SlideShare a Scribd company logo
NETWORK SECURITY
NAME OF THE STAFF : Mrs. M. FLORANCE DYANA
NAME OF THE STUDENT : S.MAREESWARI,
J.GAYATHRI DEVI,
R.KAVITHA.
REGISTER NUMBER : CB17S 250393
CB17S 250370
CB17S 250383
SUBJECT CODE : P8MCA27
CLASS : III BCA-A
BATCH : 2017-2020
YEAR : 2019-2020
Network Security and Cryptography
 Introduction
 Symmetric vs asymmetric ciphers
 Stream ciphers
 The life cycle and management of keys
 Classical encryption standards
 Basic terminology
 Symmetric cipher model
 Unconditional& computational security
 steganography
Introduction
symmetric key algorithm(aka ciphers) are
commonly used to product the confidentiality of
data, both at rest(e.g in storage devise) and in
transit (e. g over networks).
The term symmetric comes from the fact that
the same key is used both for encryption and
decryption.
Symmetric vs Asymmetric encryption
 The main advantage of symmetric encryption over
asymmetric encryption is that it is fast and efficient
for large amount of data.
 The disadvantage is the need to keep the key
secret this can be especially challenging where
encryption and decryption take place in different
location, requiring the key to be moved safely
between locations.
Stream ciphers
 Stream ciphers such as RC4 encrypt the plain text
one bit at a time and require a key in the form of a
pseudo _random bit stream(PRBS) this must be the
same for encryption and decryption, hence the need for
a secret key to seed the PRBS.
 Stream ciphers are less commonly used then block
ciphers, as the latter offer certain security benefits-
specifically they feature high diffusion (i.e. information
from one plain text symbol is diffused in to several
ciphertext symbols) and immunity to tampering (i.e. it is
difficult to insert symbols in to the ciphertext without
detection).
The lifecycle and management of keys
 As can be seen from the foregoing, keys are a critical
component of modern cryptography.
 Without keys cryptography depends on the algorithm
itself being secret, whereas using keys meaning that the
algorithm can the fully known to an attacker , as long as
keys(i.e. symmetric keys or asymmetric private keys)
are kept secret.
 Thus, strong algorithm can be developed and used by
everyone.
Classical encryption techniques
 To basic component in classical ciphers:
- substitution ciphers: letters replaced by other letters
-Transposition ciphers: same letters, but arranged in
different order.
 These ciphers may be:
-monoalphabetic : only one substitution/transposition is
use.
-polyalphabetic: where several substitution
/transposition are used
 several such ciphers may be concatenated together to form a
product cipher.
Basic terminology
Plaintext: original message to be encrypted
Ciphertext: the encrypted message
Enciphering or encryption: the process of
converting plaintext into ciphertext
Encryption algorithm: performs encryption
-two inputs: a plaintext and a secret
key
Symmetric cipher model
Symmetric cipher: same key used for encryption and
decryption
Block cipher: encrypts a block of plaintext at a time
(typically 64 or 128 bits)
Stream cipher: encrypts data one bit or one byte at a
time
Asymmetric cipher: different keys used for encryption
and decryption
Unconditional & Computational Security
 A cipher is unconditionally secure if it is secure no
matter how much resources (time, space) the attacker
has.
 A cipher is computationally secure if the best algorithm
for breaking it will require so much resources (e.g.,
1000 years) that practically the cryptosystem is secure.
 All the ciphers we have examined are not
unconditionally secure.
Steganography
 Hide a message in another message.
 E.g., hide your plaintext in a graphic image
 Each pixel has 3 bytes specifying the RGB color
 The least significant bits of pixels can be changed w/o greatly
affecting the image quality
 So can hide messages in these LSBs
 Advantage: hiding existence of messages
 Drawback: high overhead

More Related Content

PPTX
Symmetric and Asymmetric Encryption
PPTX
Cryptography
PPT
Cryptography
PPT
Cryptography and E-Commerce
PPTX
Encryption
PPTX
Overview of cryptography
PDF
Information Security Cryptography ( L01- introduction )
Symmetric and Asymmetric Encryption
Cryptography
Cryptography
Cryptography and E-Commerce
Encryption
Overview of cryptography
Information Security Cryptography ( L01- introduction )

What's hot (20)

PPTX
Cryptography
PPTX
Cryptography Presentation
PPTX
Network security and cryptography
PPTX
cryptography and network security
PPT
Information Security & Cryptography
PPTX
Encryption ppt
PPTX
Cryptography and encryption
PPTX
Cryptanalysis 101
PPS
Criptography
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PPTX
Encryption.ppt
PPTX
Cryptography
PDF
Cryptology - The practice and study of hiding information
PDF
Presentation on Cryptography
PPTX
PPT
Encryption technology
PPTX
Advanced cryptography and implementation
PPT
Cryptography
PPTX
Cryptography
Cryptography
Cryptography Presentation
Network security and cryptography
cryptography and network security
Information Security & Cryptography
Encryption ppt
Cryptography and encryption
Cryptanalysis 101
Criptography
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Encryption.ppt
Cryptography
Cryptology - The practice and study of hiding information
Presentation on Cryptography
Encryption technology
Advanced cryptography and implementation
Cryptography
Cryptography
Ad

