1 Introduction To Network Security PDF
1 Introduction To Network Security PDF
A B
Interception
Network Threats
A B
Modification
Network Threats Contd..
3. Fabrication : If C send information to B postulating
as A. It treat to the Authentication
service.
A B
Fabrication
Network Threats Contd..
4. Interruption : If A wants to send information to B,
but somehow either not able to or
interrupted by somebody on the
network. It cause threat to the
Availability service.
A B
Interruption
Cryptography
or
{ E, D, K, P, C }
Where,
P is a plaintext.
C is a ciphertext.
K is a set of Keys or Key space.
X Y X
Sender Encryption Decryption Receiver
Secure Channel
K
Key source
Types of Cryptography
E Encrypted D
M M
Message
KRa KUa
User A User B
Keys: Ra, Ua Keys: Rb, Ub
M E C E C D D
C M
KRb KUa
EKRa(M) EKRa(M)
KRa KUb
EKRa(M)