SlideShare a Scribd company logo
2
Most read
5
Most read
7
Most read
NETWORK SECURITY
CRYPTOGRAPHY
BY:
R.Thushara Bharathi (CSE)
S. Jahnavi (CSE)
WHAT IS NETWORK
∗ A network Is an interconnection or a
media between two or more systems
to share information among them.
∗ The various threats caused to
network are :
 Remote Login
 Application Backdoors
 SMTP Session Hijackings
 Operating System Bugs
 Spams
 Viruses etc.
NETWORK SECURITY
∗ The security provided to the network is
called network security which at present
is looming on horizon as a massive
problem.
∗ There are two kinds of Network Security
mainly as :
 Transit Security
:
it just encrypts the packets to be
transferred.
 Traffic Security
:
it acts just as a screen between hosts
& remote sites.
PROBLEMS & ATTACKS
∗ There are few intertwined areas in network security as:
 Secrecy
 Authentication
 Non-Repudiation
 Integrity Control etc.
∗ The threats are classified into two categories :
Passive Attacks :
A passive attack is one in which the attacker eavesdrops and
listens to the message but can’t modify the message.
Active Attacks :
An active attack is one in which the attacker modifies, deletes,
replay or introduce new messages into the stream of message.
CRYPTOGRAPHY
∗ It is derived from the Greek word that
meant for secret writing.
∗ Cryptography is the ability to send
information between particulars in a
way that it prevents others from
reading the data.
∗ The data is transferred by applying
two techniques by changing the plain
text & Cipher texts as Encryption (P
to C) & Decryption (C to P).
PRINCIPLES & SERVICES OF
CRYPTOGRAPHY
∗ The two fundamental principles of cryptography are:
 Messages must contain some Redundancy (information
not needed to understand the message).
 Some method is needed to foil replay attacks (validation
of messages by timestamp) i.e. freshness.
∗ The services provided by the cryptography are as follows:





Integrity Checking
Authentication
Protection to the data
Confidentiality of information etc.
ENCRYPTION & DECRYPTION
∗ The way of converting the
plain text to the cipher text
by the means of few keys
is called as “encryption”.
∗ The way of converting the
cipher text to the plain text
by the use of keys that are
suitable to it is called as
“decryption”.
SUBSTITUTION CIPHER
∗ Replacing of each letter or
group of letters of plain text
into cipher text by another
letters is called as “substitution
cipher”.
∗ The substitution may be :
 Monoalphabetic Substitution
 Digrams
 Trigrams
TRANSPOSITION CIPHER

∗ The change offered in the
position of the text i.e. By
jumbling the words is called
as “transposition cipher”.
∗ And the technique used
here is termed as “mass
technique”.
SECRET-KEY ALGORITHMS
∗ The implementation of a simple cryptography using
single key is done by the secret-key algorithms.
∗ This can be done by p-box, s-box and product
cipher.
ELEMENTS OF PRODUCT CIPHERS
∗ Transpositions & substitutions can be done through
p-box (a).
∗ Substitutions can be done through s-box (b).
∗ Mapping of the p-box with s-boxes form product
cipher (c).
PUBLIC-KEY ALGORITHMS
∗ Public key algorithms
are formed when it
satisfies the following
requirements:
 D(E(P))=P.
 Difficulty to deduce D
from E.
 E cannot be broken
by a chosen plain
text attack.
RSA ALGORITHM
∗ RSA is derived from the names of
the 3 discoverers named Rivest,
Shamir, Adleman.
∗ The RSA algorithm is one of the
widely used in the key algorithms.
∗ But takes much time for the large
volumes of data encryption. This is
done by few mathematical
principles as:
 Choose 2 large primes.
 Compute n=pxq & z=(p-1)x(q-1).
 Find e, exd=1 mod z.
ADVANTAGES & DISADVANTAGES
∗ Advantages :
 Used to protect the data from the others.
 Used to send the data / packet in a secured way
from the source to destination.
 Avoids in knowing the data in the way of
sending.
∗ Disadvantages:
 Hacking is done now-a-days easily even for the data
encrypted with 48 bits though the bits are extended
by 52-bits.
PROPOSED CONCEPT
∗ As known the data has been easily hacked even for
the 52- bit encryption too. So, the encryption bits of
52-bits should be given with the combination of both
numerals and alphabets ( for example one alphabet is
placed for 13-bits each).
∗ The placement of alphabet is known only to the
particular sender & receiver such that it secures the
data to be sent.
Network security cryptography ppt
Network security cryptography ppt

