Data Security & Encryption: Navneet Kapoor HCL Infosystems LTD
Data Security & Encryption: Navneet Kapoor HCL Infosystems LTD
Attacks
STRONG PASSWORD
DOS ATTACK
IP SPOOFING
Who is Attacking ?
Professional Crackers Social Engineering Malicious Code * Virus * Worm * Trojan Horse
Cryptography
It is currently one of the way to ensure * Confidentiality * Integrity * Non Repudiation * Identification & Authentication.
CHECK SUM
CRC
Secure Hash
Based On
( OWF )
What is an Algorithm
Encryption Decryption C= M+K M = C-K Where C = Cipher Text M = Original Message K = Key
ALGORITHM
! Symmetric Algorithm ! Asymmetric Algorithm All Maintains Different Solutions for Protecting C - I - A Traid
Symmetric Algorithms
DES, 3 DES, AES, IDEA, Blowfish DES -56bit, 3DES-168bit, AES US Government
! Speed ! Strength
Asymmetric Algorithms
Uses
Different Keys To Encrypt & Decrypt the Data. As Public key Cryptography
Known
Having
Public Key
Provided
Private Key
This
Asymmetric
Keys provide Authentication, Integrity & No repudiation examples of Asymmetric Algorithms are Diffie-Hellman(DH) & RSA.
Some
Disadvantages
: ! Relatively Slow
Encryption Technology
Non-Repudiation
Digital Signatures
CONTACT DETAILS
HCL INFOSYSTEMS LTD. CAREER DEVELOPMENT CENTRE A1-A2,JANTA STORE BAPU NAGAR JAIPUR 0141-4036000