Ccn

21

Transcript of Ccn

Page 1: Ccn
Page 2: Ccn

CONTENTS

SECURITY SECURITY THREATSSECURITY GOALSWHAT IS CRYPTOGRAPHYBASIC TERMSENCRYPTION & DECRYPTIONCATEGORIES OF CRYPTOGRAPHYCOMPARISONCONCLUSION

Page 3: Ccn

WHAT DOES SECURITY MEAN?

SECURITY???Network security is an over arching term.

Page 4: Ccn

Security threats

1. Passive threats2. Active threats

Page 5: Ccn
Page 6: Ccn
Page 7: Ccn

PLAIN TEXT CIPHER TEXT CIPHER ENCRIPTION & DECRYPTION KEYS

BASIC TERMS

Page 8: Ccn
Page 9: Ccn

CATAGORIES OF CRYPTOGRAPHY

A. Symmetric cryptographyB. Asymmetric cryptography

Page 10: Ccn

SYMMETRIC KEY CRYPTOGRAPHYo also known as secret key cryptography.o Sender & receiver uses same key for

encryption & decryption namely public key

Page 11: Ccn
Page 12: Ccn

a. Traditional cipher b. Modern cipherTwo types traditional cipheri. Substitution cipherii. Transposition cipher

Types of ciphers

Page 13: Ccn

Substitution cipher

A substitutional cipher is one in which the letters/numbers/symbols is replaced by other letters/numbers/symbolse.gA d, t z

2 5, 3 6

Page 14: Ccn
Page 15: Ccn

Asymmetric key cryptography Also known as public key Sender and receiver uses different keys for encryption and decryption namely public & private key

Page 16: Ccn
Page 17: Ccn
Page 18: Ccn

COMPARISON

Symmetric key cryptography

Asymmetric key cryptography

1. The same algorithm with same key is used for encryption & decryption

2. The key must be kept secret

3. may be impossible or at least impractical to decipher a message if no other information is given

1. One algorithm is used for encryption & other for decryption with a pair of keys respectively

2. One of the key must be kept secret

3. It may be impossible or at least impractical to decipher a message if no other information is given

Page 19: Ccn

applications

• Defense services• Secure data manipulation• Business transactions• Internet payment systems• User identification systems• Acess control• Data security

Page 20: Ccn

conclusion

By using of encryption techniques ,a fair unit of confidentiality,authentication,integrity,acess control and availability of data is maintained

Page 21: Ccn

thanks