SlideShare una empresa de Scribd logo
1 de 39
• A specialized field in computer networking that involves securing a computer
network infrastructure.
• handled by a network administrator or system administrator who implements the
security policy, network software and hardware needed to protect.
• prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources.
• covers both, public and private networks, that are used in
 everyday jobs
 conducting transactions and communications among businesses
 government agencies individuals.
• Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
• Provide authentication and access control for resources
• Guarantee availability of resources
• Authentication
 The process of verifying the identity of a user
 Password, Key, smart card or other device, fingerprint, voice, or retinal scans
• Access control
 Limits the access to authorized users, resources provided by the application
• Confidentiality
 Protects against unauthorized release of message content
• Integrity
 Guarantees that a message is received as sent
• Non-repudiation
 Protects against sender/receiver denying sending/receiving a message
 Someone cannot deny something
• Availability
 Guarantees that the system services are always available when needed
• Security Audit
 Keeps track of transaction for late use (diagnostic, alarms…)
• Key Management
 Allows to negotiate, setup and maintain keys between communicating entities
• Cryptography is the science and art of
transforming messages to make them secure and
immune to attack.
• The word ‘cryptography’ was coined by combining
two Greek words, ‘Krypto’ meaning hidden and
‘graphene’ meaning writing.
• an implementation of cryptographic techniques and their accompanying
infrastructure to provide information security services.
• A cryptosystem is also referred to as a cipher system.
The objective of cryptosystem
at the end of the process, only
the sender and the receiver will
know the plaintext.
• Plaintext
 It is the data to be protected during transmission.
• Encryption Algorithm
 a cryptographic algorithm that takes plaintext and an encryption key as input
and produces a ciphertext.
• Ciphertext
 scrambled version of the plaintext produced by the encryption algorithm using a
specific the encryption key.
• Decryption Algorithm
 a cryptographic algorithm that takes a ciphertext and a decryption key as input,
and outputs a plaintext.
• Encryption Key
 a value that is known to the sender.
 The sender inputs the encryption key into the encryption
algorithm along with the plaintext in order to
compute the ciphertext.
• Brute force
 Try every possible key until plain text
is achieved
• Decryption Key
 a value that is known to the receiver.
 It is related to the encryption key, but is not always identical to it.
 The receiver inputs the decryption key into the decryption algorithm along with
the ciphertext in order to compute the plaintext.
• Interceptor (an attacker)
 an unauthorized entity who attempts to determine the plaintext.
 can see the ciphertext and may know the decryption algorithm.
 He, however, must never know the decryption key.
• Symmetric Key Algorithms (AES , DES, IDEA)
• Public–Key Algorithms or Asymmetric cryptography
• Digital Signatures
• Symmetric-key algorithms
 use the same cryptographic keys for both encryption of plaintext and decryption
of ciphertext.
 keys may be identical or there may be a simple transformation to go between the
two keys.
 the keys, represent a shared secret between two or more parties that can be
used to maintain a private information link.
 same key is one of the main drawbacks of symmetric key encryption.
• Symmetric-key Cryptography
• Substitution Ciphers
A substitution technique is one in which the letters/number/symbols of plaintext
are replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
• Caesar Cipher
• Replace each letter with the letter standing x place further
• Example: (x=3)
• Plain : meet me after the party
• Cipher : phhw ph diwhu wkh sduwb
• If Key space : 25 • Brut force attack : try 25 possibilities
• TRANSPOSITION CIPHER
In the transposition technique the positions of letters/numbers/symbols in
plaintext is changed with one another.
