_Network Security
_Network Security
_Network Security
Ans:- The Network Security Model is a framework designed to protect the integrity,
confidentiality, and availability of data as it is transmitted across a network. Here’s a
detailed breakdown of its components and how it works:
Ans:-
A vulnerability in network security and cryptography refers to a
weakness or flaw within a cryptographic system or network security
protocols that can be exploited by attackers to gain unauthorized
access to data, disrupt operations, this could include issues like weak
encryption algorithms, improper key management, outdated
cryptographic standards.
Network security and cryptography are essential to protecting systems and
sensitive data. However, vulnerabilities can exist in both areas, potentially
allowing attackers to compromise confidentiality, integrity, and availability
Also known as symmetric encryption, this model uses a single key for both
encryption and decryption. This key is shared secretly between the sender
and the receiver.
The RSA algorithm is one of the most widely used and secure public key
cryptographic systems. Named after its creators Ron Rivest, Adi Shamir, and
Leonard Adleman, it allows secure data transmission
1. Key Generation:
Encryption:
Decryption:
Applications of RSA:
Disadvantages of RSA
Encryption
1. Convert the plaintext message mm into an integer such that 0≤m<p0 \leq m
< p.
2. Choose a random integer kk such that 1≤k≤p−21 \leq k \leq p-2.
3. Compute two values:
○ c1=gkmod pc_1 = g^k \mod p
○ c2=m⋅ykmod pc_2 = m \cdot y^k \mod p
Decryption
Advantages of ElGamal
1. Strong Security:
○ Based on the hardness of the discrete logarithm problem.
2. Flexibility:
○ Can be adapted for both encryption and digital signatures.
Disadvantages of ElGamal
1. Ciphertext Expansion:
○ The ciphertext size is double that of the plaintext, increasing storage
and transmission costs.
2. Slower Performance:
○ Computationally intensive compared to symmetric algorithms.
Elliptic Curve Cryptography (ECC) is a type of public-key cryptography based on
the algebraic structure of elliptic curves over finite fields. ECC offers equivalent
security to traditional methods like RSA and Diffie-Hellman but with significantly
smaller key sizes, making it efficient in terms of computation, storage, and
bandwidth.
Key Generation:
1. Choose an elliptic curve: Select a suitable elliptic curve over a finite field.
2. Choose a point: Select a point G on the curve (the base point).
3. Choose a private key: A random integer d.
4. Compute the public key: Q = d * G.
5.
Encryption:
Decryption:
Advantages of ECC:
● Smaller Key Sizes: ECC offers comparable security to RSA with smaller key sizes,
making it more efficient for resource-constrained devices.
● Faster Computations: ECC operations are generally faster than RSA operations,
especially for signature verification.
● Improved Performance: ECC is well-suited for mobile devices and embedded
systems.
Applications of ECC:
1. Complex Implementation:
○ ECC is more mathematically complex than RSA or Diffie-Hellman, increasing
the risk of implementation errors.
2. Patent Issues:
○ Some ECC techniques have been subject to patent restrictions.
3. Quantum Computing:
○ Vulnerable to Shor’s algorithm if large-scale quantum computers become
practical.
1. Key Pair:
○ Public Key: This key is shared openly and can be distributed to
anyone. It is used to encrypt data or verify digital signatures.
○ Private Key: This key is kept secret and is used to decrypt data
that has been encrypted with the corresponding public key or to
create digital signatures.
2. Asymmetry: The keys are asymmetric, meaning they perform inverse
operations. Data encrypted with the public key can only be decrypted
with the private key, and vice versa. This ensures that even if the public
key is known, the private key remains secure.
3. Encryption and Decryption:
○ To encrypt a message, the sender uses the recipient's public key.
Only the recipient's private key can decrypt this message,
ensuring that only the intended recipient can read it.
○ For digital signatures, the sender signs the message with their
private key. The recipient can verify the signature using the
sender's public key, ensuring the authenticity and integrity of the
message.
4. Authentication: Public-key cryptography provides a means of verifying
identity. When a message is signed with a private key, the recipient can
verify the sender's identity by checking the signature with the public key.
5. Confidentiality: Encrypting data with a public key ensures that only the
holder of the corresponding private key can decrypt and access the
information, maintaining the confidentiality of the communication.
6. Integrity and Non-repudiation: Digital signatures verify that the
message has not been altered in transit and that the sender cannot
deny having sent the message (non-repudiation).
Practical Applications
1. Identification:
Challenges in Authentication
1. Password Management:
○ Weak or reused passwords are a common vulnerability.
2. Phishing and Social Engineering:
○ Attackers trick users into revealing credentials.
3. Scalability:
○ Managing authentication for large, distributed systems.
4. User Privacy:
○ Storing sensitive data like biometric information securely.
Authentication Functions
How it works: A secret key is shared between the sender and receiver. The
sender calculates a MAC value based on the message and the secret key.
The receiver calculates their own MAC value and compares it to the received
MAC. If they match, the message is considered authentic and intact.
● Integrity: Ensures that the message has not been altered during
transmission.
● Authenticity: Confirms that the message originated from the claimed
sender.
● Non-Repudiation: Prevents the sender from denying having sent the
message.
Applications of MACs:
Working:
1 PAdding
2. Appending:
3. Dividing:
4: Initialising:
5: processing:
Applications of MD5
Security Issues
SHA-1
SHA-2
SHA-3
Applications of SHA:
Kerberos
Key Components
5. Database:
the database.
The Ticket Granting Server issues the ticket for the Server
Advantages of Kerberos:
Limitations of Kerberos:
advantage
Content Integrity
Methods:
Access Controls
Encryption
Strong Passwords
advantage
1. Monitoring:
○ IDS continuously observes network packets, system logs, or
both.
2. Analysis:
○ It compares activity against known attack patterns
(signatures) or detects unusual behavior (anomalies).
3. Alerting:
○ If suspicious activity is detected, the IDS generates alerts to
notify security teams.
Types of IDS
Limitations of IDS
● Reducing Risk:.
● Compliance: .
● Productivity Enhancement
2. Email Filtering:
ax + by = gcd(a, b)
Prime Numbers
A prime number is a natural number greater than 1 that has no
positive divisors other than 1 and itself. Prime numbers are
fundamental in number theory and cryptography.
Applications in Cryptography: