Sei sulla pagina 1di 11

Visit: www.geocities.com/chinna_chetan05/forfriends.

html

CRYPTOGRAPHY AND NETWORK


SECURITY

1 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

Contents:

 Abstract

 Introduction

 Network Security Problems

 Key process Techniques

 Advanced cryptographic technique

 Steganography

 Cryptographic technologies

 Based on layers
 Based on algorithms

 Applications of cryptography

 Application of network security

 Conclusion

2 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

CRYPTOGRAPHY

NETWORK SECURITY

CRYPTOGRAPHY AND to the cyber world an attack is often


NETWORKSECURITY preceded by information gathering.
Movie gangsters “case the joint”;
ABSTRACT
“SECURITY” in this soldiers “scout the area”. This is also
contemporary scenarios has become a true in the cyber world. Here the “bad
more sensible issue either it may be in guys” are referred to as intruders,
the “REAL WORLD” or in the “CYBER eavesdroppers, hackers, hijackers, etc.
WORLD”. In the real world as opposed The intruders would first have a

3 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

panoramic view of the victims network the case with this. Nevertheless the
and then start digging the holes. security breaches and eavesdroppers, the
Today the illicit activities of technological prowess has been
the hackers are growing by leaps and stupendously developed to defy against
bounds, viz., “THE RECENT ATTACK each of the assaults. Our paper covers
ON THE DNS SERVERS HAS the ADVANCED technical combats that
CAUSED A LOT OF HULLABALOO have been devised all through the way,
ALL OVER THE WORLD”. However, thus giving birth to the notion of
fortunately, the antagonists reacted “NETWORK -SECURITY”. Various
promptly and resurrected the Internet antidotes that are in fact inextricable
world from the brink of prostration. with security issues are – Cryptography,
Since the inception of Authentication, Integrity and Non
conglomerating Computers with Repudiation, Key Distribution and
Networks the consequence of which certification, Access control by
shrunk the communication implementing Firewalls etc.
world,hitherto, umpteen ilks of security
breaches took their origin. Tersely To satiate the flaws in the network
quoting some security ditherers – security more and more advanced
Eavesdropping, Hacking, Hijacking, security notions are being devised day
Mapping, Packet Sniffing, 1Spoofing, by day. Our paper covers a wide
DoS & DDoS attacks, etc. perspective of such arenas where the
Newton’s law says “Every action has got contemporary cyber world is revolving
an equal but opposite reaction”. So is around viz.
modification and deletion. Many people
. Introduction: pay great amounts of lip service to
security but do not want to be bothered
Network security deals with the
with it when it gets in their way. It’s
problems of legitimate messages being
important to build systems and networks
captured and replayed. Network security
in such a way that the user is not
is the effort to create a secure computing
constantly reminded of the security
platform. The action in question can be
system. Users who find security policies
reduced to operations of access,

4 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

and systems to restrictive will find ways Cryptography is the science of


around them. It’s important to get their using mathematics to encrypt and
feed back to understand what can be decrypt data.
improved, the sorts of risks that are Cryptography enables you to store
deemed unacceptable, and what has been sensitive information or transmit it
done to minimize the organizations across insecure networks (like the
exposure to them. Network security internet)
problems can be divided roughly into So that it cannot be read by anyone
four intertwined areas: expect the intended recipient. While
Secrecy, Authentication, cryptography is the science of securing
Nonrepudation, and Integrity control. data, cryptanalysts are also called
 Secrecy has to do with attackers. Cryptology embraces both
keeping information out of the cryptography and cryptanalysis.
hands of unauthorized users.

 Authentication deals with


whom you are talking to before
revealing sensitive information
or entering into a business deal.

 Nonrepudation deals with


signatures.

 Integrity control deals


KEY PROCESSTECHNIQUES:
with long enterprises like
There are three key process techniques.
banking, online networking.
They are:
 Symmetric-key encryption
These problems can be handled by using
cryptography, which provides means and  A symmetric-key encryption

methods of converting data into  Hash functions

unreadable from, so that valid User can


access Information at the Destination.

5 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

Symmetric-key encryption In public key can be passed openly

(one key): between the parties or published in a


public repository, but the related
private key remains private. Data
There is only one key in this
encrypted with the public key can be
encryption. That is private key. This
decrypted only using the private key.
key is only used for both encryption
Data encrypted with the private key
and decryption. This is also called as
can be decrypted only using the
private-key encryption. In this
public key. In the below figure, a
method the sender encrypt the data
sender has the receiver’s public key
through private key and receiver
and uses it to encrypt a message, but
decrypt that data through that key
only the receiver has the related
only.
private key used to decrypt the
message.

Private Key method


Private Key method
Asymmetric-key encryption (two Public key method
keys): Hash functions:
There are two keys in this encryption. An improvement on the public key
They are: scheme is the addition of a one-way
 Public key hash function in the process. A one-
 Private key way hash function takes variable
length input. In this case, a message
Two keys – a public key and a of any length, even thousands or
private key, which are millions of bits and produces a fixed-
mathematically related, are used in length output; say, 160-bits. The
public-key encryption. To contrast it function ensures that, if the
with symmetric-key encryption, information is changed in any way
public-key encryption is also some even by just one bit an entirely
times called public-key encryption. different output value is produced.

6 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

which data can be kept confidential.


