SlideShare a Scribd company logo
SRINIVASA INSTITUITE OF
TECHNOLOGY & SCIENCE
CRYPTOGRAPHY & NETWORK
SECURITY
Presented By
S.Sunanda
Contents
•Cryptography
Techniques
Encryption & Decryption
Categories Of Cryptography
Traditional ciphers
RSA algorithm
Applications
Contd…..
• Network Security
What is Network?
 About Network Security
Security Goals
Objective Of Security
Data Security
Problems & Attacks
Threats
Conclusion
CRYPTOGRAPHY
 It is derived from the Greek word that meant for secret
writing.
 Cryptography is a Software or hardware programs use
Mathematical Functions , Formulas(Algorithms) to
change text from one from to another.
 Cryptography is the science and art of transforming
messages to make them secure and immune to attacks.
 It provides Confidentiality, Integrity, Accuracy.
 Applications of cryptography includes ATM cards,
Computer passwords .
 It’s very useful to our Army & Police network to transfer
confidential data
TECHNIQUES
 The data is transferred by applying two
techniques
1. Encryption
2. Decryption
Encryption: The way of converting the plain text
to the Cipher text by the means of few keys is
called as the” Encryption”.
Decryption: The way of converting the Cipher text
to the Plain text by the use of keys that are
suitable to it is called as ”Decryption”.
Encryption & Decryption
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
 The implementation of a simple
cryptography using single key is done by
the Secret-key algorithms.
 Also known as SECRET KEY
CRYPTOGRAPHY. Sender & Receiver
uses same key and an Encryption/
Decryption Algorithm to Encrypt /
Decrypt data.( i.e ) The Key is shared
This can be done by p-box, s-box and
product cipher
SYMMETRIC KEY CRYPTOGRAPHY
Sunanda cryptography ppt
SUBSTITUTION CIPHER
 Replacing of each letter
or group of letter or group of letters of
plain text into cipher text
by another letter is called
as “Substitution cipher”.
The substitution may be:
Monalphabetic Substitution
Polyalphabetic Substitution
TRANSPOSITION CIPHER
 The change offered in
The position of the text
i.e. By jumbling the
Words is called as
” Transposition Cipher”.
And the technique used
here is termed as ”Mass
Technique”.
ASYMMETRIC KEY CRYPTOGRAPHY
 Also known as PUBLIC KEY
CRYPTOGRAPHY . Sender & Receiver uses
different keys for Encryption & Decryption
namely PUBLIC & PRIVATE respectively.
RSA ALGORITHM
RSA is derived from the names of the
discoverers named Rivest, Shamir, Adleman.
The RSA algorithm is one of the widely used in
the key algorithms.
1. The main function of this algorithm is providing
approach to public key cryptography &
Encryption
2. In this the CIPHER TEXT are the integer’s
between 0 and n-1
Sunanda cryptography ppt
APPLICATIONS
• Defense Services
• Secure Data Manipulation
• E- Commerce
• Business Transactions
• Internet Payment Systems
• User Identification Systems
• Access Control
• Data Security
WHAT IS NETWORK ?
 A network is an interconnection
 or a media between two or
more systems to share
information among them.
 The various threats caused to
network are:
* Remote login
* Operating System Bugs
*Spams & viruses etc.
NETWORK SECURITY
• The security provided to the
network is called network
security which at present is
looming on horizon as a
massive problem.
• There are two kinds of Network Security mainly
as:
Transit security : It just encrypts the packets to
be transferred
Traffic Security: It acts just as a screen between
hosts & remote sites
SECURITY GOALS
OBJECTIVE OF SECURITY
To avoid data threats
To avoid denial of services
To secure our data from masquerades
 To safeguard our data’s from traffic
analyzer
To not to make message for the third
person available
PASSWORD AUDITING
 Should not be in uppercase
 Must have at least 8 characters
 Must include alphabets, numeric keys & special
characters
 Password should not be the name of the user,
dictionary word etc.,
 It must be updated at least once a month
DATA SECURITY
• To monitor the user’s
ACCESS CONTROLS
• System that are connected in network
must be protected with firewalls
• To protect the integrity & availability of
the institution’s information asset’s
PROBLEMS & ATTACKS
There are few intertwined areas in network
security as:
 Secrecy
 Authentication
 Non-Repudiation
 Integrity control etc.
The threats are classified into two categories:
Passive Attacks: A passive attack is one in
which the attacker eavesdrops and listens to the
message but can’t modify the message.
• Active Attacks: An active attack is one in
which the attacker modifies, deletes,
replay or introduce new messages into the
stream of message.
THREATS
CONCLUSION
 However, through this Cryptography &
Network Security We Successfully
hiding and secure the data with the help
of Encryption & Decryption.
“ For every lock there is a key…..
It is better to keep safe your lock than
the key”
ANY QUIERIES????????

