8. ETWORK SECURITY ->a small intro....
->WHY it is needed?
->WHERE it is needed?
->HOW it is needed?
Network Security& Cryptography
9. OBJECTIVE OF SECURITY
To avoid data threats
To avoid denial of services
To secure our data from masquerades
To safeguard our data’s from traffic analyzer
To not to make massage for the third person available
Network Security & Cryptography
10. PASSWORD AUDITING
Should not be in uppercase
Must have at least 8 characters
Must include alphabets, numeric keys & special
characters
Password should not be the name of the user,
dictionary word etc.,
It must be updated at least once a month
Network Security & Cryptography
11. DATA SECURITY
To monitor the user’s ACCESS CONTROLS
System that are connected in network must be protected
with firewalls
To protect the integrity & availability of the institution’s
information asset’s
Network Security & Cryptography
13. CRYTOGRAPHY
Cryptography is science of using mathematics to
encrypt decrypt data
Cryptography enable you to store sensitive
information or transmit it across insecure networks(like
internet) so that it cannot be read by anyone except the
intended recipient
It’s very useful to our Army & Police network to trans
for confidential data
Network Security & Cryptography
14. ENCRYPTION AND DECRYPTION
Encryption is a technique that convert’s the original
text into an unreadable text
The converted original text is called as Cipher text
Decryption technique is used to convert the cipher text
into the original text
Authentication is the verification process which identifies
the password & username
Digital signature are signed to make the cipher text into unread-
able
Network Security &Cryptography
15. PUBLIC & PRIVATE KEY
CRYPTOGRAPHY
Public-key cryptography refers to a cryptography system
require 2 separate keys, one to lock or encrypt the plaintext
& one to unlock or decrypt the cipher text
Private-key ,a private or secret key is an encryption
decryption key known only to the party or parties that exchange
secret massages a problem with PKC is that sender & receiver of
message must agree on a common key via alternative secure
channel
Network Security & Cryptography
16. RSA ALGORITHEM
Published in 1978 by MIT,US
(1)The main function of this algorithm is providing approach
to public key cryptography & Encryption
(2) In this the CIPHER TEXT are the integer’s between 0 to n-1
C=e M mod n m->message ,e->encryption
M=d C mod n C->cipher text ,d->decryption
=(e M) d mod n n-> integer’s (r*a) r & a are prime number’s
=m e d mod n
Network Security & Cryptography
18. CONLUSION
This paper describes a technique to successfully
hiding and secure the data or massage with the help
of Encryption or Decryption technique with the
Cryptography And Network Security.
However ,this research work & software package
provide a good starting point for anyone interested in
learning about Cryptography.
Network Security & Cryptography
19. “for every lock there is a key………
It is better to keep safe your lock than the key”
“
Network Security & Cryptography