2
Most read
3
Most read
By
G. MANJUNATH, BCA III Year
 Introduction
 Risk Factors for Cryptography Systems
 Authentication and Key Establishment
 Types of Security Attacks
 Security Services
 Network Security Model
 Secret Key Cryptography
 Types of Firewalls
 Future Work
 Conclusion
Cryptography is the study of
secret (crypto-) writing (-graphy)
It verifies the correctness of a message to
the recipient (authentication)
A network Is an interconnection or a media between two or
more systems to share information among them.
The various threats caused to network are :
Remote Login
Application Backdoors
SMTP Session Hijackings
Operating System Bugs
Spams
Viruses etc.
There is no simple formula for determining how safe a specific
cryptosystem is from attacks and potential security compromises.
The Following Factors Affect The Risk Of Successful Attacks On
Cryptosystems:
 Symmetric Key Length
 Public Key Lifetimes
 Amount Of Plaintext Known To Attackers
 Strength Of The Security Implementation
 Randomness Of Generated Keys
 Strength Of The Security Protocols
Risk
Impact
Damage
Potential
No. of Affected
Components
Possibility
Degree Of
Migration
Ease Of
Exploitation
Discoverability
Exploitability Reproducability
 Authentication and key establishment
are foundational for establishment
of secure communication channels.
 There exists a variety of
authentication protocols for different
applications and with different security guarantees.
 The Authentication techniques such as private keys,
passwords, or biometric data,
and more sophisticated security
properties such as leakage resilience
or robustness.
The are few intertwined in network security as :
 Secrecy
 Authentication
 Non - Repudation
 Integrity Control etc
Theards are classified in two categories :
 Passive Attacks - eavesdropping on, or monitoring of, transmissions to:
 obtain message contents, or
 monitor traffic flows
 Active Attacks – modification of data stream to:
 masquerade of one entity as some other
 replay previous messages
 modify messages in transit
 denial of service
It is a service that is provided by a protocol
layer of communicating and security systems or data
transmission. It enhances the security of data
processing and transferring.
Data Integrity
Data Confidentiality
Authenticity
Non - Repudiation
Access Control
 A message is to be transferred from
one part of Internet service.
 A security-related y to another across
some sort of transformation on the
information to be sent.
 Message should be encrypted by key so that it is unreadable by
the opponent
 An encryption key used in conjunction
with scramble the message before
transmission and unscramble it on
reception
AES was designed to be efficient in both hardware and software.
AES comprises three block ciphers, are
AES-128,
AES-192 and
AES-256.
Each cipher encrypts and decrypts data in blocks of 128 bits
using cryptographic keys of 128-, 192- and 256-bits.
AES is largely considered impervious to all attacks, with the
exception of brute force.
Security experts believe that AES will eventually be hailed the de
facto standard for encrypting data in the private sector.
Network Security and Cryptography
It can operate as a positivefilter, allowingto pass only packets thatmeet
specific criteria,or as a negativefilter, rejectingany packet that meetscertain
criteria.
Type of firewall:
PacketFilter
Stateful PacketInspection
Application-LevelGateway
13
 Prevents cyber attack
 Levels of access
 Protect data
 Confidentiality
 Authentication
 Data Integrity
 Non-repudiation
 Costly set up
 Time consuming
 Requires skilled staff
 Careless admin
 Difficult to access
even for a legitimate
user
 High availability
 Selective access
control
 The explosive growth in the Internet Network and
data security have become an inevitable concern
whose internal private network is connected to the
Internet.
 The security for the data has become highly
important. User’s data privacy is a central question
over cloud.
 With more mathematical tools, cryptographic
schemes are getting more versatile and often
involve multiple keys for a single application
 Network Security is the most vital
component in information security
it is responsible for securing all
information passed through networked computers adopted
by the administrator to protect the network accessible
resources from unauthorized access
 Cryptographic techniques to increase the security of
network provide a high degree of protection in digital
communications against intruder attacks
1 - William Stallings Principles And Practices
Book
2 - Lawrie Brown
3 - Dr. Himanshu Gupta ,Senior Faculty
Member, Amity University
4 - Xiang-yang Li

