VSM’s SOMASHEKHAR R. KOTHIWALE INSTITUTE OF TECHNOLOGY NIPANI - 591237 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING technical seminar on “cryptography and network security” Under the guidance of Prof . Anup ganji Presented by Vinayak ghorpade
CONTENT INTRODUCTION OSI SECURITY ARCHITECTURE CRYPTOGRAPHY DATA ENCRYPTION STANDARD APPLICATIONS ADVANTAGES DISADVANTAGES CONCLUSION REFERENCES
INTRODUCTION Information security has continuously been changing and tends to become more demanding. The growing usage of computer implies more protection of files and information. Computers needs tools to protect the stored files while communication links need to protect. Cryptography is the study of secure communication techniques and recipients of a message to view its contents.
OSI SECURITY ARCHITECTURE Security Attacks:- An attempt to gain unauthorized access to information. Passive attacks:- O btain message contents, or monitor traffic flows. Active attacks:- Modification of data stream to replay previous messages.
OSI SECURITY ARCHITECTURE Security Mechanism:- There are two types. Specific security mechanisms. P ervasive security mechanisms. Security Services :- Authentication - assurance that the communicating entity is the one claimed. Access Control - P revention of the unauthorized use of a resource. Data Confidentiality – P rotection of data from unauthorized disclosure. Data Integrity - Assurance that data received is as sent by an authorized entity.
CRYPTOGRAPHY Cryptography literally translates to the study of secret writing . The original intelligible message is known as plaintext while the transformed message is called ciphertext . Conversion from plaintext to ciphertext is known as encryption and the reverse process is known as decryption. Two basic methodologies of classic cryptography include substitution and transposition .
DATA ENCRYPTION STANDARD
APPLICATIONS Time stamping. Electronic money. Encryption/Decryption in email. Encryption in W hatsapp . Encryption in Instagram . Sim card Authentication.
ADVANTAGES It helps to protect the critical personal data of the clients available in the network. Helping on protecting secure information available in all the computers of a single network . It enables the use of digital certificate and digital timestamps, which is avery secure technique of signature authorization.
DISADVANTAGES If your Encryption process is interrupted then your data will be lost. In case , If you forget pin or password then you have to format it. The set up of a network security system can be a bit expensive. Firewalls can be difficult to configure correctly.
CONCLUSION Network Security is of critical importance and to provide the same cryptology with the study of various encryption and decryption methods is necessary . The key for building a secure network is to define what security means to your organization.
REFERENCES Dr. Bill Figg . “Data Networks and Cryptography,”Dakota State University, 2000 . William Stallings, “Network Security Essentials: Applications and Standards,3e William Stallings, “ Cryptogrphy and Internet security” Upper Saddle River,NJ,Prentice Hall, 1999