SlideShare una empresa de Scribd logo
1 de 22
INTRODUCTION TO
NETWORK SECURITY
What is a Network?
 A network consists of two or more computers that are linked in order to share resources
exchange files, or allow electronic communications.
 The computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
 The Three Types of Area Networks are:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wide Area Network)
What is a Network Security?
 Network security is any activity designed to protect the usability and integrity of our
network and data.
 It includes both hardware and software technologies.
 It targets a variety of viruses and threats.
 It stops them from entering or spreading on our network.
 Effective network security manages access to the network.
Fundamentals of Network Security:
Network Security refers to three core elements, known as the CIA Triad:
1. Confidentiality (C)
2. Integrity (I)
3. Availability (A)
Types of Network Security:
 Firewall
 Network Segmentation
 Remote Access VPN
 Email Security
 Data Loss Prevention
 Intrusion Prevention System
 Cloud Network Security
 Anti-Virus
Network Security Attack?
Definition:
A network attack can be defined as any method, process, or means used to
maliciously attempt to compromise network security.
Classification of Network Security Attacks:
1. Active Attacks
2. Passive Attacks
Active
Attacks:
 Active Attacks are the attacks in which the attacker tries to modify the information
or creates a false message.
 The prevention of these attacks is quite difficult because of a broad range of
potential physical, network and software vulnerabilities.
Types of Active Attacks:
 Masquerade Attack (Interruption)
 Modification of messages
 Repudiation
 Replay
 Denial of Service (DoS)
Passive
Attacks:
 Passive attacks are the attacks where the attacker indulges in unauthorized
eavesdropping, just monitoring the transmission or gathering information. The
eavesdropper does not make any changes to the data or the system.
Types of Passive
Attacks:
 Traffic Analysis
 Eavesdropping
 Footprinting
 Spying
 War driving
Threats & Vulnerabilities:
 Virus
 Worms
 Trojan (or Trojan horse)
 Spyware
 Adware
 Ransomware
 Malware (or Malicious Software)
Cryptography:
 In Cryptography, the prefix “Crypt” means “hidden” and suffix “graphy” means
“writing”.
 It is a technique of securing information & communications through use of codes
so that only authorized person can understand the information and process it.
Thus, preventing unauthorized access to information.
Cryptography: (Cont.)
 This basic principle is used to protect information obtained from mathematical
concepts and algorithms to convert messages which are hard to decode it.
 These algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on internet and to protect
confidential transactions such as credit card and debit card transactions.
Block Diagram of Cryptography:
Block Diagram of Cryptography
Features of
Cryptography:
 Confidentiality: Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
 Integrity: Information cannot be modified in storage or transition between
sender and intended receiver without any addition to information being
detected.
 Non-Repudiation: The creator/sender of information cannot deny his or her
intention to send information at later stage.
 Authentication: The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
Types of Cryptography:
 In General, there are 3 types of Cryptography:
1. Symmetric Key Cryptography
2. Asymmetric Key Cryptography
3. Hash Functions
1. Symmetric Key Cryptography:
 An encryption system where the sender and receiver of message use a single
common key to encrypt and decrypt messages.
 Symmetric Key Systems are faster and simpler.
 The most popular symmetric key cryptography system is Data Encryption
System (DES).
2. Asymmetric Key Cryptography:
 In this system, a pair of keys is used to encrypt and decrypt information.
 A Public key is used for encryption and a Private key is used for decryption.
Public key and Private Key are different. Even if the public key is known by
everyone, the intended receiver can only decode it because he alone knows the
private key.
3. Hash Functions:
 No usage of any key in this algorithm. A hash value with fixed length is
calculated as per the plain text which makes it impossible for contents of plain
text to be recovered. Many OS use hash functions to encrypt passwords.
Advantages of Cryptography:
1. Confidentiality: Encryption technique can guard the information &
communication from unauthorized revelation and access of information.
2. Authentication: The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
3. Data Integrity: The cryptographic hash functions plays a vital role in assuring
the users about the data integrity.
4. Non-repudiation: The digital signature provides the non-repudiation service to
guard against the dispute that may arise due to denial of passing message by
the sender.
Disadvantages of Cryptography:
 A strongly encrypted, authentic, and digitally signed information can be difficult
to access even for a legitimate user at a crucial time of decision-making.
 High availability cannot be ensured through the use of cryptography.
 Information security of selective access control cannot be realized through the
use of cryptography.
 Cryptography does not guard against the vulnerabilities and threats that emerge
from the poor design of systems, protocols, and procedures.
THANKYOU!!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
IP Security
IP SecurityIP Security
IP Security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Security services
Security servicesSecurity services
Security services
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
System security
System securitySystem security
System security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Steganography
Steganography Steganography
Steganography
 
