SlideShare a Scribd company logo
Network Security
and Cryp ography
Ansh Bhawnani
“Your network is your net worth.
2
2
Network Security and Cryptography
3
Network Security
Network Security
4
What is Security?
Network Security
5
Network Security Principles
Confidentiality
6
1
Integrity
7
2
Availability
8
3
Network Security
9
Network Security
10
But why Security?
Network Security
▰ Only allow access to those who need it
▰ Provide authentication and access
control
▰ Guarantee availability of resources
▰ To not lose millions!
11
Network Security
12
Network Security Attacks
“The way the networking works, is
actually it’s own weakness.
13
13
Network Security
14
1.Passive Attacks
Network Security
15
Network Security
16
2. Active Attacks
Network Security
17
Network Security
18
1.Man in the Middle
Attack
This is where the destruction begins
Man in the Middle Attack (MiTM)
19
Man in the Middle Attack (MiTM)
20
How does it happen?
ARP Poisoning
Man in the Middle Attack (MiTM)
21
▰ ARP- Links IP address with MAC addresses
▰ ARP Poisoning/spoofing means faking a network
device
▰ Attacker will exploit working of the ARP protocol
▰ Attacker can forge an ARP packet with his MAC for a
legitimate IP address
ARP Poisoning 22
ARP Working
ARP Poisoning 23
ARP Poisoning
DNS Poisoning/Spoofing
Man in the Middle Attack (MiTM)
24
▰ Consequence of MiTM attack
▰ Exploitation of the DNS system
▰ Attacker is in the middle of DNS server and victim
▰ Attacker sends any IP he wants in response
DNS Poisoning 25
DNS Poisoning
Network Security
26
2. Denial of Service
DoS Attack 27
Denial of Service (DoS)
DDoS Attack 28
Distributed Denial of Service (DDoS)
Network Security
29
3. Eavesdropping
Network Security
30
4. Password Based Attacks
Password Based Attacks
Brute Force
▰ Simultaneously
try any huge
number of
random strings
Dictionary Based
▰ Target Specific
▰ Try every
combination from
a text/dictionary
file
Rainbow Tables
▰ Large file with
precomputed
hashes of strings
▰ Cracking very
fast, matter of
seconds
31
Network Security
32
5. Social Engineering
Which has no cure.
Network Security
33
What about “Security” then?
Network Security and Cryptography
34
Cryptography
Cryptography
▰ Study of techniques for secure communications
through insecure channels
▰ Fulfills confidentiality, integrity and non-repudiation
▰ Teaches how to convert sensible data into random
junk!
35
Cryptography
36
Cryptography
37
Cryptography
38
Cryptography Terms
Cryptography
Plaintext
▰ Original message
▰ Anyone can read
▰ E.g, “Alice”
Cipher key
▰ Cryptographic
function
▰ Tells how to
transform
plaintext into that
random junk
Cipher text
▰ That random junk
we got after
applying cipher
key on plaintext
▰ Unreadable,
useless
▰ E.g., “#r4Tf2%#”
39
Cryptography
Hash
▰ Random fixed length string
▰ Irreversible one way function
▰ Provides integrity
▰ E.g., MD5, SHA-1
Salt
▰ Additional security
▰ Eradicates brute force and
cracking
▰ Appended at beginning or end of
plaintext
40
Cryptography
Block cipher
▰ Divide a message into fixed size
blocks
▰ Encrypt each block individually
▰ Integrate all the outputs to obtain
final ciphertext
Stream Cipher
▰ Encrypt the message as a
sequence of bytes
▰ Encrypt the data bit by bit
41
Cryptography
Private key
▰ No question of sharing!
▰ Used for decrypting
▰ Completely confidential
▰ Limit only to yourself, that too in
your deepest vaults!
42
Public key
▰ Used for encrypting data
▰ Not confidential, boast about it!
▰ Your partner should have it!
Cryptography
43
Cryptanalysis
▰ Study of ciphertext and cryptosystems
▰ To find how they work, internally
▰ To break them
▰ Reversing the techniques of cryptography
Cryptography
44
Types of Cryptography
Types of Cryptography
45
Cryptography
46
1. Symmetric Encryption
Symmetric Cryptography
47
Cryptography
48
Encryption Standards
Cryptography
Advanced Encryption Standard (AES)
▰ Block cipher based on Rjindael
▰ Used for decrypting
▰ Completely confidential
▰ Limit only to yourself, that too
in your deepest vaults!
49
Data Encryption Standard (DES)
▰ Most widely used block cipher
▰ Introduced in 1977 by NIST
▰ Block Size- 64 bit
▰ Key size- 56 bit
Cryptography
50
Disadvantages of Symmetric Encryption
▰ Problem of key exchange
▰ Digital Signatures not applicable
▰ Known attacks
Cryptography
51
2. Asymmetric Encryption/
Public Key Cryptography
Asymmetric Cryptography
52
Cryptography
53
Types of Public Key Cryptography
▰ Rivest Shamir Adleman (RSA)
▰ Elgamal
▰ Diffie Hellman
▰ Elliptical Curve
Cryptography
54
Applications of Cryptography
▰ Secure Communications over insecure channels (public)
▰ End to End Encryption
▰ Asymmetric- Exchanging session keys for symmetric
communications
▰ Protecting data at rest (passwords, social, card numbers,
etc.)
▰ Digital Signatures
Network Security
55
Firewalls
Network Security
56
Intrusion Detection
Systems (IDS/IPS)
Network Security
57
UPDATE, UPDATE, UPDATE!!
Network Security
58
Stay smart, Boycott Stupidity
Network Security is not singular
59
Network Security and Cryptography
Neglecting security
in life is where IoT
becomes Internet
of Threats.
60
80%<
This much companies face lack of
expertise in cyber security, in India!
61
62
THANKS!
Any questions?

