0% found this document useful (0 votes)
3 views

ns unit 1

The document discusses various aspects of cryptography, including encryption, data security, and network security. It outlines different techniques and categories of security, such as access control, data backup, and hashing, while also addressing potential vulnerabilities and types of attacks. Additionally, it highlights the importance of public key cryptography and hash functions in ensuring data integrity and secure communication.

Uploaded by

sandy243154
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
3 views

ns unit 1

The document discusses various aspects of cryptography, including encryption, data security, and network security. It outlines different techniques and categories of security, such as access control, data backup, and hashing, while also addressing potential vulnerabilities and types of attacks. Additionally, it highlights the importance of public key cryptography and hash functions in ensuring data integrity and secure communication.

Uploaded by

sandy243154
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
MEENAKSHI COLLEGE OF ENGINEERING J) Basis 9 duyptogeaphy : * Guyptogsephyy B the praetor g eeu comonanieat ard data 44om unautherxcd acces & modi freation. “Pt fnvolues encoding Fnfarnetin so joer oY Prtincect seckpienls can undeastand it. ort Pnolucles encusption, ctecsupplion hashing ard Af gi teak Afgnedtune 5 Basic Termirologie Pn gecuity + =—— G pane = ca) exyptoguaphy + Ceo ate ceanee! ; trans fanfing an plain cnoupid Ore and than “seatnane fam back to onigiral dem. (by plafntext; The Grigiretl mowage The envy pad [Deansformd paessage © Li. iphortext : Igy ciphers An A aithmn Liarsfonirg pledntert | info envry pel One. S (> Key 2 Tyjormation uted by the cipher, The potincipes and nuttods teat message nto 9, th y) € @ that morse MEENAKSHI COLLEGE OF ENGINEERING @ Endpher Conodt) i “The prours @ conuntting plainte)t fo cpprextext using ¢ ciple and a ky gp Decipher Coleceele) the pstowess a tomtticg back nto plafntedt using & Ephuc atid a Kay J hashing; Conuarling data into a.fixed -length d , vate 10 ensure Patepeity Cipherte a Categarien Vartiou categories a Compulix eeunity ase ~ Cupptography « Data Secusity 4 Compdin Sounity * Nekoork Seuxly « @ Cy ptogeaphy > cata eneypiion giouption. Gi) Date Seuitg —> Ensucig Alaje date dior modifieation and. coviuption. cit) Connpullix Seesrnitty > Involuas tearing business - Merooik cpwations and processes. (iv) Gperational Seavly + Jevelue fPmoucts nettoelp fom cyber thsuats Pe hacking and pralvoaste, ~ MEENAKSHI COLLEGE OF ENGINEERING Techniques : commonly used -ascwtity techniques axe as Allows 19 Enotyption = Used! te prsotect fnteamation and daa, 2) Acs Contiol: Access dodata & Conmpatir B Certioutd by Wing anu rachanizin 3) Data Backup Additional Copies g data dleréol in : elepasrects Storage peering and 6 and dacictes Je) Fire voalt + Monitous netooik tiadfits alow 1 Hock. ©) Aniinas-SofBHang Ans ete heres porograme da sual-tinu tHoud, MEENAKSHI COLLEGE OF ENGINEERING MEENAKSHI COLLEGE OF ENGINEERING Trocrcils and Vulnmabllity? abo known The fundamental potnips g drewtly (Dtvudt : Potential sks -that can exploft vu (i) Volrwra (res: plsaknesses Pr a Systm that can exploPt. as Cin txiod lip Cconptolentialitg: Ensuring Pah only cutivon xk Gncividuals can acess Thformation Non-sepudiation wel h. Examplr onsunus that a puso cannot stendthg an = Keeping’ on Infomation Secut ubius a passed ‘ Non-stepuctfa tion ony any porternting an ackon, Buch as email making a enfine paynurt. pu make an online Juansacton , ~ Gy: A banking app wee andl OTP 10 acess your account, ensusting You can alse yourr © lyedenee and tansacton. Maintaining “the acewtaty anc eee vohen yf! Duustucer tAPrets of data Pr bank gerustlis a sucht witha ayia , -Aignatusu. This pacus that you mode the Pay wnt and peovurts you fon olenying the transacdtEn later. ~ Ensusting Data AUsalyy - &y YOhen you alird a mexssagewith yin LWheteapp enewyption ensuxe that noone can af a Guptegsaphy Pocaiust: modfly FH before Ft wuathes ta suconit. oie _ [7 Explain: bust Ensusting that clata and 2ty sens TT] / tA cau J Plaintect (erage - [eoyplion f— / Altarke- (it) Availability: ee ae acussible vohen necdid . - Ensusting Data & Accessible - 9: Cle Storage afnigy? She Greize Drive ns wey Hak you files tee Caveilably Fine , Cuan dai denen pain yananch MEENAKSHI COLLEGE OF ENGINEERING 3( Nekoak Security Hedut MEENAKSHI COLLEGE OF ENGINEERING 2 kequeuments for Auuthon ticcation: 1D Disclaswe > Release Emoeszge loiluts 10 any purse Touste thd YT panty: 2) Traficanalysis—> Decony of ™ pallan a traffic t anyorrntton | v blw portion O—> [| antemarea > 3+) Masguotads —> Thserton ef message Into thy pee Mal eal netiook pom a awa aap “4 4 2) | (Channa f (4 , f | geout | opponent fr) Sequence Mocktficatian— > Any wedliticatten blur port fies IS) Content mecifieation —? Changes Jo Hur contin Of yrs msgs = I ¢ é-) Timing Moot fication > Delay or suplay oy Explain Seps bere Heed 77 Woon messages. ¢) Source supucltation > Denial o) THansmeser of mnesage by Aownte 2) Mestinaton Apudlation ~> Dental oy suceipt of mussigs by alstinatien, MEENAKSHI COLLEGE OF ENGINEERING oe ABsupting 9B normed opuration. pessiue atack % to gat Prfemation MEENAKSHI COLLEGE OF ENGINEERING 4) | Secustity Attacks: | (any changes e An attempt 10 gain unauthorxed aces to Indrmatiby, [Pkt] pK & an assyrunetutc exyptographic sgaten that use +00 Rays: we fee o Public kay > Wed ter encryption showed! with ewunyone o/ Pe Avo Kay — Used ba aeceypto” , Raph becrek by the OUND data with tu _sucipients public. Ke only te poiivecte kay con Aouype- PKC ensues cfocevte communteation Ly J enouypting ‘ocipient uy, lobsch puain advantages g Pke w ee secu Rays Oui chau ts volclrly week im SC fres Aa ecu wash commun] sto Explain PRC! Bob Gua Rays ; sent a atent mag to AUFee (Gussioby f esge bo Alice 2) Bob wants fe age Cprrivedl ey to cLeowypt) ‘cot MEENAKSHI COLLEGE OF ENGINEERING « Enoupton = Ciphottext = (plainter?Ae ) mod n MEENAKSHI COLLEGE OF ENGINEERING Public Ry coe igh ge sal ae “ates potivelt | ° Uren be ||, aovypton: Plaintert = (eiprertoct4d) mod n Applications: > Dara Eneyptfon — r Deira SnalouT y SSLITLS Protocole : eee, (— g]—> pectic kay lan fy Enciyption a 4 Eg ‘op Ry LER Peo v Bons pure Advountages : Socwu Commundaxtion- © Key Managenunt- & Stalobility - Challenges x Computational Ow head » key Paotection _ > Quantum Consputting Toaat Fo] g) monies 1 Encuyption Algoirn. Example: © Gunwat ® comput Conclusion: PKCls ability fo ensue congeten tality, authentfeat'e? , anck Prtagerityy rrabus I ap Prelfapensable part of abil Communication q commute, 4 and ged (©, b(n) =4 ompule d CfoPreik Key) cones +d) med Gln) =| 69] Hash Function: cA hosh maps date [eessege anlttiany Leng He w val] Fixed tong th. Tt Rs pefmasily sect fa: altered » Y passtood Storage : 7 data buses. hoetking Qf & Hash Function. ' Takes an Function % a mathematical algorithm (het g any Stie to a fixed -Sixe output , "The data tobe encocted & often called ths “meszags cine Tha hosh value B called au “nussage + Data Tretageuity * Ensues that data hes not been 7 Degitor Sgnaluoe : Used Aa veorilying authenrclbige possroods alecuncly in Pnpet neessage of any Gnghh . MEENAKSHI COLLEGE OF ENGINEERING aigest" 1 Sirapty Voligest”, a= Hos) | M > vasiable aleng ih N Ha)? teed" heal ing a ae) Reduce a tireg. hashing alge ee Gagte bash vauee Coldgest) ‘. un a r @ Sma Change Qn Input suselts In a completly olfbfenmt bash ( satanche fect) 5) Hashing Is Oneewoay Coroursibte Feta cunvot bo selrieuccl from the hash Exanipus Hesh ing Alger thin CMDS Cize-bit, Weak dur ty vulnevabiliHt). ° SHA -286 C o56-bt Strong decumity) - SHA-BI2 (BI2~bit , Strongen Seausity), CD MDS Chensage Digert Atgorithoa J > Fe ts a family g eyptoguaphic hash feunction: ry 2 ficedt-Uingth, hash vatuc eom Fp