Chapter Four
Chapter Four
Chapter Four
• This method of cryptography requires two separate keys, one that is private or
secret, and one that is public.
• Public key cryptography uses a pair of keys to encrypt and decrypt data to protect it
against unauthorized access or use.
Cont.…
• When the two parties communicate to each other to transfer the intelligible or
sensible message, referred to as plaintext, is converted into apparently random
nonsense for security purpose referred to as ciphertext
• Encryption:
The process of changing the plaintext into the ciphertext is referred to
as encryption.
• Decryption:
The process of changing the ciphertext to the plaintext that process is known
as decryption
Cont.…
• Diffie-Hellman and RSA are security algorithms that are essential for protecting
information from unauthorized users.
• They are responsible for encrypting the information and preventing unauthorized
users from not accessing or opening the contents/ information.
• They ensure that the cyber contents are safe and both sender and receiver have the
right to access the information.
• No, third-party or unauthorized users can access the information that is not meant
for them to access.
Rivest Shamir Adleman (RSA)
• RSA stands for Rivest, Shamir, Adleman. These are the creators of the RSA
Algorithm. It is a public-key encryption technique used for secure data
transmission especially over the internet.
• Transmitting confidential and sensitive data over the internet through this
technology is safe due to its standard encryption method.
• The Rivest Shamir Adleman (RSA) is the cryptography system that is used for
public key cryptography, which is commonly used when sending secure, sensitive
data over an insecure network like the internet.
• RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually
means that it works on two different keys i.e., Public Key and Private Key. As
the name describes that the Public Key is given to everyone and the Private key is
kept private.
An example of asymmetric cryptography:
1. A client (for example browser) sends its public key to the server and requests some data.
2. The server encrypts the data using the client’s public key and sends the encrypted data.
3. The client receives this data and decrypts it.
Diffie-Hellman (DH)
• Diffie-Hellman is a security algorithm with only one private key that is used by
both client and server i.e., the key is shared by both client and user.
Network Security has several benefits, some of which are mentioned below:
1. Network Security helps in protecting clients’ information and data which ensures
reliable access and helps in protecting the data from cyber threats.
2. Network Security protects the organization from heavy losses that may have
occurred from data loss or any security incident.
3. It overall protects the reputation of the organization as it protects the data and
confidential items.
Port Security in Computer Networking
Attackers’ task is comparatively very easy when they can enter the network they want
to attack.
Ethernet LANs are very much vulnerable to attack as the switch ports are open to use
by default.
Users can secure a port in two steps:
• Limiting the number of MAC addresses to a single switch port, i.e. if more than the
limit, Mac addresses are learned from a single port then appropriate action will be
taken.
Port security –
Switches learn MAC addresses when the frame is forwarded through a switch port.
By using port security, users can limit the number of MAC addresses that can be
learned to a port, set static MAC addresses, and set penalties for that port if it is used
by an unauthorized user. Users can either use
restrict,
shut down or
protect port-security commands.
Cont.….
Use sticky command so that it will learn the Mac address dynamically and will
provide the limit and the appropriate action that should be taken.
S1(config-if)#switchport port-security mac-address sticky
S1(config-if)#switchport port-security maximum 2
S1(config-if)#switchport port-security violation shutdown
Cont.….
If the user wants to provide a static entry, then configure that by starting its Mac
address.
• S1(config-if)#switchport port-security
• S1(config-if)#switchport port-security violation shutdown
• S1(config-if)#switchport port-security mac-address aa.bb.cc.dd.ee.ff
The End
•THE END