You are on page 1of 6

PAPER PRESENTATION ON

NETWORK SECURITY
&
CRYPTOGRAPHY

SUBMITTED BY:
G. Manindra S.v.v sujit

III year C.S.E, B.Tech III year C.S.E, B.Tech

E-Mail:manindhra.harry@gmail.com
Phone no: 8008498797

FROM

ADITYA ENGINEERING COLLEGE


SURAMPALEM
ABSTRACT INTRODUCTION
Network security is the Network security deals with
effort to create a secure computing the problems of legitimate messages being
platform, designed so that agents (user / captured and replayed. Network security
programs) cannot perform action that they is the effort to create a secure computing
are not allowed to perform. But can reduced to operations of access,
perform the action that they are allowed modification and deletion. Many people
to. The action in question can be reduced pay great amounts of lip service to
to operations of access, modification and security, but do not want to be bothered
deletion. A network has been defined as with it when it gets in their way. It’s
“any set of interlinking lines resembling a important to build systems and networks
net”. Network can be seen as a subfield of in such a way that the user is platform.
engineering which looks at broader The action in question can be not
security an issue in addition to network constantly reminded of the security
security. This network security also deals system. Users who find security policies
with the problems of legitimate messages and systems to restrictive will find ways
being captured and replayed. And with the around them. It’s important to get their
people trying to deny that they sent certain feed back to understand what can be
messages. Network security is a improved, the sorts of risks that are
complicated subject, historically only deemed unacceptable, and what has been
tackled by well-trained and experienced done to minimize the organizations
experts. However, as more and more exposure to them.
people become “wired”, an increasing Network security problems
number of people need to understand the can be divided roughly into four
basics of security in a network world. intertwined areas: secrecy,
Network security is authentication, nonrepudiation, and
“keeping information private and secure integrity control.
from unauthorized users”. • Secrecy has to do with keeping
Cryptography has a long information out of the hands of
and colorful history. Historically, four unauthorized users.
groups of people have used and • Authentication deals with whom
contributed to the art if cryptography: the you’re talking to before revealing
military, the diplomatic corps, diarists and sensitive information or entering into a
lovers. Of these the military has had the business deal.
most important role and has shaped the • No repudiation deals with
field. Suppose that someone wants to send signatures.
a message to a receiver, and wants to be • Integrity control deals with long
sure that no one else can read the enterprises like banking, online
message. However, there is the possibility networking. These problems can be
that someone else opens the letter and handled by using cryptography, which
hearts the electronic communication. The provides means and methods of
cryptography process explaining through converting data into unreadable form, so
a generalized function is discussed that Valid User can access Information
through which encryption and decryption at the Destination.
is done by the various algorithms like RSA Cryptography is the science of
algorithm, Hash functions and many using mathematics to encrypt and decrypt
cryptographic algorithms. data. Cryptography enables you to store
Cryptography is “The science of sensitive information or transmit it across
protecting data”. insecure networks (like the Internet,
mobiles) so that it cannot be read by • Confidential: Is
anyone except the intended recipient. the process of keeping information
While cryptography is the science of private and Secret so that only the
securing data, cryptanalysis is the science intended recipient is able to understand
of analyzing and breaking secure the information.
communication. Cryptanalysts are also • Authentication:
called attackers. Cryptology embraces Is the process of providing proof of
both cryptography and cryptanalysis. identity of the sender to the the
recipient, so that the recipient can be
assured that the person sending the
information is who and what he or she
claims to be.
• Integrity: Is the method to ensure
that information is not tampered with
during its transit or its storage on the
network. Any unauthorized person
should not be able to tamper with the
Cryptography process information or change the
Information during transit
CRYPTOGRAPHY • Non-repudiation: Is the method to
The term ensure that information cannot be
cryptology has its origin in Greek kryptos disowned. Once the non-repudiation
logos, which means “hidden word.” process is in place, the sender cannot
Cryptography is the science of protecting deny being the originator of the data.
data.

CRYPTOGRAPHY PROCESS: SECURITY ATTACKS:


