SlideShare a Scribd company logo
Network security
• A specialized field in computer networking that involves securing a computer
network infrastructure.
• handled by a network administrator or system administrator who implements the
security policy, network software and hardware needed to protect.
• prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources.
• covers both, public and private networks, that are used in
 everyday jobs
 conducting transactions and communications among businesses
 government agencies individuals.
• Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
• Provide authentication and access control for resources
• Guarantee availability of resources
• Authentication
 The process of verifying the identity of a user
 Password, Key, smart card or other device, fingerprint, voice, or retinal scans
• Access control
 Limits the access to authorized users, resources provided by the application
• Confidentiality
 Protects against unauthorized release of message content
• Integrity
 Guarantees that a message is received as sent
• Non-repudiation
 Protects against sender/receiver denying sending/receiving a message
 Someone cannot deny something
• Availability
 Guarantees that the system services are always available when needed
• Security Audit
 Keeps track of transaction for late use (diagnostic, alarms…)
• Key Management
 Allows to negotiate, setup and maintain keys between communicating entities
Network security
• Cryptography is the science and art of
transforming messages to make them secure and
immune to attack.
• The word ‘cryptography’ was coined by combining
two Greek words, ‘Krypto’ meaning hidden and
‘graphene’ meaning writing.
• an implementation of cryptographic techniques and their accompanying
infrastructure to provide information security services.
• A cryptosystem is also referred to as a cipher system.
The objective of cryptosystem
at the end of the process, only
the sender and the receiver will
know the plaintext.
• Plaintext
 It is the data to be protected during transmission.
• Encryption Algorithm
 a cryptographic algorithm that takes plaintext and an encryption key as input
and produces a ciphertext.
• Ciphertext
 scrambled version of the plaintext produced by the encryption algorithm using a
specific the encryption key.
• Decryption Algorithm
 a cryptographic algorithm that takes a ciphertext and a decryption key as input,
and outputs a plaintext.
• Encryption Key
 a value that is known to the sender.
 The sender inputs the encryption key into the encryption
algorithm along with the plaintext in order to
compute the ciphertext.
• Brute force
 Try every possible key until plain text
is achieved
• Decryption Key
 a value that is known to the receiver.
 It is related to the encryption key, but is not always identical to it.
 The receiver inputs the decryption key into the decryption algorithm along with
the ciphertext in order to compute the plaintext.
• Interceptor (an attacker)
 an unauthorized entity who attempts to determine the plaintext.
 can see the ciphertext and may know the decryption algorithm.
 He, however, must never know the decryption key.
Network security
• Symmetric Key Algorithms (AES , DES, IDEA)
• Public–Key Algorithms or Asymmetric cryptography
• Digital Signatures
Network security
• Symmetric-key algorithms
 use the same cryptographic keys for both encryption of plaintext and decryption
of ciphertext.
 keys may be identical or there may be a simple transformation to go between the
two keys.
 the keys, represent a shared secret between two or more parties that can be
used to maintain a private information link.
 same key is one of the main drawbacks of symmetric key encryption.
• Symmetric-key Cryptography
• Substitution Ciphers
A substitution technique is one in which the letters/number/symbols of plaintext
are replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
• Caesar Cipher
• Replace each letter with the letter standing x place further
• Example: (x=3)
• Plain : meet me after the party
• Cipher : phhw ph diwhu wkh sduwb
• If Key space : 25 • Brut force attack : try 25 possibilities
• TRANSPOSITION CIPHER
In the transposition technique the positions of letters/numbers/symbols in
plaintext is changed with one another.
Plain text : MEET ME AFTER PARTY
Cipher text : TEMEEMEFAPTRYRAT
KEY USED : 421635
• Types of Symmetric-key algorithms
 Symmetric key algorithms can be divided into two categories: block and stream.
 Block algorithms encrypt data a block (many bytes) at a time, while stream
algorithms encrypt byte by byte (or even bit by bit).
• Examples of Symmetric algorithms
 AES (Advanced Encryption Standard)
 DES (Digital Encryption Standard)
 IDEA (International Data Encryption Algorithm) and etc.
• Other terms for symmetric-key encryption
 secret-key
 single-key
 shared-key
 one-key
 private-key
Network security
• Based on mathematical algorithms
• Asymmetric
 Use two separate keys
• Ingredients
 Plain text
 Encryption algorithm
 Public and private key
 Cipher text
 Decryption algorithm
• Encryption
• Public Key Encryption - Authentication
• Public Key Encryption – Operation
 One key made public
o Used for encryption
 Other kept private
o Used for decryption
 Infeasible to determine decryption key given encryption key and algorithm
 Either key can be used for encryption, the other for decryption
• Public Key Encryption – Steps
 User generates pair of keys
 User places one key in public domain
 To send a message to user, encrypt using public key
 user decrypts using private key
• RSA Algorithm
• n = pq, where p and q are distinct primes.
• phi, φ = (p-1)(q-1)
• e < n such that gcd(e, phi)=1
• d = e-1 mod phi.
• c = me mod n, 1<m<n.
• m = cd mod n.
• A very simple example of RSA encryption
• A very simple example of RSA encryption
• Difference
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1. The same algorithm with the same key is
used for encryption and decryption.
2. The key must be kept secret.
3. It may be impossible or at least impractical
to decipher a message if no other
information is available.
1. One algorithm is used for encryption and
decryption with a pair of keys, one for
encryption and one for decryption.
2. One of the two keys must be kept secret.
3. It may be impossible or at least impractical
to decipher a message if no other
information is available.
Network security
• not to be confused with a digital certificate
• it is a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document.
• Sender encrypts message with their private key
• Receiver can decrypt using senders public key
• This authenticates sender, who is only person who has the matching key
• Does not give privacy of data
 Decrypt key is public
• How digital signatures work
o Digital signatures are based on public key cryptography
o such as RSA, one can generate two keys that are mathematically linked: one
private and one public.
• How to create a digital signature
o signing software (such as an email program) creates a one-way hash of the
electronic data to be signed.
o The private key is then used to encrypt the hash. along with other information,
such as the hashing algorithm -- is the digital signature.
o The reason for encrypting the hash instead of the entire message or document
is that a hash function can convert an arbitrary input into a fixed length value,
which is usually much shorter. This saves time since hashing is much faster than
signing.
Message
+
Signature
Hash
Decrypt
Signature
With Sender’s
Public Key
SIGN hash
With Sender’s
Private key
Message
+
signature
COMPARE
Calculated
HashMessage
Sender Receiver
Hash
Sent thru’ Internet
if
OK
Signatures
verified
• Private key protection
 The Private key generated is to be protected and kept secret.
The responsibility of the secrecy of the key lies with the
owner.
 The key is secured using
 PIN Protected soft token
 Smart Cards
 Hardware Tokens
• Most modern email programs
 the use of digital signatures and digital certificates making it easy to sign any
outgoing emails and validate digitally signed incoming messages.
• Digital signatures are also used extensively to provide
 proof of authenticity
 data integrity
 non-repudiation of communications and transactions conducted over the
Internet.
What are the benefits of digital signatures?
 Authentication and Integrity
Paper signatures v/s Digital Signatures
Parameter Paper Electronic
Authenticity May be forged Can not be copied
Integrity Signature independent
of the document
Signature depends on
the contents of the
document
Non-
repudiation
a. Handwriting
expert needed
b. Error prone
a. Any computer
user
b. Error free
V/s
Network security

