Cryptography&Network Security
Cryptography&Network Security
SECURITY
2
C R Y P T O G R A P H Y: D E F I N I T I O N &
GOALS
Cryptography: The art of securing communication by transforming information into a form
that cannot be understood without the proper key.
Core Goals:
Confidentiality: Ensuring data is accessible only to authorized parties.
3
TYPES OF CRYPTOGRAPHY
Uses the same key for both Uses a pair of keys: a A one-way function that
encryption and decryption public key and a private produces a fixed-size hash
(e.g., AES). key (e.g., RSA). value from input data (e.g.,
SHA-256).
PITCH DECK 4
SYMMETRIC-KEY
CRYPTOGRAPHY
Key Concept: Both sender and receiver must have the same key
Core Goals:
Popular Algorithms:
5
ASYMMETRIC-KEY
CRYPTOGRAPHY
K E Y C O N C E P T: STRENGTHS:
RSA
Slower than
ECC (Elliptic Curve
symmetric-key
Cryptography)
encryption.
6
HASH FUNCTIONS
Properties:
7
E N C R Y P T I O N V S A U T H E N T I C AT I O N
Encryption: Protecting the confidentiality of the Authentication: Verifying the identity of the sender and
data. ensuring the message hasn’t been altered.
NETWORK SECURITY OVERVIEW
N E T W O R K S E C U R I T Y:
Protecting data and resources within a
network from threats, attacks, and
unauthorized access
T Y P E S O F T H R E AT S :
Malware (viruses, worms, Trojans)
Phishing attacks
Man-in-the-Middle (MITM) attacks
9
NETWORK SECURITY MECHANISMS
INTRUSION
DETECTION
Detect malicious activities or
SYSTEMS policy violations.
(IDS):
10
ROLE IN SECURING
C O M M U N I C AT I O N S :
CRYPTOGRAPH
Y IN NETWORK
V. P. N SECURITY EXAMPLES:
VPNs use encryption to secure SSL/TLS protocols use HTTPS (secure web traffic)
remote access. asymmetric cryptography to Email encryption
establish secure connections (PGP,S/MIME)
between web servers and clients.
11
PUBLIC KEY
INFRASTRUCTURE (PKI)
DEFINITION: COMPONENTS:
12
C R Y P T O G R A P H I C AT TA C K S
C o m m o n At t a c k s :
MAN-IN-THE-
BRUTE FORCE R E P L AY
MIDDLE (MITM)
AT TA C K : AT TA C K :
AT TA C K :
13
FUTURE TRENDS IN
CRYPTOGRAPHY & NETWORK
SECURITY
14
S U M M A RY
Cryptography and network security are
essential for safeguarding sensitive data.
15
Q&A / DISCUSSION
Any Questions?
16
THANK YOU
Keshav Shrivastav
Class-M.C.A 1Year
Date-06/12/2024
8/ 06 /2 0XX 17