0% found this document useful (0 votes)
198 views

CSE Cryptography and Network Security Report

The document discusses network security and cryptography. It covers topics like network security problems, key cryptographic techniques including symmetric-key encryption, asymmetric-key encryption and hash functions. It also discusses advanced cryptographic techniques like steganography and applications of cryptography.

Uploaded by

Iyere Gift
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views

CSE Cryptography and Network Security Report

The document discusses network security and cryptography. It covers topics like network security problems, key cryptographic techniques including symmetric-key encryption, asymmetric-key encryption and hash functions. It also discusses advanced cryptographic techniques like steganography and applications of cryptography.

Uploaded by

Iyere Gift
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

www.studymafia.

org

Seminar report

On

Cryptography and Network Security


Submitted in partial fulfillment of the requirement for the award of degree
of Bachelor of Technology in Computer Science

SUBMITTED TO: SUBMITTED BY:


www.studymafia.org www.studymafia.org

1
www.studymafia.org

Acknowledgement

I would like to thank respected Mr…….. and Mr. ……..for giving me such a wonderful
opportunity to expand my knowledge for my own branch and giving me guidelines to
present a seminar report. It helped me a lot to realize of what we study for.

Secondly, I would like to thank my parents who patiently helped me as i went through
my work and helped to modify and eliminate some of the irrelevant or un-necessary
stuffs.

Thirdly, I would like to thank my friends who helped me to make my work more
organized and well-stacked till the end.

Next, I would thank Microsoft for developing such a wonderful tool like MS Word. It
helped my work a lot to remain error-free.

Last but clearly not the least, I would thank The Almighty for giving me strength to
complete my report on time.

2
www.studymafia.org

Preface

I have made this report file on the topic Cryptography and Network Security
; I have tried my best to elucidate all the relevant detail to the topic to be included in the
report. While in the beginning I have tried to give a general view about this topic.

My efforts and wholehearted co-corporation of each and everyone has ended on a


successful note. I express my sincere gratitude to …………..who assisting me
throughout the preparation of this topic. I thank him for providing me the
reinforcement, confidence and most importantly the track for the topic whenever I
needed it.

3
www.studymafia.org

Contents:
 Abstract

 Introduction

 Network Security Problems

 Key process Techniques

 Advanced cryptographic technique

 Steganography

 Cryptographic technologies

 Based on layers
 Based on algorithms

 Applications of cryptography

 Application of network security

 Conclusion

4
www.studymafia.org

NETWORK SECURITY & CRYPTOGRAPHY

CRYPTOGRAPHY AND preceded by information gathering.


NETWORKSECURITY Movie gangsters “case the joint”;
soldiers “scout the area”. This is also
ABSTRACT
“SECURITY” in this true in the cyber world. Here the “bad
contemporary scenarios has become a guys” are referred to as intruders,
more sensible issue either it may be in eavesdroppers, hackers, hijackers, etc.
the “REAL WORLD” or in the “CYBER The intruders would first have a
WORLD”. In the real world as opposed panoramic view of the victims network
to the cyber world an attack is often and then start digging the holes.

5
www.studymafia.org

Today the illicit activities of security breaches and eavesdroppers, the


the hackers are growing by leaps and technological prowess has been
bounds, viz., “THE RECENT ATTACK stupendously developed to defy against
ON THE DNS SERVERS HAS each of the assaults. Our paper covers
CAUSED A LOT OF HULLABALOO the ADVANCED technical combats that
ALL OVER THE WORLD”. However, have been devised all through the way,
fortunately, the antagonists reacted thus giving birth to the notion of
promptly and resurrected the Internet “NETWORK -SECURITY”. Various
world from the brink of prostration. antidotes that are in fact inextricable
Since the inception of with security issues are – Cryptography,
conglomerating Computers with Authentication, Integrity and Non
Networks the consequence of which Repudiation, Key Distribution and
shrunk the communication certification, Access control by
world,hitherto, umpteen ilks of security implementing Firewalls etc.
breaches took their origin. Tersely
quoting some security ditherers – To satiate the flaws in the network
Eavesdropping, Hacking, Hijacking, security more and more advanced
Mapping, Packet Sniffing, 1Spoofing, security notions are being devised day
DoS & DDoS attacks, etc. by day. Our paper covers a wide
Newton’s law says “Every action has got perspective of such arenas where the
an equal but opposite reaction”. So is contemporary cyber world is revolving
the case with this. Nevertheless the around viz.
pay great amounts of lip service to
. Introduction: security but do not want to be bothered
with it when it gets in their way. It’s
Network security deals with the
important to build systems and networks
problems of legitimate messages being
in such a way that the user is not
captured and replayed. Network security
constantly reminded of the security
is the effort to create a secure computing
system. Users who find security policies
platform. The action in question can be
and systems to restrictive will find ways
reduced to operations of access,
around them. It’s important to get their
modification and deletion. Many people

6
www.studymafia.org

feed back to understand what can be Cryptography is the science of


improved, the sorts of risks that are
using mathematics to encrypt and
deemed unacceptable, and what has been
decrypt data.
done to minimize the organizations
Cryptography enables you to store
exposure to them. Network security
sensitive information or transmit it
problems can be divided roughly into
across insecure networks (like the
four intertwined areas:
internet)
Secrecy, Authentication,
So that it cannot be read by anyone
Nonrepudation, and Integrity control.
expect the intended recipient. While
 Secrecy has to do with cryptography is the science of securing
keeping information out of the data, cryptanalysts are also called
hands of unauthorized users. attackers. Cryptology embraces both

 Authentication deals with cryptography and cryptanalysis.

whom you are talking to before


revealing sensitive information
or entering into a business deal.

 Nonrepudation deals with


signatures.

 Integrity control deals


with long enterprises like
banking, online networking.
KEY PROCESSTECHNIQUES:
There are three key process techniques.
These problems can be handled by using
They are:
cryptography, which provides means and
 Symmetric-key encryption
methods of converting data into
 A symmetric-key encryption
unreadable from, so that valid User can
access Information at the Destination.  Hash functions

7
www.studymafia.org

Symmetric-key encryption In public key can be passed openly

(one key): between the parties or published in a


public repository, but the related
private key remains private. Data
There is only one key in this
encrypted with the public key can be
encryption. That is private key. This
decrypted only using the private key.
key is only used for both encryption
Data encrypted with the private key
and decryption. This is also called as
can be decrypted only using the
private-key encryption. In this
public key. In the below figure, a
method the sender encrypt the data
sender has the receiver’s public key
through private key and receiver
and uses it to encrypt a message, but
decrypt that data through that key
only the receiver has the related
only.
private key used to decrypt the
message.

Private Key method


Private Key method
Asymmetric-key encryption (two Public key method
keys): Hash functions:
There are two keys in this encryption.
An improvement on the public key
They are:
scheme is the addition of a one-way
 Public key
hash function in the process. A one-
 Private key way hash function takes variable
length input. In this case, a message
Two keys – a public key and a of any length, even thousands or
private key, which are millions of bits and produces a fixed-
mathematically related, are used in length output; say, 160-bits. The
public-key encryption. To contrast it function ensures that, if the
with symmetric-key encryption, information is changed in any way
public-key encryption is also some even by just one bit an entirely
times called public-key encryption. different output value is produced.

8
www.studymafia.org

which data can be kept confidential.


Steganography hides the existence of
a message by transmitting
As long as a secure hash function is information through various carriers.
used, there is no way to take Its goal is to prevent the detection of
someone’s signature from one secret message.
documents and attach it to another, Steganography uses techniques to
or to alter a signed message in any communicate information in a way
way. The slightest change in signed that is a hidden. The most common
documents will cause the digital use of Steganography is hiding
signature verification process to fail. information image or sound within
the information of another file by
using a stegokey such as password is
additional information to further
conceal a message.
There are many reasons why
Srteganography is used, and is often
used in significant fields. It can be
used to communicate with complete
freedom even under conditions that
are censured or monitored.