More Related Content

PDF
Web Security.pdf
PPTX
Information on Brute Force Attack
PPTX
WannaCry / Wannacrypt Ransomware
PPT
PPT
Bruteforce basic presentation_file - linx
PPTX
Crypto failures every developer should avoid
PPTX
A Brief History of Cryptographic Failures
PPTX
Ransomware - Impact, Evolution, Prevention
Web Security.pdf
Information on Brute Force Attack
WannaCry / Wannacrypt Ransomware
Bruteforce basic presentation_file - linx
Crypto failures every developer should avoid
A Brief History of Cryptographic Failures
Ransomware - Impact, Evolution, Prevention

What's hot (20)

PPTX
Man in the middle attack (mitm)
PDF
What is wanna cry ransomware attack
PDF
How to protect your business from Wannacry Ransomware
PPTX
Brute force attack
PDF
Java script and web cryptography (cf.objective)
PDF
Cryptography In The Browser Using JavaScript
PPTX
Using Cryptography Properly in Applications
PDF
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
PDF
Evolution Of Web Security
PDF
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
PPTX
Cryptolocker Ransomware Attack
PPTX
Password craking techniques
PDF
Network Security Applications
PDF
Email security &amp; threads
PPTX
Mitm(man in the middle) ssl proxy attacks
PPTX
Web security by khubaib
DOCX
Password hacking
PDF
Beyond Security Theater
PDF
Introduction to Web Application Security - Blackhoodie US 2018
PPTX
Cybersecurity Essentials - Part 2
Man in the middle attack (mitm)
What is wanna cry ransomware attack
How to protect your business from Wannacry Ransomware
Brute force attack
Java script and web cryptography (cf.objective)
Cryptography In The Browser Using JavaScript
Using Cryptography Properly in Applications
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Evolution Of Web Security
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Cryptolocker Ransomware Attack
Password craking techniques
Network Security Applications
Email security &amp; threads
Mitm(man in the middle) ssl proxy attacks
Web security by khubaib
Password hacking
Beyond Security Theater
Introduction to Web Application Security - Blackhoodie US 2018
Cybersecurity Essentials - Part 2
Ad

Similar to Network Security and Cryptography.pdf (20)

PDF
Chapter 1 2
PPTX
Chapter 1 information assurance and security
PPT
Hardware Network Trojans for neural Networks
PPTX
The network security and cryptography topic
PPTX
Introduction to Network Security
PPT
Sunanda cryptography ppt
PPTX
Fundamental Concept of Cryptography in Computer Security
PPTX
chapter 7.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PPT
network security knowledge.ppt
PPT
Chap8_Network Security.ppt
PPT
Chp8.ppt
PPTX
Network security & cryptography
PPTX
Network security & cryptography
DOCX
network security
PDF
Chapter 1- Fundamentals of Cryptography.pdf
PPTX
jim kurose cn bookChapter_8new_v8.1.pptx
PPT
security
PPTX
Cyber security
PPT
Information Security
Chapter 1 2
Chapter 1 information assurance and security
Hardware Network Trojans for neural Networks
The network security and cryptography topic
Introduction to Network Security
Sunanda cryptography ppt
Fundamental Concept of Cryptography in Computer Security
chapter 7.pptx
Cryptography and Network Security-ch1-4.pptx
network security knowledge.ppt
Chap8_Network Security.ppt
Chp8.ppt
Network security & cryptography
Network security & cryptography
network security
Chapter 1- Fundamentals of Cryptography.pdf
jim kurose cn bookChapter_8new_v8.1.pptx
security
Cyber security
Information Security
Ad

Recently uploaded (20)

PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Artificial Intelligence
PPT
Occupational Health and Safety Management System
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
Current and future trends in Computer Vision.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
introduction to high performance computing
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
August 2025 - Top 10 Read Articles in Network Security & Its Applications
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Categorization of Factors Affecting Classification Algorithms Selection
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Artificial Intelligence
Occupational Health and Safety Management System
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Fundamentals of safety and accident prevention -final (1).pptx
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Management Information system : MIS-e-Business Systems.pptx
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Module 8- Technological and Communication Skills.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Current and future trends in Computer Vision.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
introduction to high performance computing

Network Security and Cryptography.pdf