us that pomewtily used By dart patty checks ard _ Signehuse — c How HD Oaks 1D Thee Yp on % paddled © onsue # Fb a “pede block Fie LLEGE OF ENGINEERING MEE NAKSHI COLLEGE OF ENGINEERING MEENAKSHI CO! 2) The neessaye 93 clivieleot inp fred SIX blocks, = 3) Each beck uncles ces nucltiple stained Gf Marhiamr TYret Gf SHA Atgouthim opexations: Sa facee’. b&b poroduced « o-b¥): Obsolete due to wedrerabilitics. je) The Porat howsh value porst fons of SHA: = Algerithts) GD Sha (secure Hash Example Applicatt SHA ie a family of ouppto raphe hash functtont clis[gnet Fa Ae niitattions, spatnly by NIST @ eunity apphations wehly Ty - > BleckChain “Technolo and NSA - Tt ensurel, 5 ay ; — = = me cae i iter and ceonbifica les + Data mragetly se Passtoerd Grorog® « + Degital Ligreilins + password hashing « (ad dmunc, GHasn- based aeserge patrenticatien cll) vas gmac = @ sua: BS ps a cuyptogaaplic techn! yee that_enhonas pusage Frage ard autrarOty singe acon” Rew . fi 7 oe enswtc&: locking ahosh ncn’ fication > VeuPhes the sender 1 Enswe data & not tanepurcch voit. Pocotcts against suplay attacks. 1D The hp mag te divided into -Hmed~ size blocks 2) Each biock uncurgecs ruuttipr sounds Y matthematital ansfernaten . 3) the Prot susut & a dixed-tength hash ofp, Haine _mppttcations: AD - Eusna smat Change m t/p Causes a drastfe txanup > APL auftunttes Hor Change ir Oulpet. FY rstsse Secunia - J MEENAKSHI COLLEGE OF ENGINEERING Hooiking 9) HMBC: 1 The onda hos a Se 2) TheeRy & combined wlth the mouage Ina Specific voy (using padd 1). i hrashecl using a EI MEENAKSHI COLLEGE OF ENGINEERING Haw Digital $tqnaiow oaks: out ky ord nusmage. eke ee ie | 19 Dowd — 95 Asviorallid - 2) The combined raessage crepplegeraph hogh Punction « Stops: Key Cuentration; ® tut along tolh oA User geninalis a public- using 0 Clyptogeaphie alge wel to ceedlet ie Sey uerdicaton, 4) The Gere “HURC code he rewssage: crsavie). 5) Tha seceiue, who aso has the Seoset kery, } fot the Sone prowrs- pe Baiese) fem the public Rey Ue used dx 65. Tp ths contd nunc raatches Me _seceivel. Stepd + Signing Prowss: 3 The Sender hash the docimeg useg 2 reek dunctten (sun-256) HHAc, tee mecge 1s aubtentte- Chluthentication Hethed, + the Sondin enoypt fe hash podivelt Rey , genecatiog the digital Si © The original neeuage and Spgnatioy ave + fo the _sucipients Digital _Fgnaluve +A aligitel ssignalivw b 2 cecephogeeaphhe ut Wsel to unify “ths _auttenttedly , Intealy , aro onigin of a digital meuagt 01 dowment. | RL Palely h gl pan usel In ecw Commun cations, jocu oh merly are blockchin Pansactrons Sep: Vertidicaton Reroceis: swecetued nuisage © the steceduen ae using the uve J ce) Bonifitss feng erat MEENAKSHI COLLEGE OF ENGINEERING «oth i poupy fhe aylr ra lioer The secceien le HYP 1 oe ihg He | 9 a He vaendes ips e4rg red hash» ooee both hashes smatch , veuted , onsie Y Authenteation A IntigouTy 4 Mon-sepudia tien — as {= re eae Enouypt ee renee —- tt > NL Pp. pe original cloc Hashing oe ¥ ca ao r fso called Ceceut Ke Abt Auge | Hash poivate fee ee coy | Also cattel Publre ey. ey: Key reust be Kept Sevat lone gf the 2 keys Talat y bo kept Secut . — + wwe nik poe &| : hrathing ale” BEN ryan @) | The Sonetir @ seecriver FEIGG IARI oem Iae Sind —> tak an ish Share Hee alge 2 bay | push each haus Ov gf aint ? P DS gear Font | - OS the matche polit of Begs : puntioky MG grees “4 | sxe gh energpted sr} Isanne| more tha das ong ees Hash ae [ass whan tm e6Rfad | ction #0rb Siz. de Clear te - 7 ! a - connet- fe used Ror Can bo usect An | Aearat “Srqrettion « Be teh he elie autenttity and ile tHe -dignat@e Pe Bealaldedd Example 7 Ema) Signeilises VY Digitally Synod Pots VU Blockchetin Transaction MEENAKSHI COLLEGE OF ENGINEERING pittewnce Blo Yrrmetuie aa egy c otypreguaphy- = Aagmnmibric Hy) One key & envuyption & ohan Hey for deoryslior yrmoeliu'e key Same Key wed Ay enviyption & deouptton Mery) atl Towser Hoy Bchange is 61g Key exchange is nota

You might also like