0% found this document useful (0 votes)
7 views

Cryptography

cryptography
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Cryptography

cryptography
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NETAJI SUBHASH ENGINEERING COLLEGE

Topic:- Cryptography and Network Security.


PRESENTED BY: PRADEEP KUMAR
SUBJECT: Cryptography and Network Security (PECIT801B )
UNIVERSITY ROLL NO. :10900220021
CLASS ROLL NO. :21
STREAM :IT
SEC :'A'
SEM:-(VIII)
Introduction to Cryptography and Network Security

Cryptography and network security play a crucial role in safeguarding sensitive


information in the digital age. They involve the implementation of algorithms and
protocols to secure communication and prevent unauthorized access.
Basic Concepts of Cryptography
Ancient Techniques
Early cryptography methods were used to encode messages, making them
unreadable to anyone except those with the decryption key.
Modern Encryption
Today's cryptography involves complex algorithms and mathematical principles
to ensure secure data transmission and storage.
Applications

Cryptography is applied in various fields, from secure communication


and online banking to digital signatures and blockchain technology.
Symmetric Key Encryption
1 Single Key System
Symmetric key encryption uses the same key for both encryption and decryption,
ensuring fast and efficient data processing.
2
Data Confidentiality
It focuses on keeping data secure from unauthorized access
and maintaining privacy during transmission and storage.
3 Security Algorithms
Modern symmetric encryption algorithms include AES (Advanced
Encryption Standard) and DES (Data Encryption Standard).
Asymmetric Key Encryption
Key Pair Generation
Asymmetric encryption involves the creation of a key pair: a public key
for encryption and a private key for decryption.
Digital Signatures
It enables the verification of the sender's identity and ensures data integrity
through the use of digital signatures.
Secure Communication
By using asymmetric encryption, secure communication channels can be
established without the need for prior key exchange.
Network Security Protocols
Firewalls
Firewalls act as a barrier between internal and external networks, filtering network
traffic based on predetermined security rules.

VPN (Virtual Private Network)


VPNs create a secure and encrypted connection over a less secure network, ensuring data
confidentiality and integrity.

SSL/TLS
Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols provide secure
communication over the internet, particularly for web browsing, email, and file transfers.
THANK YOU

You might also like