More Related Content

PDF
BAIT1103 Chapter 3
PPSX
5 Cryptography Part1
PDF
Public Key Encryption & Hash functions
PDF
RSA Algoritmn
PPTX
cryptography
PDF
Encryption and Key Distribution Methods
PDF
CNS - Unit - 1 - Introduction
BAIT1103 Chapter 3
5 Cryptography Part1
Public Key Encryption & Hash functions
RSA Algoritmn
cryptography
Encryption and Key Distribution Methods
CNS - Unit - 1 - Introduction

What's hot (20)

PDF
CNS - Unit - 4 - Public Key Cryptosystem
PPTX
Cryptography
PPT
Distribution of public keys and hmac
PDF
BAIT1103 Chapter 2
PPTX
Network security
PPTX
Cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPSX
Cryptography
PPT
Chapter 15 - Security
DOC
MAJOR PROJECT FORMAT--2013(new 1)
PPTX
Introduction to cryptography part1-final
PPTX
Cryptographic tools
 
PPTX
20 security
PPT
Cryptography 1
PPT
Cryptography and network security
PPTX
Public key Cryptography & RSA
PPT
PPTX
Basic cryptography
PPTX
Intro to modern cryptography
CNS - Unit - 4 - Public Key Cryptosystem
Cryptography
Distribution of public keys and hmac
BAIT1103 Chapter 2
Network security
Cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
Chapter 15 - Security
MAJOR PROJECT FORMAT--2013(new 1)
Introduction to cryptography part1-final
Cryptographic tools
 
20 security
Cryptography 1
Cryptography and network security
Public key Cryptography & RSA
Basic cryptography
Intro to modern cryptography
Ad