• • Interruption: In an attack where one or
encrypted known as plain text more of the systems of the organization
Plain text: The messages to be become unusable due to attacks by
cleartext. unauthorized users. This leads to
• Encryption: The process of systems being unavailable for use.
producing cipher text is called • Interception: An unauthorized
Encryption. intercepts the message content and
• Cipher text: Encrypted message is changes it or uses it for malicious
called cipher text. purposes. After this type of attack, the
• Decryption: The process of retrieving message does not remain confidential.
the plain text from the cipher text is • Modification: The content of the
called decryption. message is modified by a third party.
Encryption and decryption This attack affects the integrity of the
usually make use of a key, i.e. the message.
messages to be encrypted are transformed So for maintaining the data
by a function that is parameterized by a secretly while communicating data between
key. The art of breaking ciphers is two persons or two organizations data is to
called cryptanalysis. be converted to other format and the data
The art of devising ciphers is to be transmitted. So now we deal with
(cryptography) and breaking them the Cryptography, which is process of
(cryptanalysis) is collectively known as transmitting data securely without any
cryptology. interruption. Network security is the
FUNDAMENTAL REQUIREMENTS:
security of data transmission in the encryption, public-key encryption is
communication. also sometimes called asymmetric-key
PROCESS TECHNIQUES: encryption. In public-key encryption,
• Basic Process: M is the original the public key can be passed openly
message between the parties or published in a
K enc is encryption key public repository, but the related
M' is the scrambled message private key remains private. Data
K dec is decryption key encrypted with the public key can be
It is “hard” to get M just by knowing decrypted only using the private key.
M' Data encrypted with the private key
E and D are related such that can be decrypted only using the public
E(K enc , M) = M' key. In the below figure, a sender has
D(K dec , M') = M the receiver's public key and uses it to
D(K dec , E(K enc , M)) = M encrypt a message, but only the
Plaintext—M receiver has the related private key
Cipher text—M' used to decrypt the message.
Original Plaintext—M From the above figures it
Decryption function—D can be observed that Encryption is done
Encryption function—E with Public Key and Decryption with
• Symmetric-key Encryption: (one key) another key called Private Key. This is
Symmetric-key encryption, also called shared-key called Public key Cryptography.
encryption or secret-key cryptography
(Private-key method), uses a single key that
both the sender and recipient possess. This
key, used for both encryption and decryption,
is called a secret key (also referred to as a
symmetric key or session key). Symmetric-key
encryption is an efficient method for
encrypting large amounts of data. But the
drawback is to transfer the Key to Receiver,
as it is prone to security risks. Hash functions:
An improvement on the Public Key
scheme is the addition of a one-way hash
function in the process. A one-way hash
function takes variable length input. In this
case, a message of any length, even
thousands or millions of bits and produces a
fixed-length output; say, 160-bits. The hash
function ensures that, if the information is
changed in any way even by just one bit an
entirely different output value is produced.
As long as a secure hash function is used,
there is no way to take someone's signature
Private Key Method from one document and attach it to another,
or to alter a signed message in any way. The
• Public-key encryption: (two-keys) slightest change in a signed document will
Two keys—a public key and a private cause the digital signature verification
key, which are mathematically related process to fail.
—are used in public-key encryption.
To contrast it with symmetric-key
ADVANCED CRYPTOGRAPHIC in use and application. In areas where
TECHNIQUE cryptography and strong encryption are
STEGANOGRAPHY being outlawed, people are using
INTRODUCTION Steganography to avoid these policies and
Over the past couple of year’s to send these messages secretly. Although
Steganography has been the source of a Steganography is become a more
lot of discussion. Steganography is one of advanced it is still a science that is not
the fundamental ways by which data can well known. But it may become very
be kept confidential. Steganography hides popular in the near future.
the existence of a message by transmitting WHAT IS STEGANOGRAPHY?
information through various carriers. Its The word Steganography comes from the
goal is to prevent the detection of secret Greek name “stegnos” (hidden
message. or secret) and “graphy” (writing or
Steganography uses techniques to drawing) and literally means hidden
communicate information in a way that is writing. Steganography uses techniques to
hidden. The most common use of communicate information in a way that is
Steganography is hiding information hidden.
image or sound within the information of The most common use of
another file by using a stegokey such as Steganography is hiding information
password is additional information to image or
further conceal a message.There are many sound within the information of another
reasons why file by using a stegokey such as password
is additional information to further
conceal a message.
WHAT IS STEGANOGRAPHY USED
FOR?
Likemanysecurity tools,Steganography
can be used for variety of
reasons, some good, some not so good.
Steganography can also be used as a way
to make a substitute for a one-way hash
value. Further, Steganography can be
used to tag notes to online images.
CRYPTOGRAPHIC
TECHNOLOGIES
Based on Layers
• Link layer encryption
• Network layer encryption
• IPSEC, VPN, SKIP
• Transport layer
Steganography is used, and is often used
• SSL, PCT (Private
in significant fields. It can be used to
Communication Technology)
communicate with complete freedom even
under conditions that are censured or • Application layer
monitored. • PEM (Privacy Enhanced
The Steganography is an effective Mail)
means of hiding data, there by protecting • PGP (Pretty Good Privacy)
the data from unauthorized or unwanted • SHTTP
viewing. But stego is simply one of many
ways to protect confidentiality of data.
Digital image Steganography is growing
Cryptographic process can be employees for sharing printers.Under
implemented at various layers starting these conditions, security did not get a lot
from the link Layer all the way up to the of attention. But now, as millions of
application layer. The most popular ordinary citizens are using networks for:
encryption scheme is SSL and it is • Banking
implemented at the transport layer. If • Shopping
the encryption is done at the transport • Filling their
layer, any application that is running on tax returns.
the top of the transport layer can be CONCLUSION
protected. Network security is a very
BASED ON ALGORITHMS difficult topic. Everyone has a different
Secret-key encryption idea of what “security” is, and what levels
algorithms (Symmetric of risk are acceptable. The key for
algorithms) building a secure network is to define
• DES (Data Encryption Standard) -- 56 what security means to your organization.
bit key Once that has been defined, everything
• Triple DES --112 bit key that goes on with. The network can be
• IDEA (International Data Encryption evaluated with respect to the policy.
Algorithm) --128bit key Projects and systems can then be broken
Public-key encryption down into their components, and it
algorithms (Asymmetric becomes much simpler to decide whether
algorithms) what is proposed will conflict with your
• Diffie-Hellman security policies and practices.Security is
(DH): Exponentiation is easy but everybody’s business, and only with
everyone’s cooperation, intelligent policy,
computing discrete logarithms from
and consistent practices, will it be
the resulting value is achievable.
practically impossible. • Cryptography protects users by
• RSA: providing functionality for the
Multiplication of two large prime encryption of data and authentication
numbers is easy but factoring the of other users. This technology lets the
resulting product is practically receiver of an electronic message
verify the sender, ensures that a
impossible message can be read only by the
APPLICATIONS OF
intended person, and assures the
CRYPTOGRAPHY
recipient that a message has not be
Defense Services altered in transit. The Cryptography
Secure Data Manipulation Attacking techniques like
E – Commerce Cryptanalysis and Brute Force Attack.
Business Transactions This Paper provides information of
Internet Payment Systems Advance Cryptography Techniques.
User Identification Systems
Access Control .
Data Security.

APPLICATIONS OF NETWORK
SECURITY
Computer networks were
primarily used by university researchers
for sending email, and by corporate

You might also like