SlideShare a Scribd company logo
Network Security- A Need Business Organizations Educational Institutes E-mailing, Data Distributions Stock Trading Distance Learning
THREATS 1)  Stealing out confidential content by third party. 2)  Inter or Intra-organizational manipulations. 3)  Masquerading threats. 4)  Replay attacks. 5)  Denial of services.
To understand the concept of cryptography and its security services. To bring out solution in the form of applications to uproot security threats. To understand working of various cryptography based applications. OBJECTIVE
Cryptography is a technology of hiding actual content in  some form which is unintelligible. In other words, Cryptography is a method to enlock and unlock a document using a personal key. What is Cryptography?
Embed confidence in people: 1) to do online banking 2) to do online trading 3) to make online purchases with their  credit cards. How ? With a assurance that account information or any critical information is secured through cryptographical services. Cryptography- The Back Bone
EXAMPLE Suppose you have a message as: “ I HAVE SENT YOU THREE CRORES” with a  key = 3. Assign Numerical equivalent to each letter: N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 A B C D E F G H I  J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12
Now add your key to your message from assigned numerical values from table Key T =>19  + 3 = 11 => W  (Converted letter) Entire converted message would appear as: “ I HAVE SENT YOU THREE CRORES” “ L KDYH VHQW BRX WKUHH FURUHV”   Encrypted Message
SECURITY By CRYPTOGRAPHY Authentication Confidentiality Integrity Access Control Availability
PUBLIC KEY PRIVATE KEY Difference PRIVATE KEYS  PUBLIC KEYS 1)Only one key is used for  1)Two keys are used,one for encryption & decryption.  Encryption and another is used for decryption.  2)Private keys are shared.  2)Public key pair is only  generated, not shared. 3)Known to only  3)One is publicly exposed communicating parties.  & other is kept secret. TYPES OF KEYS
Model for Private key Algorithms Message Encrypting  Procedure INETERNET DECRYPTING PROCEDURE Recovered Message Private Key Private Key Shared keys by sender and receiver At sender  side At Receiver  side
Model for pubic key algorithms Message Encryption Procedure INTERNET Decryption  Procedure Recovered Message Key Pair  Source Receiver’s Public key Exposed to public Receiver’s private key
It is a stream of bits appended to a document with the  objective of providing: Integrity  Origin assurance Parties Involved in the transaction process. Signer Verifier Arbitrator DIGITAL SIGNATURE
DIGITAL ENVELOPE An application to seal sender’s message in such a way that intended recipient can only open & read the message. Components: 1) Encrypted data  2) Encrypted key DIGITAL CERTIFICATES An application in which a central authority signs a sender’s message and receiver can verify it after receipt. It contains following information: 1)User Name  2)User’s Public key  3)Signature Algorithm Digital Signature Applications
PGP (Pretty Good Privacy) What is PGP? PGP is an open source freely available software package for e-mail security. Explosive Growth and Usage 1)Available free worldwide for different platforms. 2)Make organisational’s mailing system more secure. 3)Well acclaimed with strong encrypting algorithms & key management system. APPLICATIONS
What is IPSEC ? Capability that can be added to Internet protocol to enhace network security. Provides the capability to secure communication across a LAN or WAN users. IPsec encompasses mainly on authentication, confidentiality, and key management. IPSEC Security Service:
Usage of IPSec: Secure branch office connectivity over the Internet. Secure remote access over the Internet. Establishing extranet and intranet connectivity with partners. Enhancing electronic commerce security.
What is SET ? A open encryption and security specification designed to protect credit card transactions on the Internet. Key Features of SET: Confidentiality of Information Integrity of data Cardholder account authentication Merchant authentications Secure Electronic Transactions  (SET)
SET PARTICIPANTS
Steps in Online Transaction The customer 1)Opens an credit card  account. 2)Receives a certificate. 3) Verifies merchant. 4) Places an order. 5) Sends order & payment. 6)Requests payment  authorization. 7)Confirms the order. 8)Provides the goods  or service. 9)Requests payment. The Merchant
E-business dimensions are expanding day by day Its only cryptography which can provide immunity to those transactions which are likely to toll hundreds of billions of dollars per year. CONCLUSION
 

More Related Content

PPTX
Basic concept of pki
PPTX
Encryption ppt
PDF
Network security unit 1,2,3
PDF
Cryptointro
PDF
A novel paradigm in authentication system
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Cyber public key cryptography
PDF
s117
Basic concept of pki
Encryption ppt
Network security unit 1,2,3
Cryptointro
A novel paradigm in authentication system
International Journal of Engineering Research and Development (IJERD)
Cyber public key cryptography
s117

What's hot (19)

PDF
CGI White Paper - Key Incryption Mechanism
PPTX
Key distribution code.ppt
PPT
Online security & encryption
PPT
fucking shit
PPTX
PPTX
PPTX
Data encryption
PDF
A Review on Various Methods of Cryptography for Cyber Security
PPT
Symmetric & Asymmetric Cryptography
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
PPTX
Public key Cryptography & RSA
PPTX
Network Security Fundamental
PDF
Network security & cryptography full notes
PDF
Vtu network security(10 ec832) unit 3 notes.
PPTX
Cryptographic tools
 
PPT
Pretty good privacy
PPT
Introduction To PKI Technology
PDF
Week 12 slide
PDF
Achieving data integrity by forming the digital signature using RSA and SHA-1...
CGI White Paper - Key Incryption Mechanism
Key distribution code.ppt
Online security & encryption
fucking shit
Data encryption
A Review on Various Methods of Cryptography for Cyber Security
Symmetric & Asymmetric Cryptography
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Public key Cryptography & RSA
Network Security Fundamental
Network security & cryptography full notes
Vtu network security(10 ec832) unit 3 notes.
Cryptographic tools
 
