Cryptography and Network Security: Vi Sem Bca
Cryptography and Network Security: Vi Sem Bca
Cryptography and Network Security: Vi Sem Bca
NETWORK SECURITY
VI SEM BCA
Module 2
Mathematics of Cryptography: Integer Arithmetic,
Modular Arithmetic, Matrices, Linear Congruence.
PREPARED BY PREETHA
MAHESH
INTRODUCTION
Computer Security - generic name for the collection of tools designed to protect data and to
frustrate hackers
Network Security - measures to protect data during their transmission .
Internet Security - measures to protect data during their transmission over a collection of
interconnected networks
Data Privacy(confidentiality)
Data Availability(accessibility and continuity of information)
Data integrity(it has not been modified on the way)
PREPARED BY PREETHA
MAHESH
Confidentiality
Confidentiality is probably the most common aspect of
information security.
An organization needs to guard against those malicious
actions that endanger the confidentiality of its information.
The meaning of a message is concealed by encoding it.
The sender encrypts the message using a cryptographic key.
The recipient decrypts the message using a cryptographic
key that may or may not be the same as the one used by the
sender .
Snooping
PREPARED BY PREETHA MAHESH
Traffic analysis
It is the process of intercepting and examining messages in order to deduce information from patterns
in communication.
The opponent could determine the location and identity of communication hosts and could observe the
frequency and length of messages being exchanged.
This information might be useful in guessing the nature of communication that was taking place.
For example she can find the electronic address( for eg email address)of the sender or receiver or she
can collect a pair of requests and responses to help her to guess the nature of transactions.
Active Attacks
may change the data or harm the system.
Attacks that threaten the integrity and availability are active attacks.
Active attacks are normally easier to detect than to prevent, because an attacker can launch them in
variety of ways.
PREPARED BY PREETHA MAHESH
Categorization of passive and active attacks
cryptography
steganography.
However, we use the term to refer to the science and art of transforming messages to make them secure
and immune to attacks.
The cryptography can be understood by an example, where a sender sends a message which initially exists in
the plaintext. Before the transmission of the message over the network, it is encrypted and converted into the
ciphertext. When this message is received at the receiver’s end, it is again decrypted back into the plaintext.
Hashing
This type of cryptography uses a key for encrypting and decrypting the plain text and cipher text respectively.
The only condition here is that it shares the same key for the encryption and decryption and it also consumes less
execution time.
Symmetric-key encipherment uses a single secret key for both encryption and decryption.
In symmetric-key enciphering, Alice puts the message in a box and locks the box using the shared secret key; Bob
unlocks the box with the same key and takes out the message
5.
In steganography, the fact that a secret While in cryptography only secret message is
communication is taking place is hidden. hidden.
6.
In steganography, not much mathematical Cryptography involves the use of number theory,
transformations are involved. mathematics etc. to modify data
PREPARED BY PREETHA
MAHESH