SlideShare a Scribd company logo
NETWORK SECURITY
NAME OF THE STAFF : Mrs. M. FLORANCE DYANA
NAME OF THE STUDENT : S.MAREESWARI,
J.GAYATHRI DEVI,
R.KAVITHA.
REGISTER NUMBER : CB17S 250393
CB17S 250370
CB17S 250383
SUBJECT CODE : P8MCA27
CLASS : III BCA-A
BATCH : 2017-2020
YEAR : 2019-2020
Network Security(Symmetric Ciphers)
 Introduction
 Block ciphers
 The feistel for block ciphers
 Data encryption standards(DES)
 Public key cryptography
 RSA encryption
Introduction
 Symmetric ciphers use symmetric algorithms to encrypt
and decrypt data.
 These ciphers are used in symmetric key cryptography.
A symmetric algorithm uses the same key to encrypt
data as it does to decrypt data.
 Symmetric ciphers are the opposite of symmetric
ciphers, like those used in public-key
cryptography.
 These ciphers use asymmetric algorithm which
use one key to encrypt data and a different key to
decrypt ciphers.
 For example,
 A symmetric algorithm will use key K to encrypt
some plain text information like a ciphertext.
Block ciphers
 Block ciphers is one in which the plaintext is
divided in blocks and one block is encrypted at
one time producing a ciphertext of equal length
 Similar to substitution ciphers on very big
characters: 64 bits or 128 bits are typical block
lengths.
 Many modern ciphers are block ciphers.
The feistel structure for block ciphers
 The DES algorithm for encryption and
decryption , which is the main theme of this
lecture, is based on what is known as the Feistel
structure.
 Named after the IBM cryptographer Horst Feistel
structure and first implemented in the Lucifer by
Horst Feistel and Don Coppersmith.
Data encryption standards(DES)
 DES is a symmetric system
that was once a predominant
standards in the 1970s but
has since fallen our of favour
due to its low security.
 Its introduction sparked
heated debate about the role
of standards in cryptography
and led to much research and
innovation in the field.
 DES use block ciphers. The block ciphers in
DES consists of 56 random bits, and 8 more bits
are used for error detection.
 These error detecting bits makes DES
unmalleable-attacks can’t change the ciphers on
its way to its destination because they might
accidentally delete a bit used for error detection,
and then receivers would known the data had
been attacked.
public-key cryptography
Public –key cryptography refers to a
class of cryptographic system in
which each actor uses two keys:
public key , private key
The guiding principle is that messages
Intended for a specific person should
be encrypted using their public key in
such a wat that the message can be
only be decrypted through the use of
the corresponding private key.
 Public-key cryptography is important for
securely transmitting messages across a
potentially insecure channel, meaning that it is
assumed all communications can be read by a
malicious attacker.
 As such, public-key cryptography is especially
important for ensuring the security of the
internet.
RSA Encryption
RSA encryption
algorithm, used to
securely transmit
message over the
internet.
It is based on the
principle that it is easy to
multiply large numbers,
but factoring large
number is very difficult.

More Related Content

PPTX
Data encryption
PDF
The des algorithm illustrated
PDF
Group slide presentation week12
PPTX
Overview of cryptography
PPT
Cryptography
PDF
s117
PPTX
Data encryption
PPT
Cryptography and E-Commerce
Data encryption
The des algorithm illustrated
Group slide presentation week12
Overview of cryptography
Cryptography
s117
Data encryption
Cryptography and E-Commerce

What's hot (20)

PDF
CyberGhost VPN Encryption Guide
DOC
Cryptography saurabh
PDF
Week12
PDF
Applied Cryptography
PPTX
PPTX
PDF
Week 12 slide
PDF
Network security jeni corrected 1
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PPTX
Encryption ppt
PDF
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
PDF
Bt0088 cryptography and network security2
PDF
PPTX
Cryptography Presentation
PPTX
Encryption
PPTX
My cryptography
PPTX
Second workshop sxi
PPTX
Cryptography
ODP
Week12 b
CyberGhost VPN Encryption Guide
Cryptography saurabh
Week12
Applied Cryptography
Week 12 slide
Network security jeni corrected 1
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
Encryption ppt
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
Bt0088 cryptography and network security2
Cryptography Presentation
Encryption
My cryptography
Second workshop sxi
Cryptography
Week12 b
Ad

