Information Security

31
INFORMATION SECURITY TECHNIQUES

Transcript of Information Security

Page 1: Information Security

INFORMATION SECURITY

TECHNIQUES

Page 2: Information Security

PREVENTION DETECTION RESPONSE RECOVERY

SECURITY MEASURES

Page 3: Information Security

PREVENTION

Page 4: Information Security

DETECTION

Page 5: Information Security

RESPONSE

Page 6: Information Security

RECOVERY

Page 7: Information Security

PREVENTION

Cryptography

Steganography

Digital Watermarking

Page 8: Information Security

CRYPTOGRAPHY

Page 9: Information Security

CRYPTOLOGY

CRYPTOGRAPHY

CRYPTANALYSIS

TERMINOLOGY:

Page 10: Information Security

General Model of  CRYPTOGRAPHIC SYSTEM

Page 11: Information Security

Types of ENCRYPTION

SYMMETRIC Encryption

ASYMMETRIC

Encryption

Page 12: Information Security

Dear AliI have received the new

Dear AliI have received the new

Dear Ali I have

received the new

Symmetric Key Encryption

Encryption Decryption

Original Data

Original Data

Jumbled Data

Symmetric Key

Symmetric Key

(Conventional /private key Encryption)

Page 13: Information Security

Asymmetric EncryptionAsymmetric Key Encryption

Page 14: Information Security
Page 15: Information Security
Page 16: Information Security

Cryptosystems offer 3 important services: 1. Secrecy , which refers to the

denial of access to info. by unauthorized users

2. Authenticity , which refers to the validation of the source of a message

3. Integrity , which refers to the assurance that a message was not modified by accidental or deliberate means to transit. 

Page 17: Information Security

APPLICATION:Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols which are designed to provide communication security over the Internet.

They use X.509 certificates and hence asymmetric cryptography to assure the counterparty with whom they are communicating, and to exchange a symmetric key.

Several versions of the protocols are in widespread use in applications such as

Web Browsing Email Instant Faxing Instant messaging Voice-over-IP (VoIP)

Page 18: Information Security

STEGANOGRAPHY

Page 19: Information Security

Types of Steganograp

hy

Pure Secret Key

Public Key

Page 20: Information Security

PURE STEGANOGRAPHY

Page 21: Information Security

ADVANTAGE :

DISADVANTAGE :

Reduces the difficulty in key sharing.

Doesn’t provide better security because it is easy to extract the message if the unauthorized person knows the embedding method.

Page 22: Information Security

SECRET-KEY STEGANOGRAPHY

Page 23: Information Security

Provides better security compared to Pure Steganography

Difficulty in sharing the secret key. If the attacker knows the key it will be easier to decrypt and access original information.

ADVANTAGE :

DISADVANTAGE :

Page 24: Information Security

PUBLIC-KEYSTEGANOGRAPHY

Page 25: Information Security

DIGITALWATERMARKING

Page 26: Information Security

Watermark

Page 27: Information Security
Page 28: Information Security

WATERMARKING

Robust Fragile Visible Invisible

Page 29: Information Security

APPLICATIONS OF WATERMARKING

Copyright protection

Monitoring

Content manipulation indication

Document Security

Page 30: Information Security

References:Newton, David E.

(1997). Encyclopaedia of Cryptography. Santa Barbara California

Simon Haykin(2010), Communication Systems

www.google.comwww.wikipedia.comwww.howstuffworks.comwww.slideshare.comwww.scribd.com

Page 31: Information Security

MADE BY:JAYPRIYA

CSE(EVE) 2nd Yr