SlideShare a Scribd company logo
1 of 21
NETWORK SECURITY
1012021:- Chiranjeev Shah
1012025:- Dhaval Bhatia
1012027:- Dipesh Ingawle
Introduction to Cryptography
 Cryptography is a word from Greek where crpyto 
means "hidden, secret"; and graphy means 
"writing" or "study“ . It is the practice and study of 
techniques for secure communication in the 
presence of third parties .
 More generally, it is about constructing and 
analyzing protocols that overcome the influence of 
adversaries and which are related to various 
aspects in information security such as data 
confidentiality, data integrity and authentication.
 
Applications of Cryptography
    Applications of cryptography include ATM 
cards, computer passwords, and electronic 
commerce.
German Lorenz cipher
 machine, used in
World War II to encrypt 
very-high-level 
general staff messages
Cryptography components
ALICE , BOB and EVE
 In cryptography, it is customary to use three
Characters in an information exchange.
 ALICE:- who Needs to send the DATA.
 BOB:- recipient of the DATA
 EVE:- person who somehow disturbs the
communication between Alice and Bob
Categories of cryptography
Symmetric-key cryptography
In symmetric-key cryptography, theIn symmetric-key cryptography, the
same key is used by the sendersame key is used by the sender
(for encryption)(for encryption)
and the receiver (for decryption).and the receiver (for decryption).
The key is shared.The key is shared.
Asymmetric-key cryptography
Keys used in cryptography
Comparison between two categories of cryptography
SECURITY SERVICESSECURITY SERVICES
Network security can provide five services. Four of theseNetwork security can provide five services. Four of these
services are related to the message exchanged using theservices are related to the message exchanged using the
network. The fifth service provides entity authenticationnetwork. The fifth service provides entity authentication
or identification.or identification.
Message ConfidentialityMessage Confidentiality
Message IntegrityMessage Integrity
Message AuthenticationMessage Authentication
Message NonrepudiationMessage Nonrepudiation
Entity AuthenticationEntity Authentication
Message Confidentiality
The concept of how to achieve message confidentiality or privacyThe concept of how to achieve message confidentiality or privacy
has not changed for thousands of years. The message must behas not changed for thousands of years. The message must be
encrypted at the sender site and decrypted at the receiver site.encrypted at the sender site and decrypted at the receiver site.
This can be done using either symmetric-key cryptography orThis can be done using either symmetric-key cryptography or
asymmetric-key cryptography.asymmetric-key cryptography.
Message confidentiality using symmetric keys in two directions
Message confidentiality using asymmetric keys
MESSAGE INTEGRITYMESSAGE INTEGRITY
 Encryption and decryption provide secrecy, or confidentiality,Encryption and decryption provide secrecy, or confidentiality,
but not integrity. However, on occasion we may not even needbut not integrity. However, on occasion we may not even need
secrecy, but instead must have integrity.secrecy, but instead must have integrity.
To preserve the integrity of a document,To preserve the integrity of a document,
both the document and the fingerprint areboth the document and the fingerprint are
needed.needed.
Message and message digest
The message digest needs to be kept secret.The message digest needs to be kept secret.
MESSAGE AUTHENTICATIONMESSAGE AUTHENTICATION
 A hash function per se cannot provide authentication. TheA hash function per se cannot provide authentication. The
digest created by a hash function can detect any modificationdigest created by a hash function can detect any modification
in the message, but not authentication.in the message, but not authentication.
DIGITAL SIGNATUREDIGITAL SIGNATURE
 When Alice sends a message to Bob, Bob needs to check theWhen Alice sends a message to Bob, Bob needs to check the
authenticity of the sender; he needs to be sure that theauthenticity of the sender; he needs to be sure that the
message comes from Alice and not Eve. Bob can ask Alice tomessage comes from Alice and not Eve. Bob can ask Alice to
sign the message electronically. In other words, an electronicsign the message electronically. In other words, an electronic
signature can prove the authenticity of Alice as the sender ofsignature can prove the authenticity of Alice as the sender of
the message. We refer to this type of signature as a digitalthe message. We refer to this type of signature as a digital
signature.signature.
A digital signature needs a public-key system.A digital signature needs a public-key system.
ENTITYAUTHENTICATIONENTITYAUTHENTICATION
 Entity authentication is a technique designedEntity authentication is a technique designed
to let one party prove the identity of anotherto let one party prove the identity of another
party. An entity can be a person, a process, aparty. An entity can be a person, a process, a
client, or a server. The entity whose identityclient, or a server. The entity whose identity
needs to be proved is called the claimant; theneeds to be proved is called the claimant; the
party that tries to prove the identity of theparty that tries to prove the identity of the
claimant is called the verifier.claimant is called the verifier.
 In challenge-response authentication,
the claimant proves that she knows a secret
without revealing it.
KEY MANAGEMENTKEY MANAGEMENT
 We never discussed how secret keys inWe never discussed how secret keys in
symmetric-key cryptography and how publicsymmetric-key cryptography and how public
keys in asymmetric-key cryptography arekeys in asymmetric-key cryptography are
distributed and maintained. In this section,distributed and maintained. In this section,
we touch on these two issues. We firstwe touch on these two issues. We first
discuss the distribution of symmetric keys;discuss the distribution of symmetric keys;
we then discuss the distribution ofwe then discuss the distribution of
asymmetric keys.asymmetric keys.
A session symmetric key between two parties isA session symmetric key between two parties is
used only once.used only once.
Thank You
K. J. SOMAIYA COLLEGE OF ENGINEERING
Electronics Engineering

