Вы находитесь на странице: 1из 11

A

PAPER PRESENTATION ON

CRYPTOGRAPHY&NETWORK SECURITY

CRYPTOGRAPHY

NETWORK SECURITY
VISVODAYA ENGINEERING COLLEGE
KAVALI-524201, S.P.S.R.NELLORE DIST, A.P..

BY

NAME: N.MAHESH NAME: SK.GAYAZ BASHA


BRANCH: IT (3rd B.TECH) BRANCH: IT (3rd B.TECH)
MAIL: mahikavali@gmail.com MAIL:
gayazbasha1208@gmail.com

1
CONTENTS:

 What is Cryptography?
 Types of Cryptography
1. Secret (symmetric) Key Cryptography.
2. Public (asymmetric) Key Cryptography.
3. Hash Functions.
4. Trust Models.
 Today’s latest used cryptographic techniques
 Different types of threats to network
 Network Security can be done by various methods
1. VPN (Virtual Private Networks)
2. Firewalls
3. IPSec.
4. AAA Server.

2
The basic functionality of cryptography is to hide
information. Its operation typically includes two
processes:
 Encryption as the process of
transforming information so that it is
unintelligible to an intruder, and
ABSTRACT:  Decryption as the process of
transforming the encrypted information
so that it is intelligible again.

The following figure illustrates these processes.

E-commerce on the worldwide web is a rapidly

growing and proliferating field. But there are

several differences between commerce in the real

world and on the Internet, and perhaps the most

fundamental issue is that of trust and security. In

order to build secure E-commerce applications, we


 The information in its original form is
need to establish a definition of various security known as plain text, and the encrypted

requirements. message is called cipher text.

The following four areas have been identified as  Exchanging or choosing a key pair (e, d)
the framework for secure E-commerce:
 Confidentiality: Protecting the data secretly does secure communication
from all but the intended receiver(s). between two persons.

 Authentication: Proving one's identity.


 Integrity: Ensuring no unauthorized  The security lies in the fact that the

alteration of data. mathematical function and the key are only

 Non-repudiation: Preventing an entity bound to the sender and receiver, not to

from denying previous commitments or anybody else.

actions.
3
 Keys are very critical to the functionality of includes just about any network,
particularly the Internet.
cryptographic algorithms and it is sound
cryptographic practice to change keys Within the context of any
application-to-application
frequently. communication, there are some
specific security requirements,
including:

There are 2 important hash functions:


 Authentication: The
process of proving one's
identity. (The primary forms
of host-to-host
 MD5
authentication on the
 SHA-1 Internet today are name-
based or address-based, both
Cryptography and Network of which are notoriously
weak.)
Security
 Privacy/confidentiality
Does security provide
: Ensuring that no one can
some very basic protections that we
read the message except the
are naive to believe that we don't
intended receiver.
need? During this time when the
Internet provides essential  Integrity: Assuring the
communication between tens of receiver that the received
millions of people and is being message has not been altered
increasingly used as a tool for in any way from the original.
commerce, security becomes a
tremendously important issue to  Non-repudiation: A
deal with. mechanism to prove that the
There are many aspects to sender really sent this
security and many applications, message. Cryptography,
Ranging from secure commerce and then, not only protects data
payments to private from theft or alteration, but
communications and protecting passwords. can also be used for user
One essential aspect for authentication.
Secure communications is that of
cryptography. The three types of
cryptographic algorithms that will
Cryptography is the science of be discussed are (Figure 1):
writing in secret code and is an ancient art.
The first documented use of cryptography
 Secret Key Cryptography
in writing dates back to circa 1900 B.C. (SKC): Uses a single key for
when an Egyptian scribe used non-standard both encryption and decryption
hieroglyphs in an inscription.
 Public Key Cryptography
In data and (PKC): Uses one key for
telecommunications, cryptography encryption and another for
is necessary when communicating decryption
over any untrusted medium, which

4
 Hash Functions: Uses a either stream ciphers or block
mathematical transformation to ciphers.
irreversibly "encrypt"
Stream ciphers operate on a
information
single bit (byte or computer word)
at a time and implement some form
of feedback mechanism so that the
key is constantly changing. A block
cipher is so- called because the
scheme encrypts one block of data
at a time using the same key on each
block. In general, the same plain
text block will always encrypt to the
same cipher text when using the
same key in a block cipher whereas
the same plaintext will encrypt to
different ciphertext in a stream
cipher.