ADVANCED The Steganography is an effective


means of hiding data, there by
CRYPTOGRAPHIC
protecting the data from
TECHNIQUE
unauthorized or unwanted viewing.
STEGANOGRAPHY
But stego is simply one of many
ways to protect confidentiality of
INTRODUCTION:
data. Digital image steganography is
Over the past couple of year’s
growing in use and application. In
Steganography has been the source
areas where cryptography and
of a lot of discussion. Steganography
strong encryption are being
is one of the fundamental ways by

9
www.studymafia.org

outlawed, people are using Steganography can be used to tag


steganography to avoid these policies notes to online images.
and to send these messages secretly.
Although steganography is become CRYPTOGRAPHIC
very popular in the near future. TECHNOLOGIES
Based on layers:
WHAT IS STEGANOGRAPHY?
The word steganography comes
 Link layer encryption
from the Greek name “stegnos”
 Network layer encryption
(hidden or secret) and “graphy”
 IPSEC, VPN, SKIP
(writing or drawing”) and literally
 Transport layer
means hidden writing.
 SSL, PCT (private
Stegenography uses techniques to
Communication Technology)
communicate information in a way
that is hidden.  Application layer

The most common use of  PEM (Privacy Enhanced

Steganography is hiding information Mail)

image or sound within the  PGP (Pretty Good Privacy)

information of another file by using a  SHTTP


stegokey such as password is
additional information to further Cryptographic process can be
conceal a message. implemented at various at various layers
starting from the link layer all the
WHAT IS STEGANOGRAPHY way up to the application layer. The
USED FOR? most popular encryption scheme is SSL
Like many security tools, and it is implemented at the transport
steganography can be used for layer. If the encryption is done at the
variety of reasons, some good, some transport layer. If the encryption is done
not so good. Steganography can also at the transport layer, any application
be used as a way to make a substitute that is running on the top of the transport
for a one-way hash value. Further, layer can be protected.

10
www.studymafia.org

but factoring the


Based on algorithms: resulting product
is practically

 Secret-key encryption impossible.

algorithms (symmetric
algorithms) APPLICATIONS

 DES (Data OF CRYPTOGRAPHY

Encryption
Standard)—  Defense service

56bitkey  Secure Data Manipulation

 Triple DES—  E-Commerce


112bitkey  Business Transactions
 IDEA  Internet Payment Systems
(International  Pass Phrasing Secure
Data Encryption Internet Comm.
Algorithm)—  User Identification
128bitkey Systems
 Access control
 Public-key encryption  Computational Security
algorithms (Asymmetric  Secure access to Corp
algorithms) Data
 Data Security
Diffie-Hellman (DH): Exponentiation is APPLICATIONS OF NETWORK
easy but computing discrete algorithms SECURITY
from the resulting value is practically
impossible. Computer networks were
primarily used by university
 RSA: researchers for sending email,
Multiplication of and by corporate employees
two large prime for sharing printers. Under
numbers is easy

11
www.studymafia.org

these conditions, security did down into their components,


not get a lot of attention. and it becomes much simpler to
decide whether what is
proposed will be conflict with
your security policies and
But now, as millions of practices.
ordinary citizens are using Security is
networks for: everybody’s business, and only
with everyone’s cooperation,
 Banking intelligent policy, and
 Shopping consistent practices, will it be
 Filling achievable.
their tax Cryptography
returns protects users by providing
functionality for the encryption
of data and authentication of
other users. This technology
CONCLUSION:
lets the receiver of an
Network security is a very
electronic messages verify the
difficult topic. Every one has a
sender, ensures that a message
different idea of what
can be read only by the
“security” is, and what levels
intended person, and assures
of risks are acceptable. The key
the recipient that a message has
for building a secure network is
not be altered in transmit. The
to define what security means
Cryptography Attacking
to your organization. Once that
techniques like Cryptanalysis
has been defined, everything
and Brute Force Attack. This
that goes on with. The network
paper provides information of
can be evaluated with respect
Advance Cryptography
to the policy. Projects and
Techniques.
systems can then be broken

12
www.studymafia.org

BIBOLOGRAPHY:

 “Computer Networks ”,
by Andrew S.Tanunbaum
 “Fighting Steganography
detection” by Fabian
Hansmann
 “Network security” by
Andrew S.Tanenbaum
 “Cryptography and
Network Security” by
William Stallings
 “Applied Cryptography”
by Bruce Schneier,
JohnWillley and Sons Inc
 URL:
http://www.woodmann.co
m/fravia/fabian2.html.
 URL:
http://www.jjtc.com/stegd
oc/sec202.html.

13

You might also like