More Related Content

What's hot

Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
Ganesh Kothe
 

What's hot (19)

Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signature introduction
Digital signature introductionDigital signature introduction
Digital signature introduction
 
Literature review of Digital Signature
Literature review of Digital SignatureLiterature review of Digital Signature
Literature review of Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?What is a Digital Signature? | How Digital Signature work?
What is a Digital Signature? | How Digital Signature work?
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature Brief Introduction
Digital signature Brief IntroductionDigital signature Brief Introduction
Digital signature Brief Introduction
 
Ds over
Ds overDs over
Ds over
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 

Viewers also liked

Viewers also liked (8)

Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Network securities cn

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Ao318992
Ao318992Ao318992
Ao318992
IJMER
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
KuntalSasmal1
 

Similar to Network securities cn (20)

Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Ao318992
Ao318992Ao318992
Ao318992
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!I Did Not Write This Document And Can Prove It!
I Did Not Write This Document And Can Prove It!
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Public private key
Public private keyPublic private key
Public private key
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_e
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Network securities cn

  • 1. NETWORK SECURITY 1012021:- Chiranjeev Shah 1012025:- Dhaval Bhatia 1012027:- Dipesh Ingawle
  • 2. Introduction to Cryptography  Cryptography is a word from Greek where crpyto  means "hidden, secret"; and graphy means  "writing" or "study“ . It is the practice and study of  techniques for secure communication in the  presence of third parties .  More generally, it is about constructing and  analyzing protocols that overcome the influence of  adversaries and which are related to various  aspects in information security such as data  confidentiality, data integrity and authentication.  
  • 5. ALICE , BOB and EVE  In cryptography, it is customary to use three Characters in an information exchange.  ALICE:- who Needs to send the DATA.  BOB:- recipient of the DATA  EVE:- person who somehow disturbs the communication between Alice and Bob
  • 7. Symmetric-key cryptography In symmetric-key cryptography, theIn symmetric-key cryptography, the same key is used by the sendersame key is used by the sender (for encryption)(for encryption) and the receiver (for decryption).and the receiver (for decryption). The key is shared.The key is shared.
  • 9. Keys used in cryptography
  • 10. Comparison between two categories of cryptography
  • 11. SECURITY SERVICESSECURITY SERVICES Network security can provide five services. Four of theseNetwork security can provide five services. Four of these services are related to the message exchanged using theservices are related to the message exchanged using the network. The fifth service provides entity authenticationnetwork. The fifth service provides entity authentication or identification.or identification. Message ConfidentialityMessage Confidentiality Message IntegrityMessage Integrity Message AuthenticationMessage Authentication Message NonrepudiationMessage Nonrepudiation Entity AuthenticationEntity Authentication
  • 12. Message Confidentiality The concept of how to achieve message confidentiality or privacyThe concept of how to achieve message confidentiality or privacy has not changed for thousands of years. The message must behas not changed for thousands of years. The message must be encrypted at the sender site and decrypted at the receiver site.encrypted at the sender site and decrypted at the receiver site. This can be done using either symmetric-key cryptography orThis can be done using either symmetric-key cryptography or asymmetric-key cryptography.asymmetric-key cryptography.
