Network Securit Y and Cryptography: S. Rohit 06631A0431
Network Securit Y and Cryptography: S. Rohit 06631A0431
N E T W O
CR Y P TO G R A P H Y
S. ROHIT
06631A0431
Under the guidance of
Mr.G.Ramu
Introduction
curity
Aspects of information se
Attacks &
Services
Cryptography
TOPICS Ancient techniques
public & private key
New trends
Eleptical curve &
Quantum cryptography
Network Security Model
Trusted Third
Party
Principal Principal
(sender) (receiver)
Security Security
transformation transformation
attacker
Important Services of Security
• Confidentiality, also known as secrecy
• Integrity
• Availability
• Authentication
Attacks
• Passive attacks
– Interception
• Release of message contents
• Traffic analysis
• Active attacks
– Interruption, modification, fabrication
• Masquerade
• Replay
• Modification
• Denial of service
Information Transferring
Attack: Interruption
availability
secrecy
Wiring,
eavesdrop
Attack: Modification
integrity
Replaced
intercept
info
Attack: Fabrication
Ali: this is
…
Kryptós “ hidden ”
Gráphein “ to write ”
Message x y x
Encrypter Decrypter Destination
source
k Secure Channel
Key Y = Ek (X)
source
X = Dk (Y)
Cryptography in
Ancient Times
“shift index”.
and so forth………
Oops!
Original
Plaintext Ciphertext Plaintext
Encryption Decryption
Original
Plaintext Ciphertext Plaintext
Encryption Decryption