You are on page 1of 11

NETWORK

SECURITY
INTRODUCTION TO NETWORK
SECURITY
• *network
• Security.
• Now million of ordinary citizen are using network for
banking and shopping.
• It is concerned with making sure that nosy people can
not read it.
• It is concerned with people trying to access remote
services that they are not authorized to use.
• Most security problems are intensely caused by malicious
people tying to gain some benefit and to harm someone.
As a example
• student and account and business.
FIREWALL
• *it is hardware and software configuration which sits at this parameter
and controlling access into and out of your company’s network,
• In firewalls allows only authorized communication between the internal
and external networks.
• They are very effective at keeping out authorized users and stopping
unwanted activities on an internal network..
• *EXAMPLE :- COMPANY.


ENCRYPTION and DECRYPTION

• It relay on key or password.


• Encryption is the process of translating
from it’s original form (called plain text)
into an encoded and unreadable form
(cipher text).
• Decryption refers to the process of taking
cipher text and translating back to plain
text.
TERMS RELATED TO ENCRYPTION
PROCESS
• KEY :- the message to be encrypted is known as plain text are
transformed by a function that is parameterized by key.
• The output of the encryption process known as cipher text.
• HASH FUNCTION :-the hash function is used as a method to ensure
that a message has not been altered.
• MESSAGE DIGEST :- the process produce no known as message
digest.
• The message digest is encrypted apart from the message itself ,
with the sender’s private key.
• DIGITAL FINGERPRINTF:-a unique no that only originator with a
private key can create and which can only be decrypted with public
key.
• DIGITAL SIGNATURE:- it deals with signature.
INTRODUCTION TO
CRYPTOGRAPHY
• It consist cipher and code.
• A cipher is a character for character transform.
• Code replace one word with another word.
• It is used for encryption and decryption.
• Most successful code is used by u.s. during second world
war in pacific.
• It is used whenever someone want to send a secret
message to someone else.
• There are two types of algorithm
• 1)private key.
• 2)public key
• Private key:- it is uses same key to encryption and
decryption the data .
• It is also referred to as symmetric cryptography.
• advantages:-
• it is very fast.
• key is strong as much more secure .
• cipher text is compact.
• Disadvantages:-
• administration of key are very complicated.
• it has no repudiation.
• large no o key are need for communication
Public key:-it uses one key to encryption the data and
another to decryption of the data. this is also referred to
as asymmetric cryptography.
advantages:-
it is more secure.
it supports non repudiation.
no of key managed by each users is vary less as
compared to secret key cryptography.
disadvantages:-
it is slower than the private key.
it is much larger than plain text.
TYPES OF CRYPTOGRAPHY

There are two types of cryptography


1)substitution ciphers:-
each letter is replaced by another
letter to disguise it.
2) transposition ciphers:-
it reorder the letters but do not
disguise them.
BIOMETRICS
– It is used for personal identification.
– Biometrics are about measuring specific
characteristic of a person
– including:- voice,fingerprints,signatures.
THANK YOU TO ALL OF U.

You might also like