More Related Content

What's hot (20)

PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Cryptography
jayashri kolekar
 
PPTX
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
PPTX
Cryptography
Sagar Janagonda
 
PPTX
Cryptography.ppt
Uday Meena
 
PPT
Message authentication
CAS
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPTX
cryptography ppt free download
Twinkal Harsora
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
PPTX
Security Mechanisms
priya_trehan
 
PDF
Authentication techniques
IGZ Software house
 
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
PPTX
SHA- Secure hashing algorithm
Ruchi Maurya
 
PPTX
Types of attacks
Vivek Gandhi
 
PPTX
Transposition Cipher
daniyalqureshi712
 
PPT
block ciphers
Asad Ali
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
Cryptography and Information Security
Dr Naim R Kidwai
 
PPTX
Cryptography
Darshini Parikh
 
PPT
Cryptography
أحلام انصارى
 
Cryptography
Sidharth Mohapatra
 
Cryptography
jayashri kolekar
 
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Cryptography
Sagar Janagonda
 
Cryptography.ppt
Uday Meena
 
Message authentication
CAS
 
Classical encryption techniques
Dr.Florence Dayana
 
cryptography ppt free download
Twinkal Harsora
 
AES-Advanced Encryption Standard
Prince Rachit
 
Security Mechanisms
priya_trehan
 
Authentication techniques
IGZ Software house
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
SHA- Secure hashing algorithm
Ruchi Maurya
 
Types of attacks
Vivek Gandhi
 
Transposition Cipher
daniyalqureshi712
 
block ciphers
Asad Ali
 
cryptography
Abhijeet Singh
 
Cryptography and Information Security
Dr Naim R Kidwai
 
Cryptography
Darshini Parikh
 

Viewers also liked (20)

PPT
Network Security and Cryptography
Adam Reagan
 
PPTX
Network security & cryptography
Rahulprasad Yadav
 
PPTX
Cryptography
Shivanand Arur
 
PPT
Cryptography
gueste4c97e
 
PDF
Network Security Presentation
Allan Pratt MBA
 
PPT
Network security
Gichelle Amon
 
PPTX
Cryptography and network security
Nagendra Um
 
PPTX
Network security and cryptography
Pavithra renu
 
PPT
NetworkSecurity.ppt
DreamMalar
 
PPTX
Substitution Cipher
Agung Julisman
 
PPTX
Situational awareness for computer network security
mmubashirkhan
 
PPTX
Network security and cryptography
RajKumar Rampelli
 
PPT
Networksecurity&cryptography
Presentaionslive.blogspot.com
 
PPTX
Party pronto pres new
Steven Montgomery
 
PPT
Network Security Tools and applications
webhostingguy
 
PPTX
Contaminacion del aire y de las aguas
Jorge Salazar
 
PPTX
Presentation1 new (1) (1)cf
toamma
 
PPTX
E securty
Yıldırım Tam
 
PDF
Basic Network Security_Primer
n|u - The Open Security Community
 
PPTX
Network security & cryptography
pinkutinku26
 
Network Security and Cryptography
Adam Reagan
 
Network security & cryptography
Rahulprasad Yadav
 
Cryptography
Shivanand Arur
 
Cryptography
gueste4c97e
 
Network Security Presentation
Allan Pratt MBA
 
Network security
Gichelle Amon
 
Cryptography and network security
Nagendra Um
 
Network security and cryptography
Pavithra renu
 
NetworkSecurity.ppt
DreamMalar
 
Substitution Cipher
Agung Julisman
 
Situational awareness for computer network security
mmubashirkhan
 
Network security and cryptography
RajKumar Rampelli
 
Networksecurity&cryptography
Presentaionslive.blogspot.com
 
Party pronto pres new
Steven Montgomery
 
Network Security Tools and applications
webhostingguy
 
Contaminacion del aire y de las aguas
Jorge Salazar
 
Presentation1 new (1) (1)cf
toamma
 
E securty
Yıldırım Tam
 
Basic Network Security_Primer
n|u - The Open Security Community
 
Network security & cryptography
pinkutinku26
 
Ad

Similar to Network security cryptography ppt (20)