Plain text : MEET ME AFTER PARTY
Cipher text : TEMEEMEFAPTRYRAT
KEY USED : 421635
• Types of Symmetric-key algorithms
 Symmetric key algorithms can be divided into two categories: block and stream.
 Block algorithms encrypt data a block (many bytes) at a time, while stream
algorithms encrypt byte by byte (or even bit by bit).
• Examples of Symmetric algorithms
 AES (Advanced Encryption Standard)
 DES (Digital Encryption Standard)
 IDEA (International Data Encryption Algorithm) and etc.
• Other terms for symmetric-key encryption
 secret-key
 single-key
 shared-key
 one-key
 private-key
• Based on mathematical algorithms
• Asymmetric
 Use two separate keys
• Ingredients
 Plain text
 Encryption algorithm
 Public and private key
 Cipher text
 Decryption algorithm
• Encryption
• Public Key Encryption - Authentication
• Public Key Encryption – Operation
 One key made public
o Used for encryption
 Other kept private
o Used for decryption
 Infeasible to determine decryption key given encryption key and algorithm
 Either key can be used for encryption, the other for decryption
• Public Key Encryption – Steps
 User generates pair of keys
 User places one key in public domain
 To send a message to user, encrypt using public key
 user decrypts using private key
• RSA Algorithm
• n = pq, where p and q are distinct primes.
• phi, φ = (p-1)(q-1)
• e < n such that gcd(e, phi)=1
• d = e-1 mod phi.
• c = me mod n, 1<m<n.
• m = cd mod n.
• A very simple example of RSA encryption
• A very simple example of RSA encryption
• Difference
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1. The same algorithm with the same key is
used for encryption and decryption.
2. The key must be kept secret.
3. It may be impossible or at least impractical
to decipher a message if no other
information is available.
1. One algorithm is used for encryption and
decryption with a pair of keys, one for
encryption and one for decryption.
2. One of the two keys must be kept secret.
3. It may be impossible or at least impractical
to decipher a message if no other
information is available.
• not to be confused with a digital certificate
• it is a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document.
• Sender encrypts message with their private key
• Receiver can decrypt using senders public key
• This authenticates sender, who is only person who has the matching key
• Does not give privacy of data
 Decrypt key is public
• How digital signatures work
o Digital signatures are based on public key cryptography
o such as RSA, one can generate two keys that are mathematically linked: one
private and one public.
• How to create a digital signature
o signing software (such as an email program) creates a one-way hash of the
electronic data to be signed.
o The private key is then used to encrypt the hash. along with other information,
such as the hashing algorithm -- is the digital signature.
o The reason for encrypting the hash instead of the entire message or document
is that a hash function can convert an arbitrary input into a fixed length value,
which is usually much shorter. This saves time since hashing is much faster than
signing.
Message
+
Signature
Hash
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
Message
+
signature
COMPARE
Calculated
HashMessage
Sender Receiver
Hash
Sent thru’ Internet
if
OK
Signatures
verified
• Private key protection
 The Private key generated is to be protected and kept secret.
The responsibility of the secrecy of the key lies with the
owner.
 The key is secured using
 PIN Protected soft token
 Smart Cards
 Hardware Tokens
• Most modern email programs
 the use of digital signatures and digital certificates making it easy to sign any
outgoing emails and validate digitally signed incoming messages.
• Digital signatures are also used extensively to provide
 proof of authenticity
 data integrity
 non-repudiation of communications and transactions conducted over the
Internet.
What are the benefits of digital signatures?
 Authentication and Integrity
Paper signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature independent
of the document
Signature depends on
the contents of the
document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
V/s
Network security

