Cryptography and Network Security-Ppt-1 (Autosaved) .PPTM
Cryptography and Network Security-Ppt-1 (Autosaved) .PPTM
Cryptography and Network Security-Ppt-1 (Autosaved) .PPTM
Security
What is computer security?
Computer security basically is the protection of computer systems and
information from harm, theft, and unauthorized use. It is the process
of preventing and detecting unauthorized use of your computer
system.
Types of security:
Computer security
Information security
Application security
Network security
Cyber security
Computer security threats
• Confidentiality : Only authorized people can read the data or see the data.
• Integrity: Data should not be changed or modified by unauthorized people.
• Availability: Data should be available or accessible at the time needed for authorized persons.
• Security attack – Any action that compromises the security of
information owned by an organization.
• Security mechanism – A mechanism that is designed to detect,
prevent or recover from a security attack.
• Security service – A service that enhances the security of the data
processing systems and the information transfers of an organization.
The services are intended to counter security attacks and they make
use of one or more security mechanisms to provide the service.
Security attacks
In this attack attacker can modifies the message and send into the
destination.
Denial of services:
In this attack the attacker tries to put the resources in work .in this
attacker resources are busy.
Difference between passive and active attack
SECURITY SERVICES
Security service – A service that enhances the security of the data processing
systems and the information transfers of an organization. The services are
intended to counter security attacks and they make use of one or more security
mechanisms to provide the service.
The classification of security services are as follows:
Confidentiality: Ensures that the information in a computer system and transmitted
Information are accessible only for reading by authorized
Authentication: Ensures that the origin of a message or electronic document is
correctly identified, with an assurance that the identity is not false.
Integrity: Ensures that only authorized parties are able to modify computer system
assets and transmitted information. Modification includes writing, changing
status, deleting, creating and delaying or replaying of transmitted messages.
Availability: Requires that computer system assets be available to
authorized parties when needed
Non repudiation: Requires that neither the sender nor the receiver of a
message be able to deny the transmission.
Access control: Requires that access to information resources may be
controlled by or the target system.
Security services
• Authentication:
Peer authentication
Data origin authentication
• Access control:
• Data confidentiality
• Connection-oriented confidentiality
• Connection-less confidentiality
• Selective –field confidentiality
• Traffic flow confidentiality
• Data integrity :
Connection oriented integrity
Connection less data integrity
Selective field integrity
5.Non repudiation:
6.Availability:
Security mechanism
• Encipherment
• Digital signature
• Access control data integrity
• Authentication exchange
cryptography
Plaintext
BOb message internet Alice
plaintext
encrypt
Cipher text decrypt
#$37jggh
hthr
• Encryption: The process of transforming or converting plaintext into
an unreadable format is called as encryption.
• Decryption: The process of converting cipher text into a plain text is
called as decryption.
• Keys: strings of bits used by cryptographic algorithm to transform
plain text into cipher text or vice versa.
• plaintext
• ciphertext
• encryption
• decryption
• confidentiality
• availability
• authentication
• access control
• clear text
• Integrity
• No repudiation
Applications of cryptography
Defense services
Secure data manipulation
E-commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security