More Related Content

PDF
Network security - OSI Security Architecture
PDF
Network security for E-Commerce
PPT
Chapter 01
PPTX
Security Mechanisms
PPTX
Network security
PPT
Ch01
 
PDF
Network security chapter 1
PPTX
Types of attacks
Network security - OSI Security Architecture
Network security for E-Commerce
Chapter 01
Security Mechanisms
Network security
Ch01
 
Network security chapter 1
Types of attacks

What's hot (20)

PPTX
Network security by sandhya
PPTX
Wireless Communiction Security
PPTX
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
PDF
Cybersecurity Myths for Small and Medium-Sized Businesses
PPTX
Network security and firewalls
PPTX
Chapter- I introduction
PDF
Network Security Fundamentals
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Network security
PPTX
OSI Security Architecture
PPTX
Attack lecture #2 ppt
PPT
Network management and security
PDF
Network srcurity
PPTX
Ppt.1
PPTX
02 introduction to network security
PPT
Network Security
PPTX
Network attacks
Network security by sandhya
Wireless Communiction Security
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Cybersecurity Myths for Small and Medium-Sized Businesses
Network security and firewalls
Chapter- I introduction
Network Security Fundamentals
Chapter 1 Introduction of Cryptography and Network security
Network security
OSI Security Architecture
Attack lecture #2 ppt
Network management and security
Network srcurity
Ppt.1
02 introduction to network security
Network Security
Network attacks
Ad

Similar to Network Security and Cryptography (20)

DOCX
CCS354-NETWORK SECURITY-network-security notes
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
Module 1.pptx
PPTX
cns unit 1.pptx
PDF
Enhancement in network security with security
PDF
Enhancement in network security with security protocols
DOCX
Network security
PPTX
Cyber Security Part-I.pptx
PPTX
wireless communication security PPT, presentation
PPTX
Chapter 12 - Securing a Network CompTIA Network+
PPTX
Needs of Network security.pptx. Cryptography
PPT
Network Security Chapter 7
PPT
Lect13 security
PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
PPTX
E-commerce- Security & Encryption
PDF
Cryptography and Network Security ppt . pdf
PPT
Cryptography - Unit I | Introduction to Security Concepts
PPTX
Network security protocols.pptx
PDF
What New Cybersecurity Threats Are Emerging Against Encryption Systems
PPTX
Networking infrastructure
CCS354-NETWORK SECURITY-network-security notes
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Module 1.pptx
cns unit 1.pptx
Enhancement in network security with security
Enhancement in network security with security protocols
Network security
Cyber Security Part-I.pptx
wireless communication security PPT, presentation
Chapter 12 - Securing a Network CompTIA Network+
Needs of Network security.pptx. Cryptography
Network Security Chapter 7
Lect13 security
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
E-commerce- Security & Encryption
Cryptography and Network Security ppt . pdf
Cryptography - Unit I | Introduction to Security Concepts
Network security protocols.pptx
What New Cybersecurity Threats Are Emerging Against Encryption Systems
Networking infrastructure
Ad

Recently uploaded (20)

PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Configure Apache Mutual Authentication
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Configure Apache Mutual Authentication
Auditboard EB SOX Playbook 2023 edition.
Data Virtualization in Action: Scaling APIs and Apps with FME
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
MuleSoft-Compete-Deck for midddleware integrations
future_of_ai_comprehensive_20250822032121.pptx
sustainability-14-14877-v2.pddhzftheheeeee
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
4 layer Arch & Reference Arch of IoT.pdf
Co-training pseudo-labeling for text classification with support vector machi...
Build Your First AI Agent with UiPath.pptx
Consumable AI The What, Why & How for Small Teams.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Basics of Cloud Computing - Cloud Ecosystem
Training Program for knowledge in solar cell and solar industry
Custom Battery Pack Design Considerations for Performance and Safety
Dell Pro Micro: Speed customer interactions, patient processing, and learning...

