SlideShare a Scribd company logo
1 of 18
By
Raj Kumar Rampelli



Need for Network security
Classification of Network Attacks
◦





Possible Attacks

Security Features
Security Mechanism: Cryptography
Types of Encryption-Decryption techniques
◦ Symmetric: Shared Key Type
◦ Asymmetric: Public/Private Key Type
 Public Key Infrastructure




Digital Signature
Public Key Infrastructure implementation and its factors
◦
◦
◦
◦



Generation of key pair
Obtain Digital certificate