Similar to Network Security and Cryptography (20)

PPT
Iss lecture 2
PPTX
Crpto ppt
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
Cryptography
PPT
Cryptography cse,ru
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
Basic Cryptography.pdf
PPTX
Cryptography & Steganography
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Cryptography and network security Nit701
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPT
6. cryptography
PDF
SYMMETRIC CRYPTOGRAPHY
PPTX
Encryption
DOCX
Cryptography- "A Black Art"
PPTX
Cryptography notes for undergraduate kud
PPTX
Unit -1 cryptography contiues with algorithm.pptx
PDF
Evolution of Cryptography and Cryptographic techniques
PDF
Introduction to Cryptography
PPTX
Cryptography.ppt
Iss lecture 2
Crpto ppt
CISSP - Chapter 3 - Cryptography
Cryptography
Cryptography cse,ru
Vtu network security(10 ec832) unit 2 notes..
Basic Cryptography.pdf
Cryptography & Steganography
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Cryptography and network security Nit701
Detailed description about the concept of E Commerce UNIT IV.pptx
6. cryptography
SYMMETRIC CRYPTOGRAPHY
Encryption
Cryptography- "A Black Art"
Cryptography notes for undergraduate kud
Unit -1 cryptography contiues with algorithm.pptx
Evolution of Cryptography and Cryptographic techniques
Introduction to Cryptography
Cryptography.ppt
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Tartificialntelligence_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
A comparative analysis of optical character recognition models for extracting...
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Tartificialntelligence_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf

Network Security and Cryptography

  • 1. NETWORK SECURITY NAME OF THE STAFF : Mrs. M. FLORANCE DYANA NAME OF THE STUDENT : S.MAREESWARI, J.GAYATHRI DEVI, R.KAVITHA. REGISTER NUMBER : CB17S 250393 CB17S 250370 CB17S 250383 SUBJECT CODE : P8MCA27 CLASS : III BCA-A BATCH : 2017-2020 YEAR : 2019-2020
  • 3.  Introduction  Symmetric vs asymmetric ciphers  Stream ciphers  The life cycle and management of keys  Classical encryption standards  Basic terminology  Symmetric cipher model  Unconditional& computational security  steganography
  • 4. Introduction symmetric key algorithm(aka ciphers) are commonly used to product the confidentiality of data, both at rest(e.g in storage devise) and in transit (e. g over networks). The term symmetric comes from the fact that the same key is used both for encryption and decryption.
  • 5. Symmetric vs Asymmetric encryption  The main advantage of symmetric encryption over asymmetric encryption is that it is fast and efficient for large amount of data.  The disadvantage is the need to keep the key secret this can be especially challenging where encryption and decryption take place in different location, requiring the key to be moved safely between locations.
  • 6. Stream ciphers  Stream ciphers such as RC4 encrypt the plain text one bit at a time and require a key in the form of a pseudo _random bit stream(PRBS) this must be the same for encryption and decryption, hence the need for a secret key to seed the PRBS.  Stream ciphers are less commonly used then block ciphers, as the latter offer certain security benefits- specifically they feature high diffusion (i.e. information from one plain text symbol is diffused in to several ciphertext symbols) and immunity to tampering (i.e. it is difficult to insert symbols in to the ciphertext without detection).
  • 7. The lifecycle and management of keys  As can be seen from the foregoing, keys are a critical component of modern cryptography.  Without keys cryptography depends on the algorithm itself being secret, whereas using keys meaning that the algorithm can the fully known to an attacker , as long as keys(i.e. symmetric keys or asymmetric private keys) are kept secret.  Thus, strong algorithm can be developed and used by everyone.
  • 8. Classical encryption techniques  To basic component in classical ciphers: - substitution ciphers: letters replaced by other letters -Transposition ciphers: same letters, but arranged in different order.  These ciphers may be: -monoalphabetic : only one substitution/transposition is use. -polyalphabetic: where several substitution /transposition are used  several such ciphers may be concatenated together to form a product cipher.
  • 9. Basic terminology Plaintext: original message to be encrypted Ciphertext: the encrypted message Enciphering or encryption: the process of converting plaintext into ciphertext Encryption algorithm: performs encryption -two inputs: a plaintext and a secret key
  • 11. Symmetric cipher: same key used for encryption and decryption Block cipher: encrypts a block of plaintext at a time (typically 64 or 128 bits) Stream cipher: encrypts data one bit or one byte at a time Asymmetric cipher: different keys used for encryption and decryption
  • 12. Unconditional & Computational Security  A cipher is unconditionally secure if it is secure no matter how much resources (time, space) the attacker has.  A cipher is computationally secure if the best algorithm for breaking it will require so much resources (e.g., 1000 years) that practically the cryptosystem is secure.  All the ciphers we have examined are not unconditionally secure.
  • 13. Steganography  Hide a message in another message.  E.g., hide your plaintext in a graphic image  Each pixel has 3 bytes specifying the RGB color  The least significant bits of pixels can be changed w/o greatly affecting the image quality  So can hide messages in these LSBs  Advantage: hiding existence of messages  Drawback: high overhead