Viewers also liked (10)

PPTX
Enterprise IT Security| CIO Innovation and Leadership
PDF
Network security
PPTX
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
PDF
Industry 4 network design and security - Peter Brown
PPTX
Network security
PPTX
Data Network Security
PPTX
Network security
PPT
Network Security
PPT
Network security
PDF
Network Security Presentation
Enterprise IT Security| CIO Innovation and Leadership
Network security
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Industry 4 network design and security - Peter Brown
Network security
Data Network Security
Network security
Network Security
Network security
Network Security Presentation
Ad

Similar to Network security (20)

PDF
Information Security 05- Encryption.pdfn
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
groupWork.pptx
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
CRYPTOGRAPHY and its applications .pptx
PPTX
PPTX
Introduction to Cryptography and digital signatures
DOCX
Cryptography : The Art of Secured Messaging
PPTX
Symmetric ciphermodel
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
PPTX
big data and Iot , its security part ,hoe yoy help this
PPTX
Encryption techniques
PPTX
Cryptography and Network Security Principles.pptx
PPT
Cryptography
PPT
Info security & crypto
PPTX
Information-Security-Lecture-8.pptx
PPTX
Encrytion ppt
PDF
chapter 1-4.pdf
PDF
information technology cryptography Msc chapter 1-4.pdf
PDF
Basic Cryptography.pdf
Information Security 05- Encryption.pdfn
Detailed description about the concept of E Commerce UNIT IV.pptx
groupWork.pptx
CISSP - Chapter 3 - Cryptography
CRYPTOGRAPHY and its applications .pptx
Introduction to Cryptography and digital signatures
Cryptography : The Art of Secured Messaging
Symmetric ciphermodel
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
big data and Iot , its security part ,hoe yoy help this
Encryption techniques
Cryptography and Network Security Principles.pptx
Cryptography
Info security & crypto
Information-Security-Lecture-8.pptx
Encrytion ppt
chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Basic Cryptography.pdf

Recently uploaded (20)

PPTX
UNIT 4 Total Quality Management .pptx
DOCX
573137875-Attendance-Management-System-original
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Well-logging-methods_new................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Digital Logic Computer Design lecture notes
UNIT 4 Total Quality Management .pptx
573137875-Attendance-Management-System-original
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Operating System & Kernel Study Guide-1 - converted.pdf
Lecture Notes Electrical Wiring System Components
Embodied AI: Ushering in the Next Era of Intelligent Systems
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Well-logging-methods_new................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Structs to JSON How Go Powers REST APIs.pdf
Construction Project Organization Group 2.pptx
bas. eng. economics group 4 presentation 1.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Digital Logic Computer Design lecture notes

