Lecture 4 Network Security
Lecture 4 Network Security
2
TYPES OF CRYPTOLOGY
3
Symmetric Key Cryptography (Secret Key
Encryption)
Example:
◼ Uses a single key for both encryption ▪ Alice wants to send a message,
and decryption. "HELLO," to Bob.
◼ Fast but less secure since sharing the ▪ She encrypts it using the secret
key is risky. key "XYZ123" → Ciphertext:
Example: Advanced Encryption Standard "NQXXQ."
(AES), Data Encryption Standard (DES). ▪ Bob decrypts the message using
the same key to get "HELLO."
4
Asymmetric Key Cryptography (Public Key
Encryption)
5
Hash Functions
Example:
▪ Converts data into a fixed-length "password123" → SHA-256 hash:
hash value. ef92b778bafee4c8… (fixed-length
▪ Irreversible and used in encrypted output).
password security.
Example: SHA-256, MD5.
6
A Digital Signature is a cryptographic technique
used to verify the authenticity and integrity of a
digital message or document. It ensures that:
▪ The message was sent by a specific sender
Digital
(authentication).
Signatures ▪ The message was not altered during
transmission (integrity).
▪ The sender cannot deny sending the message
(non-repudiation).
7
How Digital Signatures Work
1. The sender hashes the message using a hash function (e.g., SHA-
256).
2. The hash is encrypted using the sender’s private key (this becomes
the digital signature).
3. The receiver decrypts the digital signature using the sender’s public
key.
4. The receiver calculates their own hash and compares it with the
decrypted hash. If they match, the message is verified.
Example Scenario:
•Alice signs an email with her digital signature.
•Bob receives the email and verifies it using Alice’s public key.
•If the signature is valid, Bob is assured that the email came from Alice
and was not altered.
8
A firewall is a security device or software that
monitors and controls incoming and outgoing
network traffic based on predefined security rules.
Firewalls It acts as a barrier between a trusted internal
network and untrusted external networks, such as
the internet.
9
Types of Firewalls:
10
Types of Firewalls:
Proxy Firewall
▪ Acts as an intermediary between users and the internet.
▪ Filters traffic at the application layer (e.g., HTTP, FTP).
▪ Example: A company may use a proxy firewall to block access to social media
websites.
11
A firewall might have the following rules:
12
A Virtual Private Network (VPN) is a secure
communication channel that encrypts internet
traffic and routes it through a remote server,
ensuring privacy and security.
2. Site-to-Site VPN
▪ Connects entire office networks over the internet.
Example: A company has offices in Uganda and Kenya. A site-to-site VPN
allows secure data sharing between the offices.
3. SSL/TLS VPN
▪ Uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS) for
encryption.
▪ Example: VPN access through a web browser.
14
Advantages of VPNs
15
Network security is crucial in today's digital world,
ensuring data confidentiality, integrity, and
availability.
▪ Cryptography protects data through encryption
and decryption.
Conclusion ▪ Digital signatures verify message authenticity.
▪ Firewalls act as a barrier between trusted and
untrusted networks.
▪ VPNs create secure tunnels for private
communication over the internet.
16
Thank you | Asante | Mwebare
17
BY IRIMASO ALFRED 0771097982