2. Public key cryptography


1. Secret Key Cryptography Modern PKC was first
described publicly by Stanford
University professor Martin
Hellman and graduate student
With secret key Whitfield Diffie in 1976. Their
cryptography, a single key is used paper described a two-key crypto
for both encryption and decryption. system in which two parties could
engage in a secure communication
As shown in Figure the sender uses over a non-secure communications
the key (or some set of rules) to channel without having to share a
encrypt the plain text and sends the secret key.
ciphertext to the receiver. The
receiver applies the same key (or Generic PKC employs two keys that
ruleset) to decrypt the message and are mathematically
recover the plain text. Because a related although knowledge of one key
single key is used for both does not allow someone to
functions, secret key cryptography easily determine the other key. One key is
is also called symmetric encryption. used to encrypt the
plaintext and the other key is used to
With this form of decrypt the ciphertext. The
cryptography, it is obvious that the important point here is that it does not
key must be known to both the matter which key is applied
sender and the receiver; that, in fact, first, but that both keys are required for the
is the secret. The biggest difficulty process to work (Figure
with this approach, of course, is the 1B). Because a pair of keys are required,
distribution of the key. this approach is also called
asymmetric cryptography
3. Hash Functions
Secret key cryptography schemes
are generally categorized as being Hash functions, also called
message digests and one-way
5
encryption, are algorithms that, in Types of authority
some sense, use no key (Figure 1C).
 Establish identity: Associate, or
Instead, a fixed-length hash value is
bind, a public key to an
computed based upon the plaintext
individual, organization,
that makes it impossible for either
corporate position, or other
the contents or length of the
entity.
plaintext to be recovered. Hash
algorithms are typically used to  Assign authority: Establish
provide a digital fingerprint of a what actions the holder may or
file's contents, often used to ensure may not take based upon this
that the file has not been altered by certificate.
an intruder or virus. Hash functions
are also commonly employed by  Secure confidential
many operating systems to encrypt information (e.g., encrypting
passwords. Hash functions, then, the session's symmetric key for
help preserve the integrity of a file. data confidentiality).

4. TRUST MODELS Today’s latest used cryptographic


techniques:
Secure use of cryptography
requires trust. While secret key Hash algorithms that are in common use
cryptography can ensure message today include:
confidentiality and hash codes can
ensure integrity, none of this works  Message Digest (MD) algorithms
without trust. In SKC, PKC solved  Secure Hash Algorithm (SHA)
the secret distribution problem,
There are a number of trust Pretty Good Privacy (PGP)
models employed by various Pretty Good Privacy (PGP) is one of
cryptographic schemes. today's most widely used public key
cryptography programs. PGP can be used to
 The web of trust employed by sign or encrypt e-mail messages with mere
Pretty Good Privacy (PGP) click of the mouse.
users, who hold their own set of
trusted public keys. Depending upon the version
of PGP, the software uses SHA or
 Kerberos, a secret key MD5 for calculating the message
distribution scheme using a hash; CAST, Triple-DES, or IDEA
trusted third party. for encryption; and RSA or
DSS/Diffie-Hellman for key
 Certificates, which allow a set of exchange and digital signatures.
trusted third parties to And much more techniques used.
authenticate each other and, by
implication, each other's users. Time is the only true test of good
cryptography; any cryptographic scheme
Each of these trust models differs in that stays in use year after year is most
complexity, general applicability, likely a good one. The strength of
scope, and scalability. cryptography lies in the choice (and
management) of the keys; longer keys will
resist attack better than shorter keys
Encrypt and decrypt messages using
any of the classical substitution ciphers
6
discussed, both by hand and with the sends you the same e-mail hundreds or
assistance of programs. thousands of times until your e-mail
Understand the concepts of language system cannot accept any more
redundancy and utility distance. messages .

