SlideShare a Scribd company logo
1 of 20
It’s Presentations from




         Network Security &Cryptography
Friend
Presented & performed by


              Mr: Rahulprasad yadav
              Mr: Nakul Naikwade
            (Information Technology)




Network Security & cryptography
Network Security & Cryptography
Synopsis
       Network security
        ->Objective of Security
        ->Password Auditing
        ->Data Security
        ->Authentication
      Cryptography
       ->Encryption & Decryption
       ->Public & Private Key Cryptography
       ->Digital Signatures
       ->RSA Algorithm
      Demonstration
      Conclusion
                  Network Security & Cryptography
ETWORK SECURITY ->a small intro....


    ->WHY it is needed?
   ->WHERE it is needed?
    ->HOW it is needed?
    Network Security& Cryptography
OBJECTIVE OF SECURITY
     To avoid data threats

     To avoid denial of services

     To secure our data from masquerades

     To safeguard our data’s from traffic analyzer

    To not to make massage for the third person available




        Network Security & Cryptography
PASSWORD AUDITING
  Should not be in uppercase

  Must have at least 8 characters

  Must include alphabets, numeric keys & special
  characters
  Password should not be the name of the user,
  dictionary word etc.,

  It must be updated at least once a month

       Network Security & Cryptography
DATA SECURITY

 To monitor the user’s ACCESS CONTROLS

 System that are connected in network must be protected
  with firewalls

  To protect the integrity & availability of the institution’s
  information asset’s

            Network Security & Cryptography
RYTOGRAPHY->a small intro……

keywords
    ->cryptography
    ->Encryption &Decryption
   ->Public& Private key cryptography
    ->Digital signature’s
    ->RSA Algorithm


          Network Security & Cryptography
CRYTOGRAPHY

    Cryptography is science of using mathematics to
encrypt decrypt data

     Cryptography enable you to store sensitive
information or transmit it across insecure networks(like
internet) so that it cannot be read by anyone except the
intended recipient

    It’s very useful to our Army & Police network to trans
for confidential data
               Network Security & Cryptography
ENCRYPTION AND DECRYPTION

  Encryption is a technique that convert’s the original
  text into an unreadable text

 The converted original text is called as Cipher text

 Decryption technique is used to convert the cipher text
 into the original text
 Authentication is the verification process which identifies
 the password & username
 Digital signature are signed to make the cipher text into unread-
 able

             Network Security &Cryptography
PUBLIC & PRIVATE KEY
CRYPTOGRAPHY

     Public-key cryptography refers to a cryptography system
require 2 separate keys, one to lock or encrypt the plaintext
& one to unlock or decrypt the cipher text

    Private-key ,a private or secret key is an encryption
decryption key known only to the party or parties that exchange
secret massages a problem with PKC is that sender & receiver of
message must agree on a common key via alternative secure
channel

               Network Security & Cryptography
RSA ALGORITHEM

        Published in 1978 by MIT,US
   (1)The main function of this algorithm is providing approach
    to public key cryptography & Encryption
   (2) In this the CIPHER TEXT are the integer’s between 0 to n-1

C=e M mod n           m->message ,e->encryption
M=d C mod n           C->cipher text ,d->decryption
  =(e M) d mod n      n-> integer’s (r*a) r & a are prime number’s
  =m e d mod n




               Network Security & Cryptography
PUBLIC KEY SYSTEM->a Demonstration
CONLUSION
   This paper describes a technique to successfully
hiding and secure the data or massage with the help
of Encryption or Decryption technique with the
Cryptography And Network Security.
However ,this research work & software package
provide a good starting point for anyone interested in
learning about Cryptography.



