Professional Documents
Culture Documents
Seminar PPT (2021021143)
Seminar PPT (2021021143)
Tech seminar
Network Security and Cryptography
Presented by :-
Mahatejeshwar Singh
(2021021043)
B.Tech. 3rd Year (CSE)
mahatejeshwarsingh@gmail.com
Madan Mohan Malaviya University Of Technology, Gorakhpur
Contents
● Introduction to Network Security
● Network Security Model
● Types of Network Security
● Importance of Network Security
● Application of Network Security
● Cryptography
● Cryptography Block Diagram
● Features of Cryptography
● Types of Cryptography
● Importance of Cryptography
● Applications of Cryptography
● Conclusion
● References
1.
Madan Mohan Malaviya University Of Technology, Gorakhpur
2.
Madan Mohan Malaviya University Of Technology, Gorakhpur
3.
Madan Mohan Malaviya University Of Technology, Gorakhpur
5.
Madan Mohan Malaviya University Of Technology, Gorakhpur
• Protection of network.
• Protection from intrusions.
• To protect from threats.
• Protection of data from breaches.
6.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Cryptography
❖ Cryptography is the practice and study of techniques for secure communication in the presence of
third parties, often referred to as adversaries.
❖ It encompasses the methods used to encrypt and decrypt data, ensuring that only authorized parties
can access and understand the information while keeping it confidential and secure from
unauthorized access or tampering.
❖ Cryptography consists of two process : Encryption and Decryption.
➢ Encryption :- It is the process of converting plaintext or any other type of data into a ciphertext
that cannot be understood by unauthorized users. It uses algorithms and keys to scramble the
original data, making it unreadable without the corresponding decryption key.
➢ Decryption :- It is the process of converting ciphertext back into its original plaintext form. It
involves using the correct decryption key to reverse the encryption process, thereby restoring
the original data for authorized users to access and understand.
7.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Block Diagram
8.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Features Of Cryptography
Features Of Cryptography are as follows :
1. Confidentiality : Keep the contents of data confidential.
2. Integrity : It ensures that data remains accurate and consistent over its whole transmission process.
3. Scalability : Cryptographic algorithms and protocols should be scalable to support a wide range of
applications, from securing individual messages to protecting large-scale networks and systems.
4. Performance : Cryptography should be efficient and not introduce significant overhead in terms of
processing time and resource consumption, especially in real-time applications.
5. Resistance to Attacks : Cryptography aims to withstand various types of attacks, including brute-force
attacks, cryptanalysis, and side-channel attacks, to maintain the security of encrypted data.
9.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Types of CryptoGraphy
In general there are three types Of cryptography:
1) Symmetric Key Cryptography (Private Key Cryptography)
2) Asymmetric Key Cryptography (Public Key Cryptography)
1) Symmetric Key Cryptography :- It is an encryption system where the sender and receiver of message
use a single common key to encrypt and decrypt messages.
10.
Madan Mohan Malaviya University Of Technology, Gorakhpur
2) Asymmetric Key Cryptography :- Under this system a pair of keys is used to encrypt and decrypt
information. A public key is used for encryption and a private key is used for decryption. Public key
and Private Key are different.
11.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Importance of Cryptography
● Cryptography ensures that sensitive information remains confidential by encrypting it, making it
unreadable to unauthorized users. This is crucial for protecting personal, financial, and business data
from eavesdropping, espionage, and theft.
12.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Applications of Cryptography
• Secure Communication :- Encryption is used to secure email communication, instant messaging, voice
calls, and video conferencing, ensuring that only authorized parties can access the content.
• Digital Currencies :- To safeguard transactions and prevent fraud, digital currencies like Bitcoin also
use cryptography.
• Data Protection :- Cryptography is used to encrypt data stored on devices like computers,
smartphones, and external drives, protecting it from unauthorized access in case of theft or loss.
• Authentication :- Cryptography is used for authentication in many different situations, such as when
accessing a bank account, logging into a computer, or using a secure network.
• End-to-End Encryption :- End-to-end encryption is used to protect two-way communications like
video conversations, instant messages, and email. End-to-end encryption is widely used in
communication apps like WhatsApp and Signal, and it provides a high level of security and privacy
for users.
13.
Madan Mohan Malaviya University Of Technology, Gorakhpur
Conclusion
• Cryptography and network security are two of the networking terms used for the protection and
security of data and network.
• Network security protects the sensitive data of clients and it protects the network from ransomware.
• Cryptography ensures data confidentiality and provides data protection from unauthorized access.
• Confidentiality, Data Integrity, Authentication, and Non-Repudiation are the main principles of
cryptography.
• Cryptography is used to protect the private information shared between two communicating parties
from a third party.
• Network security is the actions taken or procedures followed to protect the computer network.
14.
Madan Mohan Malaviya University Of Technology, Gorakhpur
References
• https://www.tutorialspoint.com/cryptography/cryptosystems.htm
• https://www.javatpoint.com/computer-network-security
• https://en.wikipedia.org/wiki/Network_security
• https://www.scaler.com/topics/computer-network/cryptography-and-network-security/
• https://www.geeksforgeeks.org/cryptography-and-network-security-principles/
15.
THANK YOU