PPTX
Net
Raviteja
 
PPTX
Network security
ABHISHEK KUMAR
 
PPTX
Encryption techniques
MohitManna
 
PPT
Sunanda cryptography ppt
Soma Subbama
 
PPT
Crypt
Mir Majid
 
PDF
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
PPTX
jim kurose cn bookChapter_8new_v8.1.pptx
SabeehAhmad10
 
PPTX
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
PPT
Cryptography - An Overview
ppd1961
 
PPTX
Cryptography Introduction
indupps
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
PPT
Stallings Kurose and Ross
Information Security Awareness Group
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Cryptography
prasham95
 
PDF
Bt0088 cryptography and network security1
Techglyphs
 
PPTX
Information Security and Privacy-Unit-2.pptx
NiharikaDubey17
 
PDF
Introduction to Cryptography
Seema Goel
 
PPTX
cyber security attacks cyber security attacks
NiharikaGuptas
 
Network security
ABHISHEK KUMAR
 
Encryption techniques
MohitManna
 
Sunanda cryptography ppt
Soma Subbama
 
Crypt
Mir Majid
 
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
jim kurose cn bookChapter_8new_v8.1.pptx
SabeehAhmad10
 
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
Cryptography - An Overview
ppd1961
 
Cryptography Introduction
indupps
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Sisodetrupti
 
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
abduganiyevbekzod011
 
Stallings Kurose and Ross
Information Security Awareness Group
 
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
prasham95
 
Bt0088 cryptography and network security1
Techglyphs
 
Information Security and Privacy-Unit-2.pptx
NiharikaDubey17
 
Introduction to Cryptography
Seema Goel
 
cyber security attacks cyber security attacks
NiharikaGuptas
 
Ad

Recently uploaded (20)

PPTX
ENGlish 8 lesson presentation PowerPoint.pptx
marawehsvinetshe
 
PPTX
Light Reflection and Refraction- Activities - Class X Science
SONU ACADEMY
 
PPTX
ENG8_Q1_WEEK2_LESSON1. Presentation pptx
marawehsvinetshe
 
PDF
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
PPTX
Building Powerful Agentic AI with Google ADK, MCP, RAG, and Ollama.pptx
Tamanna36
 
PPTX
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
PPTX
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
PDF
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
PPTX
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
PPTX
How to Setup Automatic Reordering Rule in Odoo 18 Inventory
Celine George
 
PPTX
Nitrogen rule, ring rule, mc lafferty.pptx
nbisen2001
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PPTX
Different types of inheritance in odoo 18
Celine George
 
PDF
I3PM Case study smart parking 2025 with uptoIP® and ABP
MIPLM
 
PPTX
Life and Career Skills Lesson 2.pptxProtective and Risk Factors of Late Adole...
ryangabrielcatalon40
 
PDF
WATERSHED MANAGEMENT CASE STUDIES - ULUGURU MOUNTAINS AND ARVARI RIVERpdf
Ar.Asna
 
PPTX
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
 
PPTX
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
PPTX
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
PPTX
Navigating English Key Stage 2 lerning needs.pptx
JaysonClosa3
 
ENGlish 8 lesson presentation PowerPoint.pptx
marawehsvinetshe
 
Light Reflection and Refraction- Activities - Class X Science
SONU ACADEMY
 
ENG8_Q1_WEEK2_LESSON1. Presentation pptx
marawehsvinetshe
 
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
Building Powerful Agentic AI with Google ADK, MCP, RAG, and Ollama.pptx
Tamanna36
 
Exploring Linear and Angular Quantities and Ergonomic Design.pptx
AngeliqueTolentinoDe
 
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
How to Setup Automatic Reordering Rule in Odoo 18 Inventory
Celine George
 
Nitrogen rule, ring rule, mc lafferty.pptx
nbisen2001
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
Different types of inheritance in odoo 18
Celine George
 
I3PM Case study smart parking 2025 with uptoIP® and ABP
MIPLM
 
Life and Career Skills Lesson 2.pptxProtective and Risk Factors of Late Adole...
ryangabrielcatalon40
 
