SlideShare a Scribd company logo
1 of 80
Network Security  and  Hacking Techniques Day 5
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ The Linux Based Service s   t hat Mean Business Securing Internet ”
Honeypot ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Goal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Honeypot (Cont…) ,[object Object],Firewall separating the Honeynet into three different networks
Honeypot (Cont…) ,[object Object]
Honeypot (Cont…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security-Cryptography   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security-Cryptography   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions (Conts…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],Encryption Decryption Plaintext Ciphertext Original Plaintext
Example Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simplified Model of Symmetric Encryption
Ingredients ,[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements for Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attacking Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptanalysis plaintext Encrypt Decrypt K e K d C = E Ke (plaintext) Invader Side information plaintext plaintext Cryptanalysis
Cryptanalysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encryption Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Block Cipher Plaintext message B 2 B 1 B 0 encrypt B 3 B 3 B 2 B 1 B 0
Problem ,[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Stream Cipher encrypt XOR K 0 K 1 K 2 K 3 number generator keystream buffer Plaintext stream Encrypted stream
Data Encryption Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Triple DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Advanced Encryption Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES Description ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES Encryption and Decryption
AES Comments (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES Comments (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
AES Encryption Round
AES Comments (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Location of Encryption Devices Encryption Across a Packet Switching Network
Link Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End to End Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Distribution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Automatic Key Distribution for Connection-Oriented Protocols
Automatic Key Distribution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Using Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Without Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Authentication Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Authentication Using a Message Authentication Code
One Way Hash Function ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Authentication Using a One-Way Hash Function
Public Key Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public-Key Cryptography
Public Key Encryption - Operation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steps ,[object Object],[object Object],[object Object],[object Object]
Digital Signature ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signatures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signatures ,[object Object],[object Object],[object Object],[object Object]
Digital Properties ,[object Object],[object Object],[object Object]
Message Digests ,[object Object],[object Object],[object Object]
Digests
Next Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Certificates ,[object Object],S u b jec t D i s t i n g u is he d N a m e,  Pu b l ic  K e y Iss ue r D i s t i n g u is he d N a m e,  Si g n at u r e Pe ri o d  o f  v a li d i t y N o t  Be f o r e Da t e,  No t  A f t e r D ate A d m i ni str a t ive i n fo rma ti o n V er si o n ,  S e r i a l N u mb e r Ex t en d e d I n f or m a t i o n
Certificate Authority ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The RSA Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example of RSA Algorithm
Public-Key Certificate Use
Implementing Network Security using VPNs   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a VPN? ,[object Object],[object Object],[object Object],[object Object],[object Object],Shared Infrastructure Mobile Users and  Telecommuters Remote Access Branch Office Corporate  Headquarters Suppliers, Partners and Customers Intranet Extranet
Deploying VPNs in the 1990s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provider Frame Relay Network CPE CPE DLCI FR Switch DLCI DLCI FR Switch FR Switch
Deploying VPNs in the 21st'Century ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Shared Infrastructure Mobile Users and  Telecommuters Remote Access Branch Office Corporate  Headquarters Suppliers, Partners and Customers Intranet Extranet
VPN Classification Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PE PE CPE CPE Subscriber Site 3 PP-VPN Subscriber Site 2 CPE PE VPN Tunnel VPN Tunnel VPN Tunnel CPE PE PE PE CPE CPE CPE-VPN VPN Tunnel Subscriber Site 1 Subscriber Site 3 Subscriber Site 2 VPN Tunnel VPN Tunnel Subscriber Site 1
CPE- Based VPN’s
CPE-VPNs: L2TP and PPTP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],V.x Modem PPP Dial up Service Provider or 或 VPN L2TP Access Server Dial Access Server L2TP Tunnel Dial Access Server PPTP Access Server PPTP Tunel Dial Access Provider
CPE-VPNs: IPSec Tunnel Mode ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CPE-VPNs: IPSec Example ,[object Object],[object Object],[object Object],[object Object],[object Object],Corporate HQ Branch Office CPE CPE IPsec ESP Tunnel Public Internet
Customer Edge Routers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CE P P PE CE  Customer Edge  CE  CE PE VPN A VPN A VPN B VPN B PE ATM FR ATM FR VPN Site
Provider Edge Routers ,[object Object],[object Object],[object Object],[object Object],CE P P PE CE  CE  CE PE VPN A VPN A VPN B VPN B PE Provider Edge   ATM FR ATM FR
Provider Routers ,[object Object],[object Object],[object Object],CE P P PE CE  CE  CE PE VPN A VPN A VPN B VPN B PE Provider Routers  ATM FR ATM FR
VPN Forwarding   Tables ( VFT ) ,[object Object],[object Object],[object Object],P P P PE 2  VPN A Site 3 VPN A Site 1 VPN B Site2 VPN B Site 1 PE 1 PE 3 VPN A Site2  CE–A1 CE–B1 CE–A3 CE–A2 CE–B2 P A V FT  is created for each site  connected to the PE OSPF OSPF OSPF ATM ATM ATM
VPN  Connection  Tables ( VCT ) ,[object Object],[object Object],Site 1 Site 2 Site 1 Site 2 PE-2 CE- 4 PE-1 CE-2 CE- 2 CE-1 VFT VFT VFT VFT A V CT  is  distributed for each VPN site  to PE s MP-i BGP session  / LDP
 
END

More Related Content

What's hot

Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
koolkampus
 

What's hot (20)

Ch02
Ch02Ch02
Ch02
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
RC 4
RC 4 RC 4
RC 4
 

Viewers also liked

Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
SILPI ROSAN
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
Darwish Ahmad
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 

Viewers also liked (19)

Day3
Day3Day3
Day3
 
Day2
Day2Day2
Day2
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
Day4
Day4Day4
Day4
 
Client Side Honeypots
Client Side HoneypotsClient Side Honeypots
Client Side Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Hacking Techniques
Hacking TechniquesHacking Techniques
Hacking Techniques
 
Day1
Day1Day1
Day1
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 

Similar to Day5

Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
sangusajjan
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 

Similar to Day5 (20)

Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Encryption
EncryptionEncryption
Encryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Moein
MoeinMoein
Moein
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Unit 1
Unit 1Unit 1
Unit 1
 
Ch12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
 
Cns 1
Cns 1Cns 1
Cns 1
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Day5