Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 30

Data Security & Encryption

Navneet Kapoor HCL Infosystems ltd.

Attacks

An Attack is an Attempt to bypass normal Security.

Types : Password Guessing Man in the middle Spoofing Denial of Service.

BRUTE FORCE TECHNIQUE

Brute Force Attack

STRONG PASSWORD

Man In-The-Middle Attack

DOS ATTACK

IP SPOOFING

Who is Attacking ?
Professional Crackers Social Engineering Malicious Code * Virus * Worm * Trojan Horse

Cryptography

It is currently one of the way to ensure * Confidentiality * Integrity * Non Repudiation * Identification & Authentication.

Authentication * The verification of Data


Integrity & Data Origin .

It is Based on ! Checksum ! CRC ! Hash

CHECK SUM

CRC

Secure Hash

Based On

( OWF )

Creates a fixed sized value based on variable sized unit of data.

MD4,MD5 & SHA1

MD4-128 bit, MD5-128bit, SHA-1 -160bit

What is an Algorithm

An Algorithm is a procedure for solving Mathematical problem.

Encryption Decryption C= M+K M = C-K Where C = Cipher Text M = Original Message K = Key

ALGORITHM

Types Of Encryption Algo.

Two Types Of Encryption Methods

! Symmetric Algorithm ! Asymmetric Algorithm All Maintains Different Solutions for Protecting C - I - A Traid

Symmetric Algorithms

Uses the Same key for Encryption & Decryption

Also Known as Shared Secret Key.

DES, 3 DES, AES, IDEA, Blowfish DES -56bit, 3DES-168bit, AES US Government

! Speed ! Strength

Disadvantages: Single Key. Difficult Distribution of Key Management.

Asymmetric Algorithms
Uses

Different Keys To Encrypt & Decrypt the Data. As Public key Cryptography

Known

Having

two types of keys. * Public key & Private Key.

Public Key
Provided

to everyone who needs to send you encrypted data.

Private Key
This

is the Key that only you possess.

Asymmetric

Keys provide Authentication, Integrity & No repudiation examples of Asymmetric Algorithms are Diffie-Hellman(DH) & RSA.

Some

*Secure Way to Communicate.


* Validate An Individual

Disadvantages

: ! Relatively Slow

Encryption Technology

Non-Repudiation

It Prevents the sender for Claiming that he or she didnt


Actually send the information.

Digital Signatures

CONTACT DETAILS
HCL INFOSYSTEMS LTD. CAREER DEVELOPMENT CENTRE A1-A2,JANTA STORE BAPU NAGAR JAIPUR 0141-4036000

You might also like