Network Security and Cryptography

  • 2.  Introduction  Risk Factors for Cryptography Systems  Authentication and Key Establishment  Types of Security Attacks  Security Services  Network Security Model  Secret Key Cryptography  Types of Firewalls  Future Work  Conclusion
  • 3. Cryptography is the study of secret (crypto-) writing (-graphy) It verifies the correctness of a message to the recipient (authentication) A network Is an interconnection or a media between two or more systems to share information among them. The various threats caused to network are : Remote Login Application Backdoors SMTP Session Hijackings Operating System Bugs Spams Viruses etc.
  • 4. There is no simple formula for determining how safe a specific cryptosystem is from attacks and potential security compromises. The Following Factors Affect The Risk Of Successful Attacks On Cryptosystems:  Symmetric Key Length  Public Key Lifetimes  Amount Of Plaintext Known To Attackers  Strength Of The Security Implementation  Randomness Of Generated Keys  Strength Of The Security Protocols
  • 5. Risk Impact Damage Potential No. of Affected Components Possibility Degree Of Migration Ease Of Exploitation Discoverability Exploitability Reproducability
  • 6.  Authentication and key establishment are foundational for establishment of secure communication channels.  There exists a variety of authentication protocols for different applications and with different security guarantees.  The Authentication techniques such as private keys, passwords, or biometric data, and more sophisticated security properties such as leakage resilience or robustness.
  • 7. The are few intertwined in network security as :  Secrecy  Authentication  Non - Repudation  Integrity Control etc Theards are classified in two categories :  Passive Attacks - eavesdropping on, or monitoring of, transmissions to:  obtain message contents, or  monitor traffic flows  Active Attacks – modification of data stream to:  masquerade of one entity as some other  replay previous messages  modify messages in transit  denial of service
  • 8. It is a service that is provided by a protocol layer of communicating and security systems or data transmission. It enhances the security of data processing and transferring. Data Integrity Data Confidentiality Authenticity Non - Repudiation Access Control
  • 9.  A message is to be transferred from one part of Internet service.  A security-related y to another across some sort of transformation on the information to be sent.  Message should be encrypted by key so that it is unreadable by the opponent  An encryption key used in conjunction with scramble the message before transmission and unscramble it on reception
  • 10. AES was designed to be efficient in both hardware and software. AES comprises three block ciphers, are AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192- and 256-bits. AES is largely considered impervious to all attacks, with the exception of brute force. Security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.
  • 12. It can operate as a positivefilter, allowingto pass only packets thatmeet specific criteria,or as a negativefilter, rejectingany packet that meetscertain criteria. Type of firewall: PacketFilter Stateful PacketInspection Application-LevelGateway
  • 13. 13
  • 14.  Prevents cyber attack  Levels of access  Protect data  Confidentiality  Authentication  Data Integrity  Non-repudiation  Costly set up  Time consuming  Requires skilled staff  Careless admin  Difficult to access even for a legitimate user  High availability  Selective access control
  • 15.  The explosive growth in the Internet Network and data security have become an inevitable concern whose internal private network is connected to the Internet.  The security for the data has become highly important. User’s data privacy is a central question over cloud.  With more mathematical tools, cryptographic schemes are getting more versatile and often involve multiple keys for a single application
  • 16.  Network Security is the most vital component in information security it is responsible for securing all information passed through networked computers adopted by the administrator to protect the network accessible resources from unauthorized access  Cryptographic techniques to increase the security of network provide a high degree of protection in digital communications against intruder attacks
  • 17. 1 - William Stallings Principles And Practices Book 2 - Lawrie Brown 3 - Dr. Himanshu Gupta ,Senior Faculty Member, Amity University 4 - Xiang-yang Li