            Network Security & Cryptography
“for every lock there is a key………
It is better to keep safe your lock than the key”

                 “




          Network Security & Cryptography
Bibliography

    References
     CCNA INTRO-wendell odom
     NETWORK ESSENTIALS-william stalings
  Website
     www.wikipedia.com
     www.securitymeasure.com


         Network Security & Cryptography

More Related Content

What's hot

8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAhmudulHassan
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemesravik09783
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Brute force attack
Brute force attackBrute force attack
Brute force attackjoycruiser
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSAMohamed Loey
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)Sam Bowne
 

What's hot (20)

Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Cryptography
CryptographyCryptography
Cryptography
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Kerberos
KerberosKerberos
Kerberos
 
MD5
MD5MD5
MD5
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
RC 4
RC 4 RC 4
RC 4
 
AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptx
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Pgp
PgpPgp
Pgp
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 

Viewers also liked

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Network security
Network security Network security
Network security
 
Hash
HashHash
Hash
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Network security & cryptography

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography pptSoma Subbama
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptxRiddhiGupta84
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxNavanathDarwante1
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 

Similar to Network security & cryptography (20)

Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Encryption
EncryptionEncryption
Encryption
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography
CryptographyCryptography
Cryptography
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Network security & cryptography

  • 1. It’s Presentations from Network Security &Cryptography
  • 2.
  • 3.
  • 5. Presented & performed by Mr: Rahulprasad yadav Mr: Nakul Naikwade (Information Technology) Network Security & cryptography
  • 6. Network Security & Cryptography
  • 7. Synopsis Network security ->Objective of Security ->Password Auditing ->Data Security ->Authentication Cryptography ->Encryption & Decryption ->Public & Private Key Cryptography ->Digital Signatures ->RSA Algorithm Demonstration Conclusion Network Security & Cryptography
  • 8. ETWORK SECURITY ->a small intro.... ->WHY it is needed? ->WHERE it is needed? ->HOW it is needed? Network Security& Cryptography
  • 9. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades To safeguard our data’s from traffic analyzer To not to make massage for the third person available Network Security & Cryptography
  • 10. PASSWORD AUDITING Should not be in uppercase Must have at least 8 characters Must include alphabets, numeric keys & special characters Password should not be the name of the user, dictionary word etc., It must be updated at least once a month Network Security & Cryptography
  • 11. DATA SECURITY To monitor the user’s ACCESS CONTROLS System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s Network Security & Cryptography
  • 12. RYTOGRAPHY->a small intro…… keywords ->cryptography ->Encryption &Decryption ->Public& Private key cryptography ->Digital signature’s ->RSA Algorithm Network Security & Cryptography
  • 13. CRYTOGRAPHY Cryptography is science of using mathematics to encrypt decrypt data Cryptography enable you to store sensitive information or transmit it across insecure networks(like internet) so that it cannot be read by anyone except the intended recipient It’s very useful to our Army & Police network to trans for confidential data Network Security & Cryptography
  • 14. ENCRYPTION AND DECRYPTION Encryption is a technique that convert’s the original text into an unreadable text The converted original text is called as Cipher text Decryption technique is used to convert the cipher text into the original text Authentication is the verification process which identifies the password & username Digital signature are signed to make the cipher text into unread- able Network Security &Cryptography
  • 15. PUBLIC & PRIVATE KEY CRYPTOGRAPHY Public-key cryptography refers to a cryptography system require 2 separate keys, one to lock or encrypt the plaintext & one to unlock or decrypt the cipher text Private-key ,a private or secret key is an encryption decryption key known only to the party or parties that exchange secret massages a problem with PKC is that sender & receiver of message must agree on a common key via alternative secure channel Network Security & Cryptography
  • 16. RSA ALGORITHEM Published in 1978 by MIT,US (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1 C=e M mod n m->message ,e->encryption M=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime number’s =m e d mod n Network Security & Cryptography
  • 17. PUBLIC KEY SYSTEM->a Demonstration
  • 18. CONLUSION This paper describes a technique to successfully hiding and secure the data or massage with the help of Encryption or Decryption technique with the Cryptography And Network Security. However ,this research work & software package provide a good starting point for anyone interested in learning about Cryptography. Network Security & Cryptography
  • 19. “for every lock there is a key……… It is better to keep safe your lock than the key” “ Network Security & Cryptography
  • 20. Bibliography References CCNA INTRO-wendell odom NETWORK ESSENTIALS-william stalings Website www.wikipedia.com www.securitymeasure.com Network Security & Cryptography