Professional Documents
Culture Documents
ON
CRYPTOGRAPHY AND NETWORK
SECURITY
FOR
SVITS QUEST 2007
PRESENTED BY
1
Contents:
Abstract
• Introduction
Steganography
• Cryptographic technologies
Based on layers
Based on algorithms
• Applications of cryptography
• Conclusion
CRYPTOGRAPHY
2
NETWORK SECURITY
3
bounds, viz., “THE RECENT ATTACK technological prowess has been
ON THE DNS SERVERS HAS stupendously developed to defy against
CAUSED A LOT OF HULLABALOO each of the assaults. Our paper covers
ALL OVER THE WORLD”. However, the ADVANCED technical combats that
fortunately, the antagonists reacted have been devised all through the way,
promptly and resurrected the Internet thus giving birth to the notion of
world from the brink of prostration. “NETWORK -SECURITY”. Various
Since the inception of antidotes that are in fact inextricable
conglomerating Computers with with security issues are – Cryptography,
Networks the consequence of which Authentication, Integrity and Non
shrunk the communication Repudiation, Key Distribution and
world,hitherto, umpteen ilks of security certification, Access control by
breaches took their origin. Tersely implementing Firewalls etc.
quoting some security ditherers –
Eavesdropping, Hacking, Hijacking, To satiate the flaws in the network
Mapping, Packet Sniffing, 1Spoofing, security more and more advanced
DoS & DDoS attacks, etc. security notions are being devised day
Newton’s law says “Every action has got by day. Our paper covers a wide
an equal but opposite reaction”. So is perspective of such arenas where the
the case with this. Nevertheless the contemporary cyber world is revolving
security breaches and eavesdroppers, the around viz.
security but do not want to be bothered
. Introduction: with it when it gets in their way. It’s
important to build systems and networks
Network security deals with the
in such a way that the user is not
problems of legitimate messages being
constantly reminded of the security
captured and replayed. Network security
system. Users who find security policies
is the effort to create a secure computing
and systems to restrictive will find ways
platform. The action in question can be
around them. It’s important to get their
reduced to operations of access,
feed back to understand what can be
modification and deletion. Many people
improved, the sorts of risks that are
pay great amounts of lip service to
4
deemed unacceptable, and what has been across insecure networks (like the
done to minimize the organizations internet)
exposure to them. Network security So that it cannot be read by anyone
problems can be divided roughly into expect the intended recipient. While
four intertwined areas: cryptography is the science of securing
Secrecy, Authentication, data, cryptanalysts are also called
Nonrepudation, and Integrity control. attackers. Cryptology embraces both
5
key is only used for both encryption decrypted only using the private key.
and decryption. This is also called as Data encrypted with the private key
private-key encryption. In this can be decrypted only using the
method the sender encrypt the data public key. In the below figure, a
through private key and receiver sender has the receiver’s public key
decrypt that data through that key and uses it to encrypt a message, but
only. only the receiver has the related
private key used to decrypt the
message.
6
Steganography uses techniques to
way. The slightest change in signed communicate information in a way
documents will cause the digital that is a hidden. The most common
signature verification process to fail. use of Steganography is hiding
information image or sound within
the information of another file by
using a stegokey such as password is
additional information to further
conceal a message.
There are many reasons why
Srteganography is used, and is often
used in significant fields. It can be
used to communicate with complete
freedom even under conditions that
ADVANCED are censured or monitored.
CRYPTOGRAPHIC The Steganography is an effective
TECHNIQUE means of hiding data, there by
7
WHAT IS STEGANOGRAPHY?
The word steganography comes • Link layer encryption
from the Greek name “stegnos” • Network layer encryption
(hidden or secret) and “graphy”
• IPSEC, VPN, SKIP
(writing or drawing”) and literally
• Transport layer
means hidden writing.
• SSL, PCT (private
Stegenography uses techniques to
Communication Technology)
communicate information in a way
• Application layer
that is hidden.
• PEM (Privacy Enhanced
The most common use of
Mail)
Steganography is hiding information
• PGP (Pretty Good Privacy)
image or sound within the
information of another file by using a • SHTTP
8
• DES (Data OF CRYPTOGRAPHY
Encryption
Standard)— • Defense service
56bitkey • Secure Data Manipulation
• Triple DES— • E-Commerce
112bitkey • Business Transactions
• IDEA • Internet Payment Systems
(International
• Pass Phrasing Secure
Data Encryption
Internet Comm.
Algorithm)—
• User Identification
128bitkey
Systems
• Access control
Public-key encryption
• Computational Security
algorithms (Asymmetric
• Secure access to Corp
algorithms)
Data
• Data Security
Diffie-Hellman (DH): Exponentiation is
APPLICATIONS OF NETWORK
easy but computing discrete algorithms
SECURITY
from the resulting value is practically
impossible.
Computer networks were
primarily used by university
• RSA:
researchers for sending email,
Multiplication of
and by corporate employees
two large prime
for sharing printers. Under
numbers is easy
these conditions, security did
but factoring the
not get a lot of attention.
resulting product
is practically
impossible.
APPLICATIONS
9
But now, as millions of your security policies and
ordinary citizens are using practices.
networks for: Security is
everybody’s business, and only
• Banking with everyone’s cooperation,
• Shopping intelligent policy, and
returns Cryptography
protects users by providing
functionality for the encryption
of data and authentication of
CONCLUSION:
other users. This technology
Network security is a very lets the receiver of an
difficult topic. Every one has a electronic messages verify the
different idea of what sender, ensures that a message
“security” is, and what levels can be read only by the
of risks are acceptable. The key intended person, and assures
for building a secure network is the recipient that a message has
to define what security means not be altered in transmit. The
to your organization. Once that Cryptography Attacking
has been defined, everything techniques like Cryptanalysis
that goes on with. The network and Brute Force Attack. This
can be evaluated with respect paper provides information of
to the policy. Projects and Advance Cryptography
systems can then be broken Techniques.
down into their components,
and it becomes much simpler to
decide whether what is
BIBOLOGRAPHY:
proposed will be conflict with
10
• “Computer Networks ”,
by Andrew S.Tanunbaum
• “Fighting Steganography
detection” by Fabian
Hansmann
• “Network security” by
Andrew S.Tanenbaum
• “Cryptography and
Network Security” by
William Stallings
• “Applied Cryptography”
by Bruce Schneier,
JohnWillley and Sons Inc
• URL:
http://www.woodmann.co
m/fravia/fabian2.html.
• URL:
http://www.jjtc.com/stegd
oc/sec202.html.
11