  • 13. Message confidentiality using symmetric keys in two directions
  • 14. Message confidentiality using asymmetric keys
  • 15. MESSAGE INTEGRITYMESSAGE INTEGRITY  Encryption and decryption provide secrecy, or confidentiality,Encryption and decryption provide secrecy, or confidentiality, but not integrity. However, on occasion we may not even needbut not integrity. However, on occasion we may not even need secrecy, but instead must have integrity.secrecy, but instead must have integrity. To preserve the integrity of a document,To preserve the integrity of a document, both the document and the fingerprint areboth the document and the fingerprint are needed.needed.
  • 16. Message and message digest The message digest needs to be kept secret.The message digest needs to be kept secret.
  • 17. MESSAGE AUTHENTICATIONMESSAGE AUTHENTICATION  A hash function per se cannot provide authentication. TheA hash function per se cannot provide authentication. The digest created by a hash function can detect any modificationdigest created by a hash function can detect any modification in the message, but not authentication.in the message, but not authentication.
  • 18. DIGITAL SIGNATUREDIGITAL SIGNATURE  When Alice sends a message to Bob, Bob needs to check theWhen Alice sends a message to Bob, Bob needs to check the authenticity of the sender; he needs to be sure that theauthenticity of the sender; he needs to be sure that the message comes from Alice and not Eve. Bob can ask Alice tomessage comes from Alice and not Eve. Bob can ask Alice to sign the message electronically. In other words, an electronicsign the message electronically. In other words, an electronic signature can prove the authenticity of Alice as the sender ofsignature can prove the authenticity of Alice as the sender of the message. We refer to this type of signature as a digitalthe message. We refer to this type of signature as a digital signature.signature. A digital signature needs a public-key system.A digital signature needs a public-key system.
  • 19. ENTITYAUTHENTICATIONENTITYAUTHENTICATION  Entity authentication is a technique designedEntity authentication is a technique designed to let one party prove the identity of anotherto let one party prove the identity of another party. An entity can be a person, a process, aparty. An entity can be a person, a process, a client, or a server. The entity whose identityclient, or a server. The entity whose identity needs to be proved is called the claimant; theneeds to be proved is called the claimant; the party that tries to prove the identity of theparty that tries to prove the identity of the claimant is called the verifier.claimant is called the verifier.  In challenge-response authentication, the claimant proves that she knows a secret without revealing it.
  • 20. KEY MANAGEMENTKEY MANAGEMENT  We never discussed how secret keys inWe never discussed how secret keys in symmetric-key cryptography and how publicsymmetric-key cryptography and how public keys in asymmetric-key cryptography arekeys in asymmetric-key cryptography are distributed and maintained. In this section,distributed and maintained. In this section, we touch on these two issues. We firstwe touch on these two issues. We first discuss the distribution of symmetric keys;discuss the distribution of symmetric keys; we then discuss the distribution ofwe then discuss the distribution of asymmetric keys.asymmetric keys. A session symmetric key between two parties isA session symmetric key between two parties is used only once.used only once.
  • 21. Thank You K. J. SOMAIYA COLLEGE OF ENGINEERING Electronics Engineering