0% found this document useful (0 votes)
11 views17 pages

Cryptography&Network Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

Cryptography&Network Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

C RYPTOG R APH Y & NE T W OR K

SECURITY

Name-Keshav M.C.A 1 st Year


INTRODUCTION
What is Cryptography & Network Security?

Cryptography-Technique for secure communication.

Network Security-Protecting networks for threats and


unauthorized access.

Importance: Safeguarding digital data, ensuring


confidentiality, integrity, and authenticity

2
C R Y P T O G R A P H Y: D E F I N I T I O N &
GOALS
Cryptography: The art of securing communication by transforming information into a form
that cannot be understood without the proper key.

Core Goals:
Confidentiality: Ensuring data is accessible only to authorized parties.

Integrity: Ensuring data is not tampered with during transmission.

Authentication: Verifying the identity of the parties involved.

Non-repudiation: Ensuring that a sender cannot deny having sent a message.

3
TYPES OF CRYPTOGRAPHY

SYMMETRIC-KEY ASYMMETRIC-KEY HASH FUNCTIONS:


C R Y P T O G R A P H Y: C R Y P T O G R A P H Y:

Uses the same key for both Uses a pair of keys: a A one-way function that
encryption and decryption public key and a private produces a fixed-size hash
(e.g., AES). key (e.g., RSA). value from input data (e.g.,
SHA-256).

PITCH DECK 4
SYMMETRIC-KEY
CRYPTOGRAPHY

Key Concept: Both sender and receiver must have the same key
Core Goals:

Popular Algorithms:

AES (Advanced Encryption Standard)


DES (Data Encryption Standard)
3DES (Triple DES)
Strengths: Fast and efficient for large data sets.
Weaknesses: Key distribution problem (both parties need to securely
share the same key)

5
ASYMMETRIC-KEY
CRYPTOGRAPHY
K E Y C O N C E P T: STRENGTHS:

A pair of keys (public and Solves key distribution problem.


private) is used.
Public Key: Can be shared
openly, used for encryption.
Private Key: Kept secret, used for
decryption.

POPULAR ALGORITHMS: Weaknesses:

RSA
Slower than
ECC (Elliptic Curve
symmetric-key
Cryptography)
encryption.

6
HASH FUNCTIONS

Key Concept: Hash functions take an input


(message) and produce a fixed-size string,
which is unique to the data.

Properties:

Deterministic: Same input always produces the


same output.

Collision-Resistant: Two different inputs should


never produce the same output.

7
E N C R Y P T I O N V S A U T H E N T I C AT I O N

Encryption: Protecting the confidentiality of the Authentication: Verifying the identity of the sender and
data. ensuring the message hasn’t been altered.
NETWORK SECURITY OVERVIEW

N E T W O R K S E C U R I T Y:
Protecting data and resources within a
network from threats, attacks, and
unauthorized access
T Y P E S O F T H R E AT S : ​
Malware (viruses, worms, Trojans)
Phishing attacks
Man-in-the-Middle (MITM) attacks

DENIAL OF SERVICE (DOS) AND


DISTRIBUTED DOS (DDOS)

9
NETWORK SECURITY MECHANISMS

Monitor and control incoming and


FIREWALLS:
outgoing network traffic.

INTRUSION
DETECTION
Detect malicious activities or
SYSTEMS policy violations.​
(IDS):

VIRTUAL Encrypt traffic between devices


PRIVATE
NETWORK
and the network, ensuring secure
S (VPNS): communication over untrusted
networks.

ACCESS Ensures that only authorized users can access


CONTROL: specific resources.

10
ROLE IN SECURING
C O M M U N I C AT I O N S :

CRYPTOGRAPH
Y IN NETWORK
V. P. N SECURITY EXAMPLES:

VPNs use encryption to secure SSL/TLS protocols use HTTPS (secure web traffic)
remote access. asymmetric cryptography to Email encryption
establish secure connections (PGP,S/MIME)
between web servers and clients.

11
PUBLIC KEY
INFRASTRUCTURE (PKI)

DEFINITION: COMPONENTS:

A framework that manages Certificate Authorities (CAs): Issue


digital keys and certificates digital certificates to validate identities.
for secure communications.
Digital Certificates: Used to verify the
authenticity of a public key.

Public/Private Keys: Used for


encryption and digital signatures.

Applications: Secure web browsing


(HTTPS), email encryption, software
code signing.

12
C R Y P T O G R A P H I C AT TA C K S
C o m m o n At t a c k s :

MAN-IN-THE-
BRUTE FORCE R E P L AY
MIDDLE (MITM)
AT TA C K : AT TA C K :
AT TA C K :

Trying all possible key Intercepting communication Intercepting and retransmitting


combinations. between two parties valid data to gain unauthorized
access.

13
FUTURE TRENDS IN
CRYPTOGRAPHY & NETWORK
SECURITY

30% 40% 50% 20%

QUANTUM HOMOMORPHIC AI IN ZERO TRUST


C R Y P T O G R A P H Y: ENCRYPTION: CYBERSECURITY S E C U R I T Y:
Preparing for quantum Allows com putations on Using artificial intelligence A security model where trust
computers that could break encr ypted data with out to detect and respond to is never assumed, even
existing encryption methods. decr yptin g it, enha ncing inside the network perimeter.
network threats in real time
pr iva cy.

14
S U M M A RY
Cryptography and network security are
essential for safeguarding sensitive data.

Cryptography ensures confidentiality,


integrity, and authentication.

Network security protects against a wide


range of cyber threats and attacks.

Ongoing advancements in cryptography are


necessary to stay ahead of evolving threats.

15
Q&A / DISCUSSION
Any Questions?

Open the floor for discussion or queries

16
THANK YOU
Keshav Shrivastav​​

Roll No- 242073

Class-M.C.A 1Year

[email protected]

Date-06/12/2024​

8/ 06 /2 0XX 17

You might also like