Cybersecurity Algorithms Presentation.pptx

tunarkhankisiyev 5 views 28 slides Oct 16, 2025
Slide 1
Slide 1 of 28
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28

About This Presentation

cyber security algoriths how work in python


Slide Content

X.Tunar Ə.Huseyn Ə.Fidan

CYBERSECURITY ALGORITHMS x million According to the graph, the use of cybersecurity has significantly increased since 2018 and continues to grow every day. This growth is mainly associated with rapid digital transformation, the increasing amount of sensitive data being stored online, and the rising number of cyber threats, which force companies and individuals to strengthen their security measures Python is widely used in cybersecurity algorithms and tools not because it’s the fastest language, but because it’s the most practical for security professionals . Do you want to know why ? Then let’s talk about python advantages and disadvantages in cybersecurity algoritms

Cybersecurity is the protection of computer systems and networks from cyberattacks. It helps keep important information safe from hackers. Cybersecurity includes protecting devices like computers, smartphones, and servers. People use cybersecurity to stop viruses, malware, and other threats. Companies and governments rely on cybersecurity to protect their data. Without good cybersecurity, hackers can steal personal or financial information. Cybersecurity experts use special tools and software to find and fix problems. They also teach people how to use strong passwords and avoid risky websites. A strong cybersecurity system helps prevent attacks and keeps data secure. It is important for everyone who uses the internet.

Cybersecurity is the protection of computer systems and networks from cyberattacks. It helps keep important information safe from hackers. Cybersecurity includes protecting devices like computers, smartphones, and servers. People use cybersecurity to stop viruses, malware, and other threats. Companies and governments rely on cybersecurity to protect their data. Without good cybersecurity, hackers can steal personal or financial information. Cybersecurity experts use special tools and software to find and fix problems. They also teach people how to use strong passwords and avoid risky websites. A strong cybersecurity system helps prevent attacks and keeps data secure. It is important for everyone who uses the internet. WHAT IS THE CYBER SECURITY

Main Cybersecurity Algoritms Encryption Algorithms (symmetric and asymmetric) Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) Authentication Digital Signatures

Where is Cybersecurity Algoritms Using Financial Services : Banks use cybersecurity agains to cyber attacks and ensure secure transactions. Government and Military : National defense rely on cybersecurity to protect classified information and secure communication channels T elecommunications : Telecom companies implement cybersecurity measures to ensure that communication networks are secure and data transmittion . Aviation and Transportation : The transportation industry rely on cybersecurity to secure systems that control air traffic, railways, and even autonomous vehicles, ensuring the safety of passengers and goods. Cloud Computing : Cloud service providers and users depend on cybersecurity to ensure that data stored and processed in the cloud is safe from unauthorized access, data loss.

Where is Cybersecurity Algorithms Using Financial Services : Banks use cybersecurity agains to cyber attacks and ensure secure transactions. Government and Military : National defense rely on cybersecurity to protect classified information and secure communication channels T elecommunications : Telecom companies implement cybersecurity measures to ensure that communication networks are secure and data transmittion . Aviation and Transportation : The transportation industry rely on cybersecurity to secure systems that control air traffic, railways, and even autonomous vehicles, ensuring the safety of passengers and goods. Cloud Computing : Cloud service providers and users depend on cybersecurity to ensure that data stored and processed in the cloud is safe from unauthorized access, data loss.

Using Programming Languages in CYBERSECURITY C/C++ Ruby JavaScript Bash Python

Cybersecurity Overview Python's Popularity in Cybersecurity : Python has become a go-to language in cybersecurity due to its simplicity and powerful capabilities. Security experts, ethical hackers, and penetration testers use Python to automate tasks, identify vulnerabilities, and create security tools. Libraries in Python for Cybersecurity ADVANTAGES DISADVANTAGES 1. Readability and Simplicity 1. Performance Limitations 2. Extensive Libraries and Frameworks 2. Global Interpreter Lock (GIL) 3. Cross-Platform Compatibility 3. Limited Mobile and Low-Level Capabilities 4. Support for Ethical Hacking and Penetration Testing 4. Dependency on External Libraries 5. Community and Open-Source Resources 5. Not Ideal for Low-Level Tasks 6. Integration with Cybersecurity Tools 6.Not Ideal for OS-Level Exploits Introduction Python in

Libraries in Python for Cybersecurity Comparison python and C++ for Cybersecurity algoritms Python C++ Aspects Performance Slower Much faster Ease of use Very easy Complex Security Memory-safe Vulnerable to low-level bugs Use cases Automation, scripting, analysis Cryptography, kernel-level tools, real-time IDS Ecosystem Huge, modern Strong but lower-level Python → Best for rapid development , automation scripts , cryptography , and algorithm prototyping C++ → Best for high-performance real-time network monitoring , and core security software .

