryptography and Network Security

Published on March 2017 | Categories: Documents | Downloads: 37 | Comments: 0 | Views: 516
of 11
Download PDF   Embed   Report

Comments

Content

 

A PAPER PRESENTATION ON CRYPTOGRAPHY AND NETWORK  SECURITY FOR  SVITS QUEST 2007   

PRESENTED BY

Naresh kumar .K MCA (II/IV) E-Mail: [email protected] [email protected]. in

Rajeswara Reddy .k  MCA (II/IV) E-Mail [email protected] rajesh_katasani@yahoo. co.in

 

1

 

 Contents: Abstract •



Introduction  Network Security Problems



Key process Techniques



Advanced cryptographic technique 



Steganography

Cryptographic technologies  

Based on layers Based on algorithms



Applications of cryptography



Application of network security



Conclusion

 

CRYPTOGRAPHY

2

 

NETWORK SECURITY   

CRYPTOGRAPHY AND NETWORKSECURITY ABSTRACT “SECURITY” in this

Movie gangsters “case the joint”; soldiers “scout the area”. This is also true in the cyber world. Here the “bad guys” are referred to as intruders,

contemporary scenarios has become a

eavesdroppers, hackers, hijackers, etc.

more sensible issue either it may be in

The intruders would first have a

the “REAL WORLD” or in the “CYBER 

 panoramic view of the victims network 

WORLD”. In the real world as opposed

and then start digging the holes.

to the cyber world an attack is often  preceded by information gathering.

Today the illicit activities of  the hackers are growing by leaps and

3

 

 bounds, viz., “THE RECENT ATTACK 

technological prowess has been

ON THE DNS SERVERS HAS

stupendously developed to defy against

CAUSED A LOT OF HULLABALOO

each of the assaults. Our paper covers

ALL OVER THE WORLD”. However,

the ADVANCED technical combats that

fortunately, the antagonists reacted

have been devised all through the way,

 promptly and resurrected the Internet

thus giving birth to the notion of 

world from the brink of prostration.

“NETWORK -SECURITY”. Various

Since the inception of 

antidotes that are in fact inextricable

conglomerating Computers with

with security issues are – Cryptography,

 Networks the consequence of which

Authentication, Integrity and Non

shrunk the communication

Repudiation, Key Distribution and

world,hitherto, umpteen ilks of security

certification, Access control by

 breaches took their origin. origin. Tersely

implementing Firewalls etc.

quoting some security ditherers –  Eavesdropping, Hacking, Hijacking,

To satiate the flaws in the network 

Mapping, Packet Sniffing, 1Spoofing,

security more and more advanced

DoS & DDoS attacks, etc.

security notions are being devised day

 Newton’s law says “Every action has got

 by day. Our paper covers a wide

an equal but opposite reaction”. So is

 perspective of such arenas where the

the case with this. this. Nevertheless the the

contemporary cyber world is revolving

security breaches and eavesdroppers, the

around viz.

.

Introduction:

 Network security deals with the  problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing  platform. The action in question can be reduced to operations of access, modification and deletion. Many people  pay great amounts of lip service to

security but do not want to be bothered with it when it gets in their way. It’s important to build systems and networks in such a way that the user is not constantly reminded of the security system. Users who find security policies and systems to restrictive will find ways around them. It’s important to get their  feed back to understand what can be improved, the sorts of risks that are

4

 

deemed unacceptable, and what has been

across insecure networks (like the

done to minimize the organizations

internet)

exposure to them. Network security

So that it cannot be read by anyone

 problems can be divided roughly into

expect the intended recipient. While

four intertwined areas:

cryptography is the science of securing

Secrecy, Authentication,

data, cryptanalysts are also called

Nonrepudation, and Integrity control.

attackers. Cryptology embraces both



Secrecy has to do with

cryptography and cryptanalysis.

keeping information out of the hands of unauthorized users. •

Authentication deals with

 

KEY PROCESSTECHNIQUES:

whom you are talking to before revealing sensitive information or entering into a business deal. •

Nonrepudation deals with signatures.



Integrity control deals with long enterprises like

There are three key process techniques. They are:

 banking, online networking.

These problems can be handled by using cryptography, which provides means and



Symmetric-key encryption



A symmetric-key encryption



Hash functions

methods of converting data into unreadable from, so that valid User can access Information at the Destination.

Cryptography is the science of 

Symmetric-key Symmetric-k ey encryption

using mathematics to encrypt and

(one key):

decrypt data. Cryptography enables you to store

There is only one key in this

sensitive information or transmit it

encryption. That is private key. This

5

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close