0% found this document useful (0 votes)
20 views11 pages

Network Security1

This document provides an introduction to network security, including firewalls, encryption, decryption, and related terms. It discusses how firewalls control access between internal and external networks. Encryption translates plain text into cipher text using a key, while decryption reverses the process. Keys, hash functions, message digests, and digital signatures are terms involved in encryption. Cryptography uses ciphers and codes, and there are two main types: private key uses one key for encryption and decryption, while public key uses different keys. Biometrics is also discussed as a method of personal identification using characteristics like fingerprints and signatures.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views11 pages

Network Security1

This document provides an introduction to network security, including firewalls, encryption, decryption, and related terms. It discusses how firewalls control access between internal and external networks. Encryption translates plain text into cipher text using a key, while decryption reverses the process. Keys, hash functions, message digests, and digital signatures are terms involved in encryption. Cryptography uses ciphers and codes, and there are two main types: private key uses one key for encryption and decryption, while public key uses different keys. Biometrics is also discussed as a method of personal identification using characteristics like fingerprints and signatures.

Uploaded by

Sunil Pillai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 11

NETWORK

SECURITY
INTRODUCTION TO NETWORK
SECURITY
• *network
• Security.
• Now million of ordinary citizen are using network for
banking and shopping.
• It is concerned with making sure that nosy people can
not read it.
• It is concerned with people trying to access remote
services that they are not authorized to use.
• Most security problems are intensely caused by malicious
people tying to gain some benefit and to harm someone.
As a example
• student and account and business.
FIREWALL
• *it is hardware and software configuration which sits at this parameter
and controlling access into and out of your company’s network,
• In firewalls allows only authorized communication between the internal
and external networks.
• They are very effective at keeping out authorized users and stopping
unwanted activities on an internal network..
• *EXAMPLE :- COMPANY.


ENCRYPTION and DECRYPTION

• It relay on key or password.


• Encryption is the process of translating
from it’s original form (called plain text)
into an encoded and unreadable form
(cipher text).
• Decryption refers to the process of taking
cipher text and translating back to plain
text.
TERMS RELATED TO ENCRYPTION
PROCESS
• KEY :- the message to be encrypted is known as plain text are
transformed by a function that is parameterized by key.
• The output of the encryption process known as cipher text.
• HASH FUNCTION :-the hash function is used as a method to ensure
that a message has not been altered.
• MESSAGE DIGEST :- the process produce no known as message
digest.
• The message digest is encrypted apart from the message itself ,
with the sender’s private key.
• DIGITAL FINGERPRINTF:-a unique no that only originator with a
private key can create and which can only be decrypted with public
key.
• DIGITAL SIGNATURE:- it deals with signature.
INTRODUCTION TO
CRYPTOGRAPHY
• It consist cipher and code.
• A cipher is a character for character transform.
• Code replace one word with another word.
• It is used for encryption and decryption.
• Most successful code is used by u.s. during second world
war in pacific.
• It is used whenever someone want to send a secret
message to someone else.
• There are two types of algorithm
• 1)private key.
• 2)public key
• Private key:- it is uses same key to encryption and
decryption the data .
• It is also referred to as symmetric cryptography.
• advantages:-
• it is very fast.
• key is strong as much more secure .
• cipher text is compact.
• Disadvantages:-
• administration of key are very complicated.
• it has no repudiation.
• large no o key are need for communication
Public key:-it uses one key to encryption the data and
another to decryption of the data. this is also referred to
as asymmetric cryptography.
advantages:-
it is more secure.
it supports non repudiation.
no of key managed by each users is vary less as
compared to secret key cryptography.
disadvantages:-
it is slower than the private key.
it is much larger than plain text.
TYPES OF CRYPTOGRAPHY

There are two types of cryptography


1)substitution ciphers:-
each letter is replaced by another
letter to disguise it.
2) transposition ciphers:-
it reorder the letters but do not
disguise them.
BIOMETRICS
– It is used for personal identification.
– Biometrics are about measuring specific
characteristic of a person
– including:- voice,fingerprints,signatures.
THANK YOU TO ALL OF U.

You might also like