SlideShare a Scribd company logo
Cryptography and Network
Security
Dr.S.Santhi
Professor
Department of ECE
KIT-Kalaignarkarunanidhi Institute of Technology
Agenda
What Is Cryptography?
Types of Cryptographic Functions.
Network Security Models.
Cryptography
• The art of secret writing.
The art of mangling information into apparent unintelligibility
in a manner allowing a secret method of unmangling.
Cryptography Definitions
• Messages:
– Plaintext
– Ciphertext
• Ingredients:
– Algorithm(s)
– Key(s)
• Players:
– Cryptographer: invents clever algorithms
– Cryptanalyst: breaks clever algorithms
Basic Terminology
• Plaintext: original message to be encrypted
• Ciphertext: the encrypted message
• Enciphering or encryption: the process of converting plaintext into
ciphertext
• Encryption algorithm: performs encryption
• Two inputs: a plaintext and a secret key
Symmetric Key Cryptography
• This private/secret/single key cryptography uses one key
• This key is shared by both sender and receiver
• if this key is disclosed communications are compromised
• It is also called symmetric, parties are equal
• It does not protect sender from receiver forging a message &
claiming is sent by sender
Asymmetric Key Cryptography
• It uses two keys – Private and Public key
• Asymmetric – Both sender and receiver use different keys
• It works by the clever use of number theory problems
• It complements rather than replaces private key cryptography
MODELS FOR NETWORK SECURITY
• Model for Network Security
• Network Access Security Model
Model for Network Security
Network Access Security
Model
Thank You

More Related Content

PPTX
PPTX
Cryptography using python
PDF
Cryptography in Python
PPT
PPTX
Encryption ppt
PPTX
Cryptography
PPS
Criptography
Cryptography using python
Cryptography in Python
Encryption ppt
Cryptography
Criptography

What's hot (18)

PPTX
Group 6
PPTX
PPTX
Cryptography by Durlab Kumbhakar
PPTX
Cryptography
PPTX
Cryptography-Known plain text attack
PPTX
Cryptography
PPTX
Cryptography ppt ,computer system security. PPT
PDF
Analysis of Cryptography Techniques
PPT
CRYPTOGRAPHY
PPTX
Encryption
PPTX
Cryptography
PPT
Symmetric & Asymmetric Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography and attacks ins
PPT
Cryptography basices
PPTX
Basic cryptography
DOCX
Cryptography : The Art of Secured Messaging
Group 6
Cryptography by Durlab Kumbhakar
Cryptography
Cryptography-Known plain text attack
Cryptography
Cryptography ppt ,computer system security. PPT
Analysis of Cryptography Techniques
CRYPTOGRAPHY
Encryption
Cryptography
Symmetric & Asymmetric Cryptography
Cryptography
Cryptography
Cryptography and attacks ins
Cryptography basices
Basic cryptography
Cryptography : The Art of Secured Messaging
Ad

Similar to Cryptography and network security (20)

PDF
UNIT 3 Information Security Sharad Institute
PPT
Fundamentals of cryptography
PPTX
Chapter 5 - Enkripsi dan Kriptograpi.pptx
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
Chapter 1 2
PDF
Encryption
PPTX
Cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Cryptography and network security
PPTX
Number Theory 5 Sem.pptx
PPTX
Network security & cryptography
PPT
Cyber security Unit 3 Cryptography and Network security
PPTX
Crpto ppt
PPT
Cryptography cse,ru
PPTX
Cryptography 130919084510-phpapp02(2)
PPTX
Technical Seminar. cryptography ppt for college
PPTX
Basics of Cryptography presentation.pptx
DOC
Cryptography
PPTX
The network security and cryptography topic
PPT
Sunanda cryptography ppt
UNIT 3 Information Security Sharad Institute
Fundamentals of cryptography
Chapter 5 - Enkripsi dan Kriptograpi.pptx
Vtu network security(10 ec832) unit 2 notes..
Chapter 1 2
Encryption
Cryptography
Cryptography and Network Security Principles.pptx
Cryptography and network security
Number Theory 5 Sem.pptx
Network security & cryptography
Cyber security Unit 3 Cryptography and Network security
Crpto ppt
Cryptography cse,ru
Cryptography 130919084510-phpapp02(2)
Technical Seminar. cryptography ppt for college
Basics of Cryptography presentation.pptx
Cryptography
The network security and cryptography topic
Sunanda cryptography ppt
Ad

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
additive manufacturing of ss316l using mig welding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Well-logging-methods_new................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Sustainable Sites - Green Building Construction
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CH1 Production IntroductoryConcepts.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
R24 SURVEYING LAB MANUAL for civil enggi
Internet of Things (IOT) - A guide to understanding
CYBER-CRIMES AND SECURITY A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
additive manufacturing of ss316l using mig welding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Well-logging-methods_new................
bas. eng. economics group 4 presentation 1.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Sustainable Sites - Green Building Construction
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf

Cryptography and network security