Steganography hides the existence of
a message by transmitting

As long as a secure hash function is information through various carriers.

used, there is no way to take Its goal is to prevent the detection of

someone’s signature from one secret message.

documents and attach it to another, Steganography uses techniques to

or to alter a signed message in any communicate information in a way

way. The slightest change in signed that is a hidden. The most common

documents will cause the digital use of Steganography is hiding

signature verification process to fail. information image or sound within


the information of another file by
using a stegokey such as password is
additional information to further
conceal a message.
There are many reasons why
Srteganography is used, and is often
used in significant fields. It can be
used to communicate with complete
freedom even under conditions that
are censured or monitored.

ADVANCED The Steganography is an effective


means of hiding data, there by
CRYPTOGRAPHIC
protecting the data from
TECHNIQUE
unauthorized or unwanted viewing.
STEGANOGRAPHY
But stego is simply one of many
ways to protect confidentiality of
INTRODUCTION:
data. Digital image steganography is
Over the past couple of year’s
growing in use and application. In
Steganography has been the source
areas where cryptography and
of a lot of discussion. Steganography
strong encryption are being
is one of the fundamental ways by

7 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

outlawed, people are using Steganography can be used to tag


steganography to avoid these policies notes to online images.
and to send these messages secretly.
Although steganography is become CRYPTOGRAPHIC
very popular in the near future. TECHNOLOGIES
Based on layers:
WHAT IS STEGANOGRAPHY?
The word steganography comes
 Link layer encryption
from the Greek name “stegnos”
(hidden or secret) and “graphy”  Network layer encryption

(writing or drawing”) and literally  IPSEC, VPN, SKIP

means hidden writing.  Transport layer


Stegenography uses techniques to  SSL, PCT (private
communicate information in a way Communication Technology)
that is hidden.  Application layer
The most common use of  PEM (Privacy Enhanced
Steganography is hiding information Mail)
image or sound within the  PGP (Pretty Good Privacy)
information of another file by using a  SHTTP
stegokey such as password is
additional information to further Cryptographic process can be
conceal a message. implemented at various at various layers
starting from the link layer all the
WHAT IS STEGANOGRAPHY way up to the application layer. The
USED FOR?
most popular encryption scheme is SSL
Like many security tools,
and it is implemented at the transport
steganography can be used for
layer. If the encryption is done at the
variety of reasons, some good, some
transport layer. If the encryption is done
not so good. Steganography can also
at the transport layer, any application
be used as a way to make a substitute
that is running on the top of the transport
for a one-way hash value. Further,
layer can be protected.

8 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

but factoring the


Based on algorithms: resulting product
is practically
impossible.
 Secret-key encryption
algorithms (symmetric
APPLICATIONS
algorithms)
OF CRYPTOGRAPHY
 DES (Data
Encryption
 Defense service
Standard)—
56bitkey  Secure Data Manipulation

 Triple DES—  E-Commerce

112bitkey  Business Transactions

 IDEA  Internet Payment Systems

(International  Pass Phrasing Secure


Data Encryption Internet Comm.
Algorithm)—  User Identification
128bitkey Systems
 Access control
 Public-key encryption  Computational Security
algorithms (Asymmetric  Secure access to Corp
algorithms) Data
 Data Security
Diffie-Hellman (DH): Exponentiation is APPLICATIONS OF NETWORK
easy but computing discrete algorithms SECURITY
from the resulting value is practically
impossible. Computer networks were
primarily used by university
 RSA: researchers for sending email,
Multiplication of and by corporate employees
two large prime for sharing printers. Under
numbers is easy

9 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

these conditions, security did down into their components,


not get a lot of attention. and it becomes much simpler to
decide whether what is
proposed will be conflict with
your security policies and
But now, as millions of practices.
ordinary citizens are using Security is
networks for: everybody’s business, and only
with everyone’s cooperation,
 Banking intelligent policy, and
 Shopping consistent practices, will it be

 Filling achievable.

their tax Cryptography

returns protects users by providing


functionality for the encryption
of data and authentication of
other users. This technology
CONCLUSION:
lets the receiver of an
Network security is a very
electronic messages verify the
difficult topic. Every one has a
sender, ensures that a message
different idea of what
can be read only by the
“security” is, and what levels
intended person, and assures
of risks are acceptable. The key
the recipient that a message has
for building a secure network is
not be altered in transmit. The
to define what security means
Cryptography Attacking
to your organization. Once that
techniques like Cryptanalysis
has been defined, everything
and Brute Force Attack. This
that goes on with. The network
paper provides information of
can be evaluated with respect
Advance Cryptography
to the policy. Projects and
Techniques.
systems can then be broken

10 Email: chinna_chetan05@yahoo.com
Visit: www.geocities.com/chinna_chetan05/forfriends.html

BIBOLOGRAPHY:

 “Computer Networks ”,
by Andrew S.Tanunbaum
 “Fighting Steganography
detection” by Fabian
Hansmann
 “Network security” by
Andrew S.Tanenbaum
 “Cryptography and
Network Security” by
William Stallings
 “Applied Cryptography”
by Bruce Schneier,
JohnWillley and Sons Inc
 URL:
http://www.woodmann.co
m/fravia/fabian2.html.
 URL:
http://www.jjtc.com/stegd
oc/sec202.html.

11 Email: chinna_chetan05@yahoo.com

Potrebbero piacerti anche