Different types of threats to  Macros - To simplify complicated


network: procedures , many applications allow
you to create a script of commands that
the application can run . This script is
 Application backdoors - Some
known as a macro . Hackers have taken
programs have special features that allow
advantage of this to create their own
for remote access . Others contain bugs
macros that , depending on the
that provide a backdoor , or hidden
application , can destroy your data or
access , that provides some level of
crash your computer .
control of the program.
 Viruses - Probably the most well-known
 SMTP session hijacking - SMTP is
threat is computer viruses . A virus is a
the most common method of Sending e-
small program that can copy itself to
mail over the Internet . By gaining
other computers . This way it can
access to a list of e- mail Addresses , a
spread quickly from one system to the
person can send unsolicited junk e-mail
next . Viruses range from harmless
( spam ) to thousands of users . This is
messages to erasing all of your data .
done quite often by redirecting the e-
mail through the SMTP server of an
 Spam - Typically harmless but always
unsuspecting host , making the actual
annoying , spam is the electronic
sender of the spam difficult to trace.
equivalent of junk mail . Spam can be
 Operating system bugs - Like
dangerous though . Quite often it
applications , some operating systems
contains links to Web sites . Be careful
Have backdoors . Others provide remote
of clicking on these because you may
access with insufficient security
accidentally accept a cookie that
controls or have bugs that an
provides a backdoor to your computer.
experienced hacker can take advantage of
.
 Redirect bombs - Hackers can
 Denial of service - You have probably use ICMP to change ( redirect )
heard this phrase used in news reports the Path information takes by
on the attacks on major Web sites . This sending it to a different router .
type of attack is nearly Impossible to This is one of the ways that a
counter . What happens is that the denial of service attack is set up.
hacker sends a request to the server to
connect to it . When the server responds Network security can be
with an acknowledgement and tries to done by various methods.
establish a session , it cannot find the
system that made the request . By
inundating a server with these 1. Virtual Private Network:
unanswerable session requests , a hacker
causes the server to slow to a crawl A virtual private network ( VPN )
or eventually crash. is a way to use a public telecommunication
infrastructure , such as the Internet , to
 E-mail bombs - An e-mail bomb is provide remote offices or individual users
usually a personal attack . Someone with secure access to their organization's
7
network. A virtual private network can be
contrasted with an expensive system of
owned or leased lines that can only be
used by one organization. The goal of a
VPN is to provide the organization with
the same capabilities , but at a much
lower cost

Implementation of network
security by VPN.

Step 1. - The remote user dials into their


local ISP and logs into the ISP’s network as
usual.

Step 3. - The user then sends data through


the tunnel which encrypted by the VPN
software before being sent over the ISP
connection.

Step 2. - When connectivity to the


corporate network is desired, the user
initiates a tunnel request to the destination
Security server on the corporate network.
The security server authenticates the user
and creates the other end of tunnel. Step 4. - The destination Security server
receives the encrypted data and decrypts.
The Security server then forwards the
decrypted data packets onto the corporate
network. Any information sent back to the
Remote user is also encrypted before being
sent over the Internet.

8
A software firewall can be
installed on the computer in your home
that has an Internet connection . This
computer is considered a gateway
because it provides the only point of
access between your home network and
the Internet .

4. AAA Server - AAA (authentication ,


authorization and accounting)
servers are used for more secure access
in a remote-access VPN environment .
When a request to establish a session
comes in from a dial up client , the
Request is proxies to the AAA server .
2.Firewalls: AAA then checks the following :
A firewall provides a strong Who you are (authentication)
barrier between your private network and What you are allowed to do
the Internet . You can set firewalls to (authorization)
restrict the number of open ports , what What you actually do (accounting)
type of packets are passed through and
which protocols are allowed through . The accounting information is especially
You should already have a good useful for tracking client. Use for
firewall in place before you implement security auditing , billing or reporting
a VPN , but a firewall can also be used purposes .
to terminate the VPN sessions .
And many more but due to
3.IPSec - limitations not explained.
Internet Protocol Security Protocol
(IPSec) provides
enhanced security features such as
better encryption algorithms and more
comprehensive authentication . IPSec has
two encryption modes : tunnel and
transport . Tunnel encrypts the header
and the payload of each packet while
Conclusion:
transport only encrypts the payload. Only
systems that are IPSec compliant can take
advantage of this Protocol. Also , all There is no gain saying the fact that
devices must use a common key and cryptography plays an essential role in
the firewalls of each network must have protecting the privacy of electronic
very similar security policies set up. information against threats from a variety
IPSec can encrypt data between various of potential attackers. Public key
devices , such as : cryptography, is the most important
technology in modern cryptographic
Router to router schemes to address issues like key
Firewall to router management, authentication, non-
PC to router repudiation and digital signature
PC to server cryptosystems with smaller key lengths
offer virtually no security. Symmetric-key
systems offer an advantage over the public-
9
key systems. Private keys in public-key
systems are much larger.

REFERENCES:

 Cryptography and Network security


- William Stalling

 Applied Cryptography
- Bruce Schneier

10

Вам также может понравиться