Similar to Network Security(Symmetric Ciphers) (20)

PPTX
Basic Cryptography unit 4 CSS
PPTX
Network Security and Cryptography
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PPT
Introduction To PKI Technology
PPT
Cryptography Lecture by Sam Bowne
PPTX
Seminar on Encryption and Authenticity
PDF
Implementation of DES encryption and decryption Algorithm
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
Cryptographic Algorithms For Secure Data Communication
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PDF
無題 1
PPTX
Cryptography
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
PDF
Review on variants of Security aware AODV
PPTX
Introduction to Cryptography CYB 303.pptx
PDF
Introduction to Cryptography
PPTX
cryptography and network security
Basic Cryptography unit 4 CSS
Network Security and Cryptography
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Ch12 Cryptography it-slideshares.blogspot.com
Introduction To PKI Technology
Cryptography Lecture by Sam Bowne
Seminar on Encryption and Authenticity
Implementation of DES encryption and decryption Algorithm
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Cryptographic Algorithms For Secure Data Communication
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
無題 1
Cryptography
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
Review on variants of Security aware AODV
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography
cryptography and network security
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology

Network Security(Symmetric Ciphers)

  • 1. NETWORK SECURITY NAME OF THE STAFF : Mrs. M. FLORANCE DYANA NAME OF THE STUDENT : S.MAREESWARI, J.GAYATHRI DEVI, R.KAVITHA. REGISTER NUMBER : CB17S 250393 CB17S 250370 CB17S 250383 SUBJECT CODE : P8MCA27 CLASS : III BCA-A BATCH : 2017-2020 YEAR : 2019-2020
  • 3.  Introduction  Block ciphers  The feistel for block ciphers  Data encryption standards(DES)  Public key cryptography  RSA encryption
  • 4. Introduction  Symmetric ciphers use symmetric algorithms to encrypt and decrypt data.  These ciphers are used in symmetric key cryptography. A symmetric algorithm uses the same key to encrypt data as it does to decrypt data.
  • 5.  Symmetric ciphers are the opposite of symmetric ciphers, like those used in public-key cryptography.  These ciphers use asymmetric algorithm which use one key to encrypt data and a different key to decrypt ciphers.  For example,  A symmetric algorithm will use key K to encrypt some plain text information like a ciphertext.
  • 6. Block ciphers  Block ciphers is one in which the plaintext is divided in blocks and one block is encrypted at one time producing a ciphertext of equal length  Similar to substitution ciphers on very big characters: 64 bits or 128 bits are typical block lengths.  Many modern ciphers are block ciphers.
  • 7. The feistel structure for block ciphers  The DES algorithm for encryption and decryption , which is the main theme of this lecture, is based on what is known as the Feistel structure.  Named after the IBM cryptographer Horst Feistel structure and first implemented in the Lucifer by Horst Feistel and Don Coppersmith.
  • 8. Data encryption standards(DES)  DES is a symmetric system that was once a predominant standards in the 1970s but has since fallen our of favour due to its low security.  Its introduction sparked heated debate about the role of standards in cryptography and led to much research and innovation in the field.
  • 9.  DES use block ciphers. The block ciphers in DES consists of 56 random bits, and 8 more bits are used for error detection.  These error detecting bits makes DES unmalleable-attacks can’t change the ciphers on its way to its destination because they might accidentally delete a bit used for error detection, and then receivers would known the data had been attacked.
  • 10. public-key cryptography Public –key cryptography refers to a class of cryptographic system in which each actor uses two keys: public key , private key The guiding principle is that messages Intended for a specific person should be encrypted using their public key in such a wat that the message can be only be decrypted through the use of the corresponding private key.
  • 11.  Public-key cryptography is important for securely transmitting messages across a potentially insecure channel, meaning that it is assumed all communications can be read by a malicious attacker.  As such, public-key cryptography is especially important for ensuring the security of the internet.
  • 12. RSA Encryption RSA encryption algorithm, used to securely transmit message over the internet. It is based on the principle that it is easy to multiply large numbers, but factoring large number is very difficult.