More Related Content

PPTX
A study of cryptography for satellite applications
PPTX
Cryptography and applications
PPSX
Introductory Lecture on Cryptography and Information Security
PPTX
Cryptography and network security Nit701
PPTX
Cissp d5-cryptography v2012-mini coursev2
PPT
Cryptography
PDF
Introduction to Cryptography
PPTX
Introduction to Cryptography
A study of cryptography for satellite applications
Cryptography and applications
Introductory Lecture on Cryptography and Information Security
Cryptography and network security Nit701
Cissp d5-cryptography v2012-mini coursev2
Cryptography
Introduction to Cryptography
Introduction to Cryptography

What's hot (20)

PDF
basic encryption and decryption
PPT
Cryptography - A Brief History
PPT
Cryptography - An Overview
PDF
Introduction to Cryptography
PPT
Network Security & Cryptography
PPTX
PPTX
PPT
Cryptography and Network Security
PDF
Information Security Cryptography ( L02- Types Cryptography)
PDF
Cryptanalysis and Attacks
PPTX
Cryptography.ppt
PPTX
Cryptography and network security
PPTX
Network security and cryptography
PPTX
Information and network security 31 public key cryptography
PPT
Ch02 classic nemo
PPTX
Cryptography
PPTX
Cryptography and network security
PPTX
Ppt cns
PDF
computer-security-and-cryptography-a-simple-presentation
PPTX
Cryptography
basic encryption and decryption
Cryptography - A Brief History
Cryptography - An Overview
Introduction to Cryptography
Network Security & Cryptography
Cryptography and Network Security
Information Security Cryptography ( L02- Types Cryptography)
Cryptanalysis and Attacks
Cryptography.ppt
Cryptography and network security
Network security and cryptography
Information and network security 31 public key cryptography
Ch02 classic nemo
Cryptography
Cryptography and network security
Ppt cns
computer-security-and-cryptography-a-simple-presentation
Cryptography
Ad

Similar to Sunanda cryptography ppt (20)

PPTX
Network security & cryptography
PPT
Network security cryptography ppt
PPTX
Seminar Information Protection & Computer Security (Cryptography).pptx
PPTX
Introduction to Network Security
PPTX
Cryptography and Network Security-ch1-4.pptx
PDF
information technology cryptography Msc chapter 1-4.pdf
PDF
chapter 1-4.pdf
PPT
Hardware Network Trojans for neural Networks
PPTX
Network security & cryptography
PPTX
Network security & cryptography
PDF
Chapter 1 2
PDF
Network Security and Cryptography.pdf
PPTX
Fundamental Concept of Cryptography in Computer Security
PPTX
The network security and cryptography topic
PPT
Chap8_Network Security.ppt
PPT
network security knowledge.ppt
PPT
Chp8.ppt
PPTX
Cyber security
PPTX
Chapter 8 of network security book top down approach
PPT
Chapter 8 v6.0
Network security & cryptography
Network security cryptography ppt
Seminar Information Protection & Computer Security (Cryptography).pptx
Introduction to Network Security
Cryptography and Network Security-ch1-4.pptx
information technology cryptography Msc chapter 1-4.pdf
chapter 1-4.pdf
Hardware Network Trojans for neural Networks
Network security & cryptography
Network security & cryptography
Chapter 1 2
Network Security and Cryptography.pdf
Fundamental Concept of Cryptography in Computer Security
The network security and cryptography topic
Chap8_Network Security.ppt
network security knowledge.ppt
Chp8.ppt
Cyber security
Chapter 8 of network security book top down approach
Chapter 8 v6.0
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Classroom Observation Tools for Teachers
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
RMMM.pdf make it easy to upload and study
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pre independence Education in Inndia.pdf
Renaissance Architecture: A Journey from Faith to Humanism
TR - Agricultural Crops Production NC III.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Classroom Observation Tools for Teachers
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose

Sunanda cryptography ppt

  • 3. Contents •Cryptography Techniques Encryption & Decryption Categories Of Cryptography Traditional ciphers RSA algorithm Applications
  • 4. Contd….. • Network Security What is Network?  About Network Security Security Goals Objective Of Security Data Security Problems & Attacks Threats Conclusion
  • 5. CRYPTOGRAPHY  It is derived from the Greek word that meant for secret writing.  Cryptography is a Software or hardware programs use Mathematical Functions , Formulas(Algorithms) to change text from one from to another.  Cryptography is the science and art of transforming messages to make them secure and immune to attacks.  It provides Confidentiality, Integrity, Accuracy.  Applications of cryptography includes ATM cards, Computer passwords .  It’s very useful to our Army & Police network to transfer confidential data
  • 6. TECHNIQUES  The data is transferred by applying two techniques 1. Encryption 2. Decryption Encryption: The way of converting the plain text to the Cipher text by the means of few keys is called as the” Encryption”. Decryption: The way of converting the Cipher text to the Plain text by the use of keys that are suitable to it is called as ”Decryption”.
  • 9. SYMMETRIC KEY CRYPTOGRAPHY  The implementation of a simple cryptography using single key is done by the Secret-key algorithms.  Also known as SECRET KEY CRYPTOGRAPHY. Sender & Receiver uses same key and an Encryption/ Decryption Algorithm to Encrypt / Decrypt data.( i.e ) The Key is shared This can be done by p-box, s-box and product cipher
  • 12. SUBSTITUTION CIPHER  Replacing of each letter or group of letter or group of letters of plain text into cipher text by another letter is called as “Substitution cipher”. The substitution may be: Monalphabetic Substitution Polyalphabetic Substitution
  • 13. TRANSPOSITION CIPHER  The change offered in The position of the text i.e. By jumbling the Words is called as ” Transposition Cipher”. And the technique used here is termed as ”Mass Technique”.
  • 14. ASYMMETRIC KEY CRYPTOGRAPHY  Also known as PUBLIC KEY CRYPTOGRAPHY . Sender & Receiver uses different keys for Encryption & Decryption namely PUBLIC & PRIVATE respectively.
  • 15. RSA ALGORITHM RSA is derived from the names of the discoverers named Rivest, Shamir, Adleman. The RSA algorithm is one of the widely used in the key algorithms. 1. The main function of this algorithm is providing approach to public key cryptography & Encryption 2. In this the CIPHER TEXT are the integer’s between 0 and n-1
  • 17. APPLICATIONS • Defense Services • Secure Data Manipulation • E- Commerce • Business Transactions • Internet Payment Systems • User Identification Systems • Access Control • Data Security
  • 18. WHAT IS NETWORK ?  A network is an interconnection  or a media between two or more systems to share information among them.  The various threats caused to network are: * Remote login * Operating System Bugs *Spams & viruses etc.
  • 19. NETWORK SECURITY • The security provided to the network is called network security which at present is looming on horizon as a massive problem. • There are two kinds of Network Security mainly as: Transit security : It just encrypts the packets to be transferred Traffic Security: It acts just as a screen between hosts & remote sites
  • 21. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades  To safeguard our data’s from traffic analyzer To not to make message for the third person available
  • 22. PASSWORD AUDITING  Should not be in uppercase  Must have at least 8 characters  Must include alphabets, numeric keys & special characters  Password should not be the name of the user, dictionary word etc.,  It must be updated at least once a month
  • 23. DATA SECURITY • To monitor the user’s ACCESS CONTROLS • System that are connected in network must be protected with firewalls • To protect the integrity & availability of the institution’s information asset’s
  • 24. PROBLEMS & ATTACKS There are few intertwined areas in network security as:  Secrecy  Authentication  Non-Repudiation  Integrity control etc. The threats are classified into two categories: Passive Attacks: A passive attack is one in which the attacker eavesdrops and listens to the message but can’t modify the message.
  • 25. • Active Attacks: An active attack is one in which the attacker modifies, deletes, replay or introduce new messages into the stream of message. THREATS
  • 26. CONCLUSION  However, through this Cryptography & Network Security We Successfully hiding and secure the data with the help of Encryption & Decryption.
  • 27. “ For every lock there is a key….. It is better to keep safe your lock than the key”