Más contenido relacionado

La actualidad más candente

BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
limsh
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
Neelabja Manna
 
20 security
20 security20 security
20 security
abiy2004
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 

La actualidad más candente (20)

CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
BAIT1103 Chapter 2
BAIT1103 Chapter 2BAIT1103 Chapter 2
BAIT1103 Chapter 2
 
Network security
Network securityNetwork security
Network security
 
Cryptography
CryptographyCryptography
Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
20 security
20 security20 security
20 security
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography
Cryptography Cryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 

Destacado

Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 

Destacado (10)

Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Network security
Network securityNetwork security
Network security
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
Industry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter BrownIndustry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter Brown
 
Network security
Network securityNetwork security
Network security
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network security
Network security Network security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Similar a Network security

Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
anbersattar
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 

Similar a Network security (20)

groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Security
SecuritySecurity
Security
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Network security

  • 1.
  • 2. • A specialized field in computer networking that involves securing a computer network infrastructure. • handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect. • prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
  • 3. • covers both, public and private networks, that are used in  everyday jobs  conducting transactions and communications among businesses  government agencies individuals.
  • 4. • Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. • Provide authentication and access control for resources • Guarantee availability of resources
  • 5. • Authentication  The process of verifying the identity of a user  Password, Key, smart card or other device, fingerprint, voice, or retinal scans • Access control  Limits the access to authorized users, resources provided by the application • Confidentiality  Protects against unauthorized release of message content • Integrity  Guarantees that a message is received as sent
  • 6. • Non-repudiation  Protects against sender/receiver denying sending/receiving a message  Someone cannot deny something • Availability  Guarantees that the system services are always available when needed • Security Audit  Keeps track of transaction for late use (diagnostic, alarms…) • Key Management  Allows to negotiate, setup and maintain keys between communicating entities
  • 7.
  • 8. • Cryptography is the science and art of transforming messages to make them secure and immune to attack. • The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.
  • 9. • an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. • A cryptosystem is also referred to as a cipher system. The objective of cryptosystem at the end of the process, only the sender and the receiver will know the plaintext.
  • 10. • Plaintext  It is the data to be protected during transmission. • Encryption Algorithm  a cryptographic algorithm that takes plaintext and an encryption key as input and produces a ciphertext. • Ciphertext  scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key.
  • 11. • Decryption Algorithm  a cryptographic algorithm that takes a ciphertext and a decryption key as input, and outputs a plaintext. • Encryption Key  a value that is known to the sender.  The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext. • Brute force  Try every possible key until plain text is achieved
  • 12. • Decryption Key  a value that is known to the receiver.  It is related to the encryption key, but is not always identical to it.  The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext. • Interceptor (an attacker)  an unauthorized entity who attempts to determine the plaintext.  can see the ciphertext and may know the decryption algorithm.  He, however, must never know the decryption key.
  • 13.
  • 14. • Symmetric Key Algorithms (AES , DES, IDEA) • Public–Key Algorithms or Asymmetric cryptography • Digital Signatures
  • 15.
  • 16. • Symmetric-key algorithms  use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.  keys may be identical or there may be a simple transformation to go between the two keys.  the keys, represent a shared secret between two or more parties that can be used to maintain a private information link.  same key is one of the main drawbacks of symmetric key encryption.
  • 18. • Substitution Ciphers A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6 • Caesar Cipher • Replace each letter with the letter standing x place further • Example: (x=3) • Plain : meet me after the party • Cipher : phhw ph diwhu wkh sduwb • If Key space : 25 • Brut force attack : try 25 possibilities
  • 19. • TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another. Plain text : MEET ME AFTER PARTY Cipher text : TEMEEMEFAPTRYRAT KEY USED : 421635
  • 20. • Types of Symmetric-key algorithms  Symmetric key algorithms can be divided into two categories: block and stream.  Block algorithms encrypt data a block (many bytes) at a time, while stream algorithms encrypt byte by byte (or even bit by bit).
  • 21. • Examples of Symmetric algorithms  AES (Advanced Encryption Standard)  DES (Digital Encryption Standard)  IDEA (International Data Encryption Algorithm) and etc. • Other terms for symmetric-key encryption  secret-key  single-key  shared-key  one-key  private-key
  • 22.
  • 23. • Based on mathematical algorithms • Asymmetric  Use two separate keys • Ingredients  Plain text  Encryption algorithm  Public and private key  Cipher text  Decryption algorithm
  • 25. • Public Key Encryption - Authentication
  • 26. • Public Key Encryption – Operation  One key made public o Used for encryption  Other kept private o Used for decryption  Infeasible to determine decryption key given encryption key and algorithm  Either key can be used for encryption, the other for decryption
  • 27. • Public Key Encryption – Steps  User generates pair of keys  User places one key in public domain  To send a message to user, encrypt using public key  user decrypts using private key
  • 28. • RSA Algorithm • n = pq, where p and q are distinct primes. • phi, φ = (p-1)(q-1) • e < n such that gcd(e, phi)=1 • d = e-1 mod phi. • c = me mod n, 1<m<n. • m = cd mod n.
  • 29. • A very simple example of RSA encryption
  • 30. • A very simple example of RSA encryption
  • 31. • Difference SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY 1. The same algorithm with the same key is used for encryption and decryption. 2. The key must be kept secret. 3. It may be impossible or at least impractical to decipher a message if no other information is available. 1. One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption. 2. One of the two keys must be kept secret. 3. It may be impossible or at least impractical to decipher a message if no other information is available.
  • 32.
  • 33. • not to be confused with a digital certificate • it is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. • Sender encrypts message with their private key • Receiver can decrypt using senders public key • This authenticates sender, who is only person who has the matching key • Does not give privacy of data  Decrypt key is public
  • 34. • How digital signatures work o Digital signatures are based on public key cryptography o such as RSA, one can generate two keys that are mathematically linked: one private and one public. • How to create a digital signature o signing software (such as an email program) creates a one-way hash of the electronic data to be signed. o The private key is then used to encrypt the hash. along with other information, such as the hashing algorithm -- is the digital signature. o The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
  • 35. Message + Signature Hash Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key Message + signature COMPARE Calculated HashMessage Sender Receiver Hash Sent thru’ Internet if OK Signatures verified
  • 36. • Private key protection  The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner.  The key is secured using  PIN Protected soft token  Smart Cards  Hardware Tokens
  • 37. • Most modern email programs  the use of digital signatures and digital certificates making it easy to sign any outgoing emails and validate digitally signed incoming messages. • Digital signatures are also used extensively to provide  proof of authenticity  data integrity  non-repudiation of communications and transactions conducted over the Internet. What are the benefits of digital signatures?  Authentication and Integrity
  • 38. Paper signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free V/s