Networksecurity Nd Cryptography
-
Upload
john-guerrero -
Category
Documents
-
view
218 -
download
0
Transcript of Networksecurity Nd Cryptography
-
7/30/2019 Networksecurity Nd Cryptography
1/20
NETWORK SECURITY
& CRYPTOGRAPHY
PresentedBy
B.KRISHNATEJA
B.VENUKUMAR
-
7/30/2019 Networksecurity Nd Cryptography
2/20
Introduction
Cryptography
Cryptographic Algorithms
Quantum Cryptography
Advantages of cryptography
Disadvantages ofcryptography
Conclusion
-
7/30/2019 Networksecurity Nd Cryptography
3/20
What is a NETWORK ?
collection of systems connected
together.
Why do Network Security?
As computer systemsbecame more complicated
there was an increasing need for security
Network security is becoming more andmore crucial as the volume of data
being exchanged on the internet increases
-
7/30/2019 Networksecurity Nd Cryptography
4/20
Network Security problems can be
roughly divided into 4closely intertwined
Areas
Privacy
Authentication
Data integrity
Non-repudiation
-
7/30/2019 Networksecurity Nd Cryptography
5/20
Cryptography, is the one of the methods to
provide security.
It involves the use of a cryptographic algorithm
used in the encryption and decryption process.
It works in combination with the key to encrypt
the plain text, and also to decrypt the cipher
text
Cryptography
-
7/30/2019 Networksecurity Nd Cryptography
6/20
Encryption and decryption:-
Encryption means the transformation ofdata by the use of Cryptography to
produce unintelligible data to ensure
confidentiality
The inverse function of encryption is
called as decryption
-
7/30/2019 Networksecurity Nd Cryptography
7/20
Strong
cryptography:-
The result of strong cryptography iscipher text is very difficult to decipher
without possession of the appropriatedecoder tool
How does cryptography works?
A cryptography algorithm, or
Cipher, is a mathematical function used inthe encryption and decryption process.
-
7/30/2019 Networksecurity Nd Cryptography
8/20
Cryptographic
Algorithms:-
Cryptographic algorithms can implementedeither hardware (for speed), or in software (forflexibility). There are 3 classes of algorithms
they are:1. Conventional Cryptography (Symmetric
algorithms, Private keys)
2. Public key Cryptography (Asymmetricalgorithms, public keys)
3. Hash function algorithm.
-
7/30/2019 Networksecurity Nd Cryptography
9/20
-
7/30/2019 Networksecurity Nd Cryptography
10/20
In conventional cryptography, also called secret-key or
symmetric-key encryption, one key is used both for
encryption and decryption. The Data Encryption
Standard (DES) is an example of a conventionalcryptosystem that is widely employed by the U.S.
government.
-
7/30/2019 Networksecurity Nd Cryptography
11/20
public key, which encrypts data, and a corresponding private
key (secret key) for decryption.
It is computationally infeasible to deduce the private key from the
public key.
Anyone who has a public key can encrypt information but cannot
decrypt it. Only the person who has the corresponding private key
can decrypt the information.
-
7/30/2019 Networksecurity Nd Cryptography
12/20
Basically handwritten signature is easy tocounterfeit. A digital signature is superior to ahandwritten signature in that it is nearly impossible to
counterfeit, plus it attests to the contents of theinformation as well as to the identity of the signer.
-
7/30/2019 Networksecurity Nd Cryptography
13/20
Hash functions
A one-way hash function takes
variable-length input in this case, a message of
any length, even thousands or millions of bits
and produces a fixed-length output
PGP uses a cryptographically strong hash
function on the plaintext the user is signing.
This generates a fixed-length data item knownas a message digest
-
7/30/2019 Networksecurity Nd Cryptography
14/20
-
7/30/2019 Networksecurity Nd Cryptography
15/20
it is based on usage of particles/waves of light(PHOTONS) and their intrinsic properties to developan unbreakable cryptographic system
Eaves dropping concept System works on the principle of Heisenberg principle
-
7/30/2019 Networksecurity Nd Cryptography
16/20
Advantages:-
Based on natural quantum laws
Computational Complexity Expires.
There is no expiration date on thesecurity of QC messages.
Perfect for public communication
Easy to detect an eavesdropper.
-
7/30/2019 Networksecurity Nd Cryptography
17/20
Disadvantages
Severally limited by technology
Practical systems are limited by distance.
Photon emitters and detectors are farfrom perfect, causing a lot of errors.
Most protocols require a classical
channel.
-
7/30/2019 Networksecurity Nd Cryptography
18/20
Conclusion
As the proverb says that Even a crow
can peck an elephant which is stuck in the mud. Even
though we are providing high security by cryptographythere are many pitfalls in it also. Nothing in the world is
100% secured.
Cryptography is one of the way to providenetwork security but it is not only the path to achieve
network security.
-
7/30/2019 Networksecurity Nd Cryptography
19/20
Any
?
-
7/30/2019 Networksecurity Nd Cryptography
20/20
THANK YOU