Network security

  • 2. • A specialized field in computer networking that involves securing a computer network infrastructure. • handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect. • prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
  • 3. • covers both, public and private networks, that are used in  everyday jobs  conducting transactions and communications among businesses  government agencies individuals.
  • 4. • Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc. • Provide authentication and access control for resources • Guarantee availability of resources
  • 5. • Authentication  The process of verifying the identity of a user  Password, Key, smart card or other device, fingerprint, voice, or retinal scans • Access control  Limits the access to authorized users, resources provided by the application • Confidentiality  Protects against unauthorized release of message content • Integrity  Guarantees that a message is received as sent
  • 6. • Non-repudiation  Protects against sender/receiver denying sending/receiving a message  Someone cannot deny something • Availability  Guarantees that the system services are always available when needed • Security Audit  Keeps track of transaction for late use (diagnostic, alarms…) • Key Management  Allows to negotiate, setup and maintain keys between communicating entities
  • 8. • Cryptography is the science and art of transforming messages to make them secure and immune to attack. • The word ‘cryptography’ was coined by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing.
  • 9. • an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. • A cryptosystem is also referred to as a cipher system. The objective of cryptosystem at the end of the process, only the sender and the receiver will know the plaintext.
  • 10. • Plaintext  It is the data to be protected during transmission. • Encryption Algorithm  a cryptographic algorithm that takes plaintext and an encryption key as input and produces a ciphertext. • Ciphertext  scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key.
  • 11. • Decryption Algorithm  a cryptographic algorithm that takes a ciphertext and a decryption key as input, and outputs a plaintext. • Encryption Key  a value that is known to the sender.  The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext. • Brute force  Try every possible key until plain text is achieved
  • 12. • Decryption Key  a value that is known to the receiver.  It is related to the encryption key, but is not always identical to it.  The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext. • Interceptor (an attacker)  an unauthorized entity who attempts to determine the plaintext.  can see the ciphertext and may know the decryption algorithm.  He, however, must never know the decryption key.
  • 14. • Symmetric Key Algorithms (AES , DES, IDEA) • Public–Key Algorithms or Asymmetric cryptography • Digital Signatures
  • 16. • Symmetric-key algorithms  use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.  keys may be identical or there may be a simple transformation to go between the two keys.  the keys, represent a shared secret between two or more parties that can be used to maintain a private information link.  same key is one of the main drawbacks of symmetric key encryption.
  • 18. • Substitution Ciphers A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6 • Caesar Cipher • Replace each letter with the letter standing x place further • Example: (x=3) • Plain : meet me after the party • Cipher : phhw ph diwhu wkh sduwb • If Key space : 25 • Brut force attack : try 25 possibilities
  • 19. • TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another. Plain text : MEET ME AFTER PARTY Cipher text : TEMEEMEFAPTRYRAT KEY USED : 421635
  • 20. • Types of Symmetric-key algorithms  Symmetric key algorithms can be divided into two categories: block and stream.  Block algorithms encrypt data a block (many bytes) at a time, while stream algorithms encrypt byte by byte (or even bit by bit).
  • 21. • Examples of Symmetric algorithms  AES (Advanced Encryption Standard)  DES (Digital Encryption Standard)  IDEA (International Data Encryption Algorithm) and etc. • Other terms for symmetric-key encryption  secret-key  single-key  shared-key  one-key  private-key
  • 23. • Based on mathematical algorithms • Asymmetric  Use two separate keys • Ingredients  Plain text  Encryption algorithm  Public and private key  Cipher text  Decryption algorithm
  • 25. • Public Key Encryption - Authentication
  • 26. • Public Key Encryption – Operation  One key made public o Used for encryption  Other kept private o Used for decryption  Infeasible to determine decryption key given encryption key and algorithm  Either key can be used for encryption, the other for decryption
  • 27. • Public Key Encryption – Steps  User generates pair of keys  User places one key in public domain  To send a message to user, encrypt using public key  user decrypts using private key
  • 28. • RSA Algorithm • n = pq, where p and q are distinct primes. • phi, φ = (p-1)(q-1) • e < n such that gcd(e, phi)=1 • d = e-1 mod phi. • c = me mod n, 1<m<n. • m = cd mod n.
  • 29. • A very simple example of RSA encryption
  • 30. • A very simple example of RSA encryption
  • 31. • Difference SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY 1. The same algorithm with the same key is used for encryption and decryption. 2. The key must be kept secret. 3. It may be impossible or at least impractical to decipher a message if no other information is available. 1. One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption. 2. One of the two keys must be kept secret. 3. It may be impossible or at least impractical to decipher a message if no other information is available.
  • 33. • not to be confused with a digital certificate • it is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. • Sender encrypts message with their private key • Receiver can decrypt using senders public key • This authenticates sender, who is only person who has the matching key • Does not give privacy of data  Decrypt key is public
  • 34. • How digital signatures work o Digital signatures are based on public key cryptography o such as RSA, one can generate two keys that are mathematically linked: one private and one public. • How to create a digital signature o signing software (such as an email program) creates a one-way hash of the electronic data to be signed. o The private key is then used to encrypt the hash. along with other information, such as the hashing algorithm -- is the digital signature. o The reason for encrypting the hash instead of the entire message or document is that a hash function can convert an arbitrary input into a fixed length value, which is usually much shorter. This saves time since hashing is much faster than signing.
  • 35. Message + Signature Hash Decrypt Signature With Sender’s Public Key SIGN hash With Sender’s Private key Message + signature COMPARE Calculated HashMessage Sender Receiver Hash Sent thru’ Internet if OK Signatures verified
  • 36. • Private key protection  The Private key generated is to be protected and kept secret. The responsibility of the secrecy of the key lies with the owner.  The key is secured using  PIN Protected soft token  Smart Cards  Hardware Tokens
  • 37. • Most modern email programs  the use of digital signatures and digital certificates making it easy to sign any outgoing emails and validate digitally signed incoming messages. • Digital signatures are also used extensively to provide  proof of authenticity  data integrity  non-repudiation of communications and transactions conducted over the Internet. What are the benefits of digital signatures?  Authentication and Integrity
  • 38. Paper signatures v/s Digital Signatures Parameter Paper Electronic Authenticity May be forged Can not be copied Integrity Signature independent of the document Signature depends on the contents of the document Non- repudiation a. Handwriting expert needed b. Error prone a. Any computer user b. Error free V/s