Академический Документы
Профессиональный Документы
Культура Документы
PAPER PRESENTATION ON
CRYPTOGRAPHY&NETWORK SECURITY
CRYPTOGRAPHY
NETWORK SECURITY
VISVODAYA ENGINEERING COLLEGE
KAVALI-524201, S.P.S.R.NELLORE DIST, A.P..
BY
1
CONTENTS:
What is Cryptography?
Types of Cryptography
1. Secret (symmetric) Key Cryptography.
2. Public (asymmetric) Key Cryptography.
3. Hash Functions.
4. Trust Models.
Today’s latest used cryptographic techniques
Different types of threats to network
Network Security can be done by various methods
1. VPN (Virtual Private Networks)
2. Firewalls
3. IPSec.
4. AAA Server.
2
The basic functionality of cryptography is to hide
information. Its operation typically includes two
processes:
Encryption as the process of
transforming information so that it is
unintelligible to an intruder, and
ABSTRACT: Decryption as the process of
transforming the encrypted information
so that it is intelligible again.
The following four areas have been identified as Exchanging or choosing a key pair (e, d)
the framework for secure E-commerce:
Confidentiality: Protecting the data secretly does secure communication
from all but the intended receiver(s). between two persons.
actions.
3
Keys are very critical to the functionality of includes just about any network,
particularly the Internet.
cryptographic algorithms and it is sound
cryptographic practice to change keys Within the context of any
application-to-application
frequently. communication, there are some
specific security requirements,
including:
4
Hash Functions: Uses a either stream ciphers or block
mathematical transformation to ciphers.
irreversibly "encrypt"
Stream ciphers operate on a
information
single bit (byte or computer word)
at a time and implement some form
of feedback mechanism so that the
key is constantly changing. A block
cipher is so- called because the
scheme encrypts one block of data
at a time using the same key on each
block. In general, the same plain
text block will always encrypt to the
same cipher text when using the
same key in a block cipher whereas
the same plaintext will encrypt to
different ciphertext in a stream
cipher.
Implementation of network
security by VPN.
8
A software firewall can be
installed on the computer in your home
that has an Internet connection . This
computer is considered a gateway
because it provides the only point of
access between your home network and
the Internet .
REFERENCES:
Applied Cryptography
- Bruce Schneier
10