You are on page 1of 15

NETWORK SECURI TY

Presented by
VISANTH R
MUTHUSAMY S
GCT,COIMBATORE
A network is a group of two or more computer
systems linked together.
A secure network means that a hacker or competitor
may not or have difficulties getting critical or sensitive
data.
For achieving that security we go for cryptography
concept.
INTRODUCTION
Cryptography is one of the security mechanism in
Networks.
TWO PARTS:
ENCRYPTION :
The original data becomes encrypted
using cipher keys on the server side.
DECRYPTION :
The encrypted text becomes original data
using same cipher keys on the client side.

CRYPTOGRAPHY
OPERATIONS
More then two cryptographic machines, connected
to the server.
Simulation Processor plays an important role in this
process .
It automatically switches the encrypted machine to
another machine, if it takes a long time to encrypt the
data.
MULTI HOME CRYPTOGRAPHY
SIMULATION PROCESSOR
SIMULATION
PROCESSOR
CRYPTOGRAPHIC
MACHINE 1
CRYPTOGRAPHIC
MACHINE 2
CRYPTOGRAPHIC
MACHINE 3
CRYPTOGRAPHIC
MACHINE n
SERVER
Commonly used algorithm techniques used as a
cipher key are:
i. n
k
mod m n , m-random numbers
k-numeric value of original data
ii. nCr n-random numbers
r-numeric value of original data
iii. x
k
x x-random number
k-numeric value of original data
ALGORITHMS
Consider the original text INTERFACE,
(n ^ k) mod m
n=2,m=5,
I : 9 = 2^9 mod 5=2 : B
N :14=2^14 mod 5=4 : D
T :20=2^20 mod 5=1 : A
E : 5=2^5 mod 5=2 : B cipher text=BDABDDBCE
R :18=2^18 mod 5=4 : D
F : 6=2^6 mod 5=4 : D
A : 1=2^1 mod 5=2 : B
C : 3=2^3 mod 5=3 : C
E : 5=2^5 mod 5=2 : E

EXAMPLE
Void simulation(*void){
int i;
Boolean h;
i=0;
for(;;){
Cryptography machine=new Cryptography(randomly);
h=false;
Timer timers;
Encrypt(n , m , j);/*n ^ j mod m*/
if(limit<=timers){
Switch(randomly){
Case1:

IMPLEMENTATION

h=true;
Break;
Case 2:
h=true;
Break;
.
.
Case n:
h=true;
}}while(h){
Cryptography machine=new Cryptography(randomly);
}}}


IMPLEMENTATION
Simulation processor makes this method more
efficient.
Reliability of the cryptographic machines used.
The data to be sent is highly durable.
It reduces a time complexity.

ADVANTAGES
Public key encryption method makes the process a bit
slower.
It is not easy to handle the simulation processor
sometimes.
The cryptographic machines used are highly
expensive.


DISADVANTAGES
AES
DES
QUANTUM CRYPTOGRAPHY
MULTI SCALE ELECTROPHYSIOLOGY FORMAT
MULTIPHASE ENCRYPTION TECHNIQUE
ADVANCED TECHNIQUES
Thus, Multi Home Cryptography highly secures
the Distributed Systems from hijacking.

CONCLUSION
QUERIES ??

You might also like