Pretty good privacy
Introduction To PKI Technology
Week 12 slide
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Ad

Similar to Cryptography (20)

PPT
Rothke Info Security Canada 2007 Final
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Cryptography
PPTX
Information Security and Privacy-Unit-2.pptx
PPT
Network security cryptography ppt
PPT
Crypt
PPT
Secure payment systems
PPT
What is Encryption
PPT
1329 n 9460
PPTX
F16 cs61 cryptography
PPTX
Network security and cryptography
PPTX
Network security
PPT
Computer and Network Security
PPT
Lecture 11
PPT
Cryptography
PPTX
Cryptography
DOCX
Cryptography and security
PPTX
Cryptography
PPTX
Encryption techniques
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Rothke Info Security Canada 2007 Final
Cryptography and Network Security Principles.pptx
Cryptography
Information Security and Privacy-Unit-2.pptx
Network security cryptography ppt
Crypt
Secure payment systems
What is Encryption
1329 n 9460
F16 cs61 cryptography
Network security and cryptography
Network security
Computer and Network Security
Lecture 11
Cryptography
Cryptography
Cryptography and security
Cryptography
Encryption techniques
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
Ad

Cryptography

  • 1. Network Security- A Need Business Organizations Educational Institutes E-mailing, Data Distributions Stock Trading Distance Learning
  • 2. THREATS 1) Stealing out confidential content by third party. 2) Inter or Intra-organizational manipulations. 3) Masquerading threats. 4) Replay attacks. 5) Denial of services.
  • 3. To understand the concept of cryptography and its security services. To bring out solution in the form of applications to uproot security threats. To understand working of various cryptography based applications. OBJECTIVE
  • 4. Cryptography is a technology of hiding actual content in some form which is unintelligible. In other words, Cryptography is a method to enlock and unlock a document using a personal key. What is Cryptography?
  • 5. Embed confidence in people: 1) to do online banking 2) to do online trading 3) to make online purchases with their credit cards. How ? With a assurance that account information or any critical information is secured through cryptographical services. Cryptography- The Back Bone
  • 6. EXAMPLE Suppose you have a message as: “ I HAVE SENT YOU THREE CRORES” with a key = 3. Assign Numerical equivalent to each letter: N O P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12
  • 7. Now add your key to your message from assigned numerical values from table Key T =>19 + 3 = 11 => W (Converted letter) Entire converted message would appear as: “ I HAVE SENT YOU THREE CRORES” “ L KDYH VHQW BRX WKUHH FURUHV” Encrypted Message
  • 8. SECURITY By CRYPTOGRAPHY Authentication Confidentiality Integrity Access Control Availability
  • 9. PUBLIC KEY PRIVATE KEY Difference PRIVATE KEYS PUBLIC KEYS 1)Only one key is used for 1)Two keys are used,one for encryption & decryption. Encryption and another is used for decryption. 2)Private keys are shared. 2)Public key pair is only generated, not shared. 3)Known to only 3)One is publicly exposed communicating parties. & other is kept secret. TYPES OF KEYS
  • 10. Model for Private key Algorithms Message Encrypting Procedure INETERNET DECRYPTING PROCEDURE Recovered Message Private Key Private Key Shared keys by sender and receiver At sender side At Receiver side
  • 11. Model for pubic key algorithms Message Encryption Procedure INTERNET Decryption Procedure Recovered Message Key Pair Source Receiver’s Public key Exposed to public Receiver’s private key
  • 12. It is a stream of bits appended to a document with the objective of providing: Integrity Origin assurance Parties Involved in the transaction process. Signer Verifier Arbitrator DIGITAL SIGNATURE
  • 13. DIGITAL ENVELOPE An application to seal sender’s message in such a way that intended recipient can only open & read the message. Components: 1) Encrypted data 2) Encrypted key DIGITAL CERTIFICATES An application in which a central authority signs a sender’s message and receiver can verify it after receipt. It contains following information: 1)User Name 2)User’s Public key 3)Signature Algorithm Digital Signature Applications
  • 14. PGP (Pretty Good Privacy) What is PGP? PGP is an open source freely available software package for e-mail security. Explosive Growth and Usage 1)Available free worldwide for different platforms. 2)Make organisational’s mailing system more secure. 3)Well acclaimed with strong encrypting algorithms & key management system. APPLICATIONS
  • 15. What is IPSEC ? Capability that can be added to Internet protocol to enhace network security. Provides the capability to secure communication across a LAN or WAN users. IPsec encompasses mainly on authentication, confidentiality, and key management. IPSEC Security Service:
  • 16. Usage of IPSec: Secure branch office connectivity over the Internet. Secure remote access over the Internet. Establishing extranet and intranet connectivity with partners. Enhancing electronic commerce security.
  • 17. What is SET ? A open encryption and security specification designed to protect credit card transactions on the Internet. Key Features of SET: Confidentiality of Information Integrity of data Cardholder account authentication Merchant authentications Secure Electronic Transactions (SET)
  • 19. Steps in Online Transaction The customer 1)Opens an credit card account. 2)Receives a certificate. 3) Verifies merchant. 4) Places an order. 5) Sends order & payment. 6)Requests payment authorization. 7)Confirms the order. 8)Provides the goods or service. 9)Requests payment. The Merchant
  • 20. E-business dimensions are expanding day by day Its only cryptography which can provide immunity to those transactions which are likely to toll hundreds of billions of dollars per year. CONCLUSION
  • 21.