WATERSHED MANAGEMENT CASE STUDIES - ULUGURU MOUNTAINS AND ARVARI RIVERpdf
Ar.Asna
 
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
 
How to Configure Refusal of Applicants in Odoo 18 Recruitment
Celine George
 
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
Navigating English Key Stage 2 lerning needs.pptx
JaysonClosa3
 

Network security cryptography ppt

  • 2. WHAT IS NETWORK ∗ A network Is an interconnection or a media between two or more systems to share information among them. ∗ The various threats caused to network are :  Remote Login  Application Backdoors  SMTP Session Hijackings  Operating System Bugs  Spams  Viruses etc.
  • 3. NETWORK SECURITY ∗ The security provided to the network is called network security which at present is looming on horizon as a massive problem. ∗ There are two kinds of Network Security mainly as :  Transit Security : it just encrypts the packets to be transferred.  Traffic Security : it acts just as a screen between hosts & remote sites.
  • 4. PROBLEMS & ATTACKS ∗ There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity Control etc. ∗ The threats are classified into two categories : Passive Attacks : A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message. Active Attacks : An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message.
  • 5. CRYPTOGRAPHY ∗ It is derived from the Greek word that meant for secret writing. ∗ Cryptography is the ability to send information between particulars in a way that it prevents others from reading the data. ∗ The data is transferred by applying two techniques by changing the plain text & Cipher texts as Encryption (P to C) & Decryption (C to P).
  • 6. PRINCIPLES & SERVICES OF CRYPTOGRAPHY ∗ The two fundamental principles of cryptography are:  Messages must contain some Redundancy (information not needed to understand the message).  Some method is needed to foil replay attacks (validation of messages by timestamp) i.e. freshness. ∗ The services provided by the cryptography are as follows:     Integrity Checking Authentication Protection to the data Confidentiality of information etc.
  • 7. ENCRYPTION & DECRYPTION ∗ The way of converting the plain text to the cipher text by the means of few keys is called as “encryption”. ∗ The way of converting the cipher text to the plain text by the use of keys that are suitable to it is called as “decryption”.
  • 8. SUBSTITUTION CIPHER ∗ Replacing of each letter or group of letters of plain text into cipher text by another letters is called as “substitution cipher”. ∗ The substitution may be :  Monoalphabetic Substitution  Digrams  Trigrams
  • 9. TRANSPOSITION CIPHER ∗ The change offered in the position of the text i.e. By jumbling the words is called as “transposition cipher”. ∗ And the technique used here is termed as “mass technique”.
  • 10. SECRET-KEY ALGORITHMS ∗ The implementation of a simple cryptography using single key is done by the secret-key algorithms. ∗ This can be done by p-box, s-box and product cipher.
  • 11. ELEMENTS OF PRODUCT CIPHERS ∗ Transpositions & substitutions can be done through p-box (a). ∗ Substitutions can be done through s-box (b). ∗ Mapping of the p-box with s-boxes form product cipher (c).
  • 12. PUBLIC-KEY ALGORITHMS ∗ Public key algorithms are formed when it satisfies the following requirements:  D(E(P))=P.  Difficulty to deduce D from E.  E cannot be broken by a chosen plain text attack.
  • 13. RSA ALGORITHM ∗ RSA is derived from the names of the 3 discoverers named Rivest, Shamir, Adleman. ∗ The RSA algorithm is one of the widely used in the key algorithms. ∗ But takes much time for the large volumes of data encryption. This is done by few mathematical principles as:  Choose 2 large primes.  Compute n=pxq & z=(p-1)x(q-1).  Find e, exd=1 mod z.
  • 14. ADVANTAGES & DISADVANTAGES ∗ Advantages :  Used to protect the data from the others.  Used to send the data / packet in a secured way from the source to destination.  Avoids in knowing the data in the way of sending. ∗ Disadvantages:  Hacking is done now-a-days easily even for the data encrypted with 48 bits though the bits are extended by 52-bits.
  • 15. PROPOSED CONCEPT ∗ As known the data has been easily hacked even for the 52- bit encryption too. So, the encryption bits of 52-bits should be given with the combination of both numerals and alphabets ( for example one alphabet is placed for 13-bits each). ∗ The placement of alphabet is known only to the particular sender & receiver such that it secures the data to be sent.