0% found this document useful (0 votes)
74 views

Cryptograpy and Network Security: Unit-1

This document provides an introduction to cryptography and network security. It defines basic terminology like plaintext, ciphertext, cipher, encryption, decryption, and cryptology. It describes symmetric and asymmetric encryption methods. The general security mechanism involves encrypting plaintext at the sender and decrypting it to plaintext at the receiver. Security attacks can be passive like eavesdropping, or active like masquerading, replay attacks, data modification, and denial of service. Passive attacks access data without modifying it, while active attacks aim to modify data. The document outlines these common cryptographic concepts and security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Cryptograpy and Network Security: Unit-1

This document provides an introduction to cryptography and network security. It defines basic terminology like plaintext, ciphertext, cipher, encryption, decryption, and cryptology. It describes symmetric and asymmetric encryption methods. The general security mechanism involves encrypting plaintext at the sender and decrypting it to plaintext at the receiver. Security attacks can be passive like eavesdropping, or active like masquerading, replay attacks, data modification, and denial of service. Passive attacks access data without modifying it, while active attacks aim to modify data. The document outlines these common cryptographic concepts and security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CRYPTOGRAPY AND NETWORK

SECURITY
Unit-1
Introduction to cryptography and
network security
Basic Terminology
• Plain text
• Cipher text
• Cipher
• Encryption
• Decryption
• Cryptography
• Cryptanalysis
• Cryptology
• key
Encryption is done two ways

1. Stream cipher: bit by bit


2. Block cipher: block by block
Types of Encryption:
Encryption

Symmetric Asymmetric
Encryption Encryption
same key two different keys
single key or group of keys pairs of keys
secret key(Ks) public key(KU) &
private key(KR)
General security mechanism:
SENDER RECEIVER
P E C C
I D P
L N I
P E L
A C P
H C A
I R H
E secured R I
N Y E
R Y N
P R P
T T
T T T
E I T
E I E
X O E
X O X
T N X
T N T
key key T
Security Attacks:
Attack means gaining an access of data by
unauthorised person
• Accessing the data
• Modifying the data
• Destroying the data
Two types of attacks
1 Passive attack
2 Active attack
Passive attack

– In passive attack the data will be accessed by the unauthorised


person/third party

– Again passive attacks are two types

1.Release of the content


2. Traffic Analysis

-This type of technique is called as EAVES DROPPING


techniques
Release of the content
THIRD PARTY

access the data

SENDER RECEIVER
Traffic Analysis

THIRD PARTY
observes the traffic flow

SENDER RECEIVER
Active attacks:
In Active attacks the data will be
modified by the unauthorised person/third
party
1. Masquerade attack
2. Replay attack
3. Data modification attack
4. Denail of service
Masquerade attack

THIRD PARTY

sends the data


in the name of sender

SENDER RECEIVER
Replay attack

THIRD PARTY

here the receiver receieves


two messages with same name

SENDER RECEIVER
Data modification:

THIRD PARTY

ACCESS MODIFY

SENDER RECEIVER
Denail of server:

THIRD PARTY

third party will interrupts the


services which are send by the server
to the sender
SENDER SERVER
Any queries
THANK YOU

You might also like