# NETWORK SECURITY

60 %
40 %
Entertainment

Published on August 20, 2010

Author: srikanth959

Source: authorstream.com

NETWORK SECURITY & CRYPTOGRAPHY : NETWORK SECURITY & CRYPTOGRAPHY CONTENTS:- : CONTENTS:- Introduction Cryptography Cryptographic Algorithms Quantum Cryptography Advantages of cryptography Disadvantages of cryptography Conclusion Slide 3: What is a NETWORK ? collection of systems connected together. Why do Network Security? As computer systems became more complicated there was an increasing need for security Network security is becoming more and more crucial as the volume of data being exchanged on the internet increases Slide 4: Network Security problems can be roughly divided into 4closely intertwined Areas Privacy Authentication Data integrity Non-repudiation Cryptography : Cryptography, is the one of the methods to provide security. It involves the use of a cryptographic algorithm used in the encryption and decryption process. It works in combination with the key to encrypt the plain text, and also to decrypt the cipher text Cryptography Encryption and decryption:- : Encryption and decryption:- Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality The inverse function of encryption is called as decryption Strong cryptography:- : Strong cryptography:- The result of strong cryptography is cipher text is very difficult to decipher without possession of the appropriate decoder tool How does cryptography works? A cryptography algorithm, or Cipher, is a mathematical function used in the encryption and decryption process. Cryptographic Algorithms:- : Cryptographic Algorithms:- Cryptographic algorithms can implemented either hardware (for speed), or in software (for flexibility). There are 3 classes of algorithms they are: 1. Conventional Cryptography (Symmetric algorithms, Private keys) 2. Public key Cryptography (Asymmetric algorithms, public keys) 3. Hash function algorithm. Conventional cryptography:- : Conventional cryptography:- In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. The Data Encryption Standard (DES) is an example of a conventional cryptosystem that is widely employed by the U.S. government. Public key cryptography:- : Public key cryptography:- public key, which encrypts data, and a corresponding private key (secret key) for decryption. It is computationally infeasible to deduce the private key from the public key. Anyone who has a public key can encrypt information but cannot decrypt it. Only the person who has the corresponding private key can decrypt the information. Digital signatures :- : Digital signatures :- Basically handwritten signature is easy to counterfeit. A digital signature is superior to a handwritten signature in that it is nearly impossible to counterfeit, plus it attests to the contents of the information as well as to the identity of the signer. Hash functions:- : Hash functions:- A one-way hash function takes variable-length input in this case, a message of any length, even thousands or millions of bits—and produces a fixed-length output PGP uses a cryptographically strong hash function on the plaintext the user is signing. This generates a fixed-length data item known as a message digest QUANTUM CRYPTOGRAPHY :- : QUANTUM CRYPTOGRAPHY :- it is based on usage of particles/waves of light (PHOTONS) and their intrinsic properties to develop an unbreakable cryptographic system Eaves dropping concept System works on the principle of Heisenberg principle Advantages:- : Advantages:- Based on natural quantum laws Computational Complexity Expires. There is no expiration date on the security of QC messages. Perfect for public communication Easy to detect an eavesdropper. Disadvantages:- : Disadvantages:- Severally limited by technology Practical systems are limited by distance. Photon emitters and detectors are far from perfect, causing a lot of errors. Most protocols require a classical channel. Conclusion : Conclusion As the proverb says that “ Even a crow can peck an elephant which is stuck in the mud”. Even though we are providing high security by cryptography there are many pitfalls in it also. Nothing in the world is 100% secured. Cryptography is one of the way to provide network security but it is not only the path to achieve network security. Slide 19: Any ? Slide 20: THANK YOU

 User name: Comment:

## Related presentations

December 13, 2018

December 3, 2018

December 5, 2018

December 4, 2018

December 3, 2018

#### Customer Relationship Management Blue Edge Busine...

November 30, 2018

## Related pages

### Network security - Wikipedia, the free encyclopedia

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and ...

### Network & Security | Index

Unsere Benutzer haben insgesamt 3930 Beiträge geschrieben. Wir haben 177 registrierte Benutzer. Der neueste Benutzer ist tiantianjack. Insgesamt waren ...

### What Is Network Security? - Cisco Systems

What is network security? How does it protect you? How does network security work? What are the business benefits of network security? You may think you ...

### Network Security | Intel Security Products

A leader in IPS security and value. Strong performance with a low total cost of ownership. See what NSS Labs says about McAfee Network Security Platform.

### Network Security Journal - The Network Security Industry's ...

Complete network security news, product reviews, and analysis for small, medium and enterprise-class companies including VPNs, firewalls, intrusion ...

### Network Security Appliances | Enterprise-class Network ...

Cyberoam network security appliances deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 ...

### What is Network Security? A Webopedia Definition

Network security is a specialized field in computer networking that involves securing a computer network infrastructure.

### Netzwerksicherheit – Wikipedia

Steffen Wendzel, Johannes Plötner: Praxisbuch Netzwerk-Sicherheit: Risikoanalyse, Methoden und Umsetzung. (Optimale Netzwerk- und Serverabsicherung, ...