Dmz
Dmz Dmz
Dmz
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar a Introduction to Network Security

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with securityeSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocolseSAT Journals
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 

Similar a Introduction to Network Security (20)

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Communication security
Communication securityCommunication security
Communication security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
security issue
security issuesecurity issue
security issue
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Network security
Network security Network security
Network security
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Último (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Introduction to Network Security

  • 2. What is a Network?  A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic communications.  The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.  The Three Types of Area Networks are: 1. LAN (Local Area Network) 2. MAN (Metropolitan Area Network) 3. WAN (Wide Area Network)
  • 3. What is a Network Security?  Network security is any activity designed to protect the usability and integrity of our network and data.  It includes both hardware and software technologies.  It targets a variety of viruses and threats.  It stops them from entering or spreading on our network.  Effective network security manages access to the network.
  • 4. Fundamentals of Network Security: Network Security refers to three core elements, known as the CIA Triad: 1. Confidentiality (C) 2. Integrity (I) 3. Availability (A)
  • 5. Types of Network Security:  Firewall  Network Segmentation  Remote Access VPN  Email Security  Data Loss Prevention  Intrusion Prevention System  Cloud Network Security  Anti-Virus
  • 6. Network Security Attack? Definition: A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. Classification of Network Security Attacks: 1. Active Attacks 2. Passive Attacks
  • 7. Active Attacks:  Active Attacks are the attacks in which the attacker tries to modify the information or creates a false message.  The prevention of these attacks is quite difficult because of a broad range of potential physical, network and software vulnerabilities.
  • 8. Types of Active Attacks:  Masquerade Attack (Interruption)  Modification of messages  Repudiation  Replay  Denial of Service (DoS)
  • 9. Passive Attacks:  Passive attacks are the attacks where the attacker indulges in unauthorized eavesdropping, just monitoring the transmission or gathering information. The eavesdropper does not make any changes to the data or the system.
  • 10. Types of Passive Attacks:  Traffic Analysis  Eavesdropping  Footprinting  Spying  War driving
  • 11. Threats & Vulnerabilities:  Virus  Worms  Trojan (or Trojan horse)  Spyware  Adware  Ransomware  Malware (or Malicious Software)
  • 12. Cryptography:  In Cryptography, the prefix “Crypt” means “hidden” and suffix “graphy” means “writing”.  It is a technique of securing information & communications through use of codes so that only authorized person can understand the information and process it. Thus, preventing unauthorized access to information.
  • 13. Cryptography: (Cont.)  This basic principle is used to protect information obtained from mathematical concepts and algorithms to convert messages which are hard to decode it.  These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.
  • 14. Block Diagram of Cryptography: Block Diagram of Cryptography
  • 15. Features of Cryptography:  Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it.  Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.  Non-Repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage.  Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.
  • 16. Types of Cryptography:  In General, there are 3 types of Cryptography: 1. Symmetric Key Cryptography 2. Asymmetric Key Cryptography 3. Hash Functions
  • 17. 1. Symmetric Key Cryptography:  An encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages.  Symmetric Key Systems are faster and simpler.  The most popular symmetric key cryptography system is Data Encryption System (DES).
  • 18. 2. Asymmetric Key Cryptography:  In this system, a pair of keys is used to encrypt and decrypt information.  A Public key is used for encryption and a Private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone, the intended receiver can only decode it because he alone knows the private key.
  • 19. 3. Hash Functions:  No usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many OS use hash functions to encrypt passwords.
  • 20. Advantages of Cryptography: 1. Confidentiality: Encryption technique can guard the information & communication from unauthorized revelation and access of information. 2. Authentication: The cryptographic techniques such as MAC and digital signatures can protect information against spoofing and forgeries. 3. Data Integrity: The cryptographic hash functions plays a vital role in assuring the users about the data integrity. 4. Non-repudiation: The digital signature provides the non-repudiation service to guard against the dispute that may arise due to denial of passing message by the sender.
  • 21. Disadvantages of Cryptography:  A strongly encrypted, authentic, and digitally signed information can be difficult to access even for a legitimate user at a crucial time of decision-making.  High availability cannot be ensured through the use of cryptography.  Information security of selective access control cannot be realized through the use of cryptography.  Cryptography does not guard against the vulnerabilities and threats that emerge from the poor design of systems, protocols, and procedures.