Sunteți pe pagina 1din 20

NETWORK SECURITY & CRYPTOGRAPHY

Presented By
B.KRISHNA TEJA B.VENUKUMAR

CONTENTS:Introduction Cryptography Cryptographic Algorithms Quantum Cryptography Advantages of cryptography Disadvantages of cryptography Conclusion

What is a NETWORK ? collection of systems connected together. Why do Network Security? As computer systems became more complicated there was an increasing need for security Network security is becoming more and more crucial as the volume of data being exchanged on the internet increases

Network Security problems can be roughly divided into 4closely intertwined Areas Privacy Authentication Data integrity Non-repudiation

Cryptography
Cryptography, is the one of the methods to provide security. It involves the use of a cryptographic algorithm used in the encryption and decryption process. It works in combination with the key to encrypt the plain text, and also to decrypt the cipher text

Encryption and decryption:Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality The inverse function of encryption is called as decryption

Strong cryptography:The result of strong cryptography is cipher text is very difficult to decipher without possession of the appropriate decoder tool How does cryptography works? A cryptography algorithm, or Cipher, is a mathematical function used in the encryption and decryption process.

Cryptographic Algorithms: Cryptographic algorithms can implemented either hardware (for speed), or in software (for flexibility). There are 3 classes of algorithms they are: 1. Conventional Cryptography (Symmetric algorithms, Private keys)
2. Public key Cryptography algorithms, public keys) 3. Hash function algorithm. (Asymmetric

Conventional cryptography:In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. The Data Encryption Standard (DES) is an example of a conventional cryptosystem that is widely employed by the U.S. government.

Public key cryptography:public key, which encrypts data, and a corresponding private key (secret key) for decryption. It is computationally infeasible to deduce the private key from the public key. Anyone who has a public key can encrypt information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information.

Digital signatures :Basically handwritten signature is easy to counterfeit. A digital signature is superior to a handwritten signature in that it is nearly impossible to counterfeit, plus it attests to the contents of the information as well as to the identity of the signer.

Hash functions:A one-way hash function takes variable-length input in this case, a message of any length, even thousands or millions of bits and produces a fixed-length output PGP uses a cryptographically strong hash function on the plaintext the user is signing. This generates a fixed-length data item known as a message digest

QUANTUM CRYPTOGRAPHY :
it is based on usage of particles/waves of light (PHOTONS) and their intrinsic properties to develop an unbreakable cryptographic system Eaves dropping concept System works on the principle of Heisenberg principle

Advantages: Based on natural quantum laws Computational Complexity Expires. There is no expiration date on the security of QC messages. Perfect for public communication Easy to detect an eavesdropper.

Disadvantages: Severally limited by technology Practical systems are limited by distance. Photon emitters and detectors are far from perfect, causing a lot of errors. Most protocols require a classical channel.

Conclusion
As the proverb says that Even a crow can peck an elephant which is stuck in the mud. Even though we are providing high security by cryptography there are many pitfalls in it also. Nothing in the world is 100% secured. Cryptography is one of the way to provide network security but it is not only the path to achieve network security.

Any ?

THANK YOU

S-ar putea să vă placă și