You are on page 1of 30

Communication Network

Security
(SLIDE-I)

Prof. Ayaskanta Mishra


E-Mail:ayaskanta.mishrafet@kiit.ac.in
Security Goals

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
ATTACKS

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
SECURITY SERVICES

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
SECURITY MECHANISM

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
TECHNIQUES
• CRYPTOGRAPHY
– Symmetric-Key Encipherment
– Asymmetric-Key Encipherment
– Hashing

• STEGANOGRAPHY

© Prepared by Prof. Ayaskanta Mishra


CRYPTOGRAPHY

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
Symmetric-key Encipherment

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
Asymmetric-key Encipherment

© Prepared by Prof. Ayaskanta Mishra


STEGANOGRAPHY

© Prepared by Prof. Ayaskanta Mishra


© Prepared by Prof. Ayaskanta Mishra
© Prepared by Prof. Ayaskanta Mishra
CRYPTOGRAPHY & NETWORK SECURITY

© Prepared by Prof. Ayaskanta Mishra

You might also like