Cryptograpy and Network Security: Unit-1
Cryptograpy and Network Security: Unit-1
SECURITY
Unit-1
Introduction to cryptography and
network security
Basic Terminology
• Plain text
• Cipher text
• Cipher
• Encryption
• Decryption
• Cryptography
• Cryptanalysis
• Cryptology
• key
Encryption is done two ways
Symmetric Asymmetric
Encryption Encryption
same key two different keys
single key or group of keys pairs of keys
secret key(Ks) public key(KU) &
private key(KR)
General security mechanism:
SENDER RECEIVER
P E C C
I D P
L N I
P E L
A C P
H C A
I R H
E secured R I
N Y E
R Y N
P R P
T T
T T T
E I T
E I E
X O E
X O X
T N X
T N T
key key T
Security Attacks:
Attack means gaining an access of data by
unauthorised person
• Accessing the data
• Modifying the data
• Destroying the data
Two types of attacks
1 Passive attack
2 Active attack
Passive attack
SENDER RECEIVER
Traffic Analysis
THIRD PARTY
observes the traffic flow
SENDER RECEIVER
Active attacks:
In Active attacks the data will be
modified by the unauthorised person/third
party
1. Masquerade attack
2. Replay attack
3. Data modification attack
4. Denail of service
Masquerade attack
THIRD PARTY
SENDER RECEIVER
Replay attack
THIRD PARTY
SENDER RECEIVER
Data modification:
THIRD PARTY
ACCESS MODIFY
SENDER RECEIVER
Denail of server:
THIRD PARTY