Cybersecurity Algoritms In Python Overview Python's Popularity in Cybersecurity : Python has become a go-to language in cybersecurity due to its simplicity and powerful capabilities. Security experts, ethical hackers, and penetration testers use Python to automate tasks, identify vulnerabilities, and create security tools. Extensive Libraries and Tools : for network scanning. for sending HTTP requests. for low-level network operations. for implementing encryption. Scapy Requests Socket Cryptography

Encryption Algorithms (symmetric and asymmetric) Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) Authentication Digital Signatures Main Cybersecurity Algoritms What is Scapy ? Scapy is a Python library used in cybersecurity to analyze, create, and modify network traffic. It allows users to "sniff" (capture) and "craft" (build) network packets. Scapy is widely used because it’s powerful yet easy to use, making it ideal for security testing. Why Scapy is Important in Cybersecurity Flexible and Customizable : Scapy lets you modify packets down to the smallest detail, which is essential for advanced network testing. Easy to Code : Scapy’s simple syntax allows security pros to quickly write scripts for testing and security analysis. Control Over Network Traffic : With Scapy , users can examine and manipulate network traffic, a vital skill for penetration testing and identifying vulnerabilities. Common Uses of Scapy Packet Sniffing 2.Network Scanning 3.Packet Crafting 4.ARP Spoofing 5.Network Mapping

Encryption Algorithms (symmetric and asymmetric) Encryption is the process of converting readable data (plain text) into a scrambled, unreadable form (cipher text) so that only someone with the right key can turn it back into its original form Plaintext → the original readable data. Ciphertext → the encrypted (scrambled) data. Key → a secret code used to lock (encrypt) or unlock (decrypt) the data Types of Encryption: Symmetric Encryption Asymmetric Encryption

Encryption Algorithms (symmetric and asymmetric) Symmetric Encryption Symmetric encryption is a cryptographic technique where the same secret key is used for both encryption (turning plaintext into ciphertext) and decryption (turning ciphertext back into plaintext). ✨ Key Points Single Key: One shared secret key is used for both operations. Speed: It’s much faster than asymmetric (public/private key) encryption because it uses simpler mathematics. Key Distribution Problem: Both parties must securely share and protect the key before communication. If the key leaks, security is broken. 🔑 Common Symmetric Algorithms AES (Advanced Encryption Standard) — most widely used . DES/3DES — older, now largely replaced by AES. ChaCha20 — fast and modern, used in TLS.

Encryption Algorithms (symmetric and asymmetric) Symmetric Encryption

Encryption Algorithms (symmetric and asymmetric) Asymmetric Encryption Asymmetric encryption (also called public-key cryptography ) uses two mathematically related keys instead of one: a public key (can be shared with anyone) a private key (kept secret) Anything encrypted with one key can only be decrypted with the other. ✨ Key Points No shared secret needed in advance: You can publish your public key openly. Two main uses: Confidentiality – Sender encrypts with recipient’s public key → only recipient can decrypt with private key. Authenticity / Signatures – Sender signs with their private key → anyone can verify with the public key. Slower than symmetric encryption 🔑 Common Algorithms RSA (Rivest–Shamir–Adleman) – most common. ECC (Elliptic Curve Cryptography) – faster, smaller keys. Diffie–Hellman / ECDH – for key exchange.

Encryption Algorithms (symmetric and asymmetric) Asymmetric Encryption

Encryption Algorithms (symmetric and asymmetric) Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) Authentication Digital Signatures Main Cybersecurity Algoritms What is Scapy ? Scapy is a Python library used in cybersecurity to analyze, create, and modify network traffic. It allows users to "sniff" (capture) and "craft" (build) network packets. Scapy is widely used because it’s powerful yet easy to use, making it ideal for security testing. Why Scapy is Important in Cybersecurity Flexible and Customizable : Scapy lets you modify packets down to the smallest detail, which is essential for advanced network testing. Easy to Code : Scapy’s simple syntax allows security pros to quickly write scripts for testing and security analysis. Control Over Network Traffic : With Scapy , users can examine and manipulate network traffic, a vital skill for penetration testing and identifying vulnerabilities. Common Uses of Scapy Packet Sniffing 2.Network Scanning 3.Packet Crafting 4.ARP Spoofing 5.Network Mapping

Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) A hash function takes input data of any size and produces a fixed-size string of characters (a “digest” or “hash”). One-way: you can’t reconstruct the original data from the hash. Deterministic: the same input always produces the same hash. Tiny change in input → completely different hash. Uses: password storage, file integrity, digital signatures, checksums. 📚 Common Hashing Algorithms 1. MD5 (Message Digest 5) Output: 128 bits (32 hex characters). Very fast but no longer secure (collisions can be found). Still used for non-security tasks like file checksums. 2. SHA-1 (Secure Hash Algorithm 1) Output: 160 bits (40 hex characters). More secure than MD5 but also broken for serious security use . Still appears in legacy systems. 3. SHA-256 (part of SHA-2 family) Output: 256 bits (64 hex characters). Modern and widely used for security. 4. SHA-512 (part of SHA-2 family) Output: 512 bits (128 hex characters). Same security principles as SHA-256 but larger digest.

Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512)

Encryption Algorithms (symmetric and asymmetric) Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) Authentication Digital Signatures Main Cybersecurity Algoritms What is Scapy ? Scapy is a Python library used in cybersecurity to analyze, create, and modify network traffic. It allows users to "sniff" (capture) and "craft" (build) network packets. Scapy is widely used because it’s powerful yet easy to use, making it ideal for security testing. Why Scapy is Important in Cybersecurity Flexible and Customizable : Scapy lets you modify packets down to the smallest detail, which is essential for advanced network testing. Easy to Code : Scapy’s simple syntax allows security pros to quickly write scripts for testing and security analysis. Control Over Network Traffic : With Scapy , users can examine and manipulate network traffic, a vital skill for penetration testing and identifying vulnerabilities. Common Uses of Scapy Packet Sniffing 2.Network Scanning 3.Packet Crafting 4.ARP Spoofing 5.Network Mapping

Authentication Authentication is the process of verifying the identity of a user, system, or device before granting access to resources. It answers the question: “Who are you?” 🔑 Authentication Factors Something you know – Passwords, PINs, security questions. Something you have – Smart card, OTP token, phone app. Something you are – Biometrics: fingerprint, face, iris. Somewhere you are – Location-based checks, IP, GPS. Common Authentication Methods Passwords / Passphrases One-Time Passwords (OTP) via SMS, email, authenticator app Hardware tokens / smart cards Biometric authentication (fingerprint, face ID) Certificate-based authentication (mutual TLS) Single Sign-On (SSO) systems

Authentication

Encryption Algorithms (symmetric and asymmetric) Hashing Algorithms (MD5 , SHA-1 , SHA-256 , SHA-512) Authentication Digital Signatures Main Cybersecurity Algoritms What is Scapy ? Scapy is a Python library used in cybersecurity to analyze, create, and modify network traffic. It allows users to "sniff" (capture) and "craft" (build) network packets. Scapy is widely used because it’s powerful yet easy to use, making it ideal for security testing. Why Scapy is Important in Cybersecurity Flexible and Customizable : Scapy lets you modify packets down to the smallest detail, which is essential for advanced network testing. Easy to Code : Scapy’s simple syntax allows security pros to quickly write scripts for testing and security analysis. Control Over Network Traffic : With Scapy , users can examine and manipulate network traffic, a vital skill for penetration testing and identifying vulnerabilities. Common Uses of Scapy Packet Sniffing 2.Network Scanning 3.Packet Crafting 4.ARP Spoofing 5.Network Mapping

Digital Signatures A digital signature is a cryptographic technique used to prove the authenticity and integrity of a message or file. It’s like a “fingerprint” produced with a private key. Anyone with the corresponding public key can verify it. How it works : Sender creates a hash of the message. Sender encrypts that hash with their private key → digital signature. Receiver uses the sender’s public key to verify that the signature matches the message. Used in software updates, blockchain, electronic documents, TLS certificates, etc. Feature Meaning Authentication Confirms who sent the message. Integrity Ensures the content hasn’t been changed. Non-repudiation Sender cannot later deny sending it. What it gives us :

Digital Signatures

Conclusion Cybersecurity algorithms form the backbone of digital defense, protecting sensitive data, communications, and systems from ever-evolving threats. From encryption and hashing to authentication and digital signatures, these algorithms ensure trust, confidentiality, and integrity in the digital world. While no system is perfectly secure, the continuous improvement of algorithms, combined with vigilant cybersecurity practices, helps us stay one step ahead of attackers. Understanding these algorithms is not just about technology—it’s about safeguarding the future of our digital society.
Tags