Introduction to Modern Cryptography Lecture 2 Symmetric Encryption: Stream & Block Ciphers.
Data encryption-ciphers
-
Upload
sufficientgrace -
Category
Education
-
view
178 -
download
0
Transcript of Data encryption-ciphers
![Page 1: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/1.jpg)
![Page 2: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/2.jpg)
Network Security
SECURITY to prevent unauthorized interceptors from accessing data
NETWORK any set of interlinking components resembling a net
![Page 3: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/3.jpg)
Need for Network Security
Theft and misuse of confidential business information… Malicious attacks from Internet- borne viruses… Illegal Data Modification
To prevent..,
![Page 4: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/4.jpg)
Who is vulnerable….?Financial institutions and banksInternet service providersGovernment and defense agenciesContractors to various government agenciesMultinational corporationsANYONE ON THE NETWORK
![Page 5: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/5.jpg)
Means of Protection
Firewalls Strong passwords Suitable Antivirus
software etc..,
Of them , one of the essential aspect for secure data transfer
is “cryptography”
![Page 6: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/6.jpg)
Principles of CryptographyEncryption transforms a message that it becomes unintelligible to any one who does not have the key.
Decryption transforms a message into original message to any one who have the key.
cipher The transformation represented by an encryption function and its corresponding decryption function is called a cipher.
![Page 7: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/7.jpg)
Types of ciphers
Symmetric Key Ciphers
Public Key Ciphers
![Page 8: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/8.jpg)
Symmetric Key Ciphers
![Page 9: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/9.jpg)
Public Key Ciphers
![Page 10: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/10.jpg)
ADVANTAGES
Protects against internal and external network attacks
Ensures privacy of all communications, at any place at any time.
Makes you more reliable.
Controls access to information by accurately identifying users and their systems.
![Page 11: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/11.jpg)
ie.., the network security will be able to function as an immune system.
ATTACK AND BUILD ITSELF TO FIGHT AGAINST TOUGHER ENEMIES
![Page 12: Data encryption-ciphers](https://reader035.fdocuments.in/reader035/viewer/2022062419/55962d651a28ab4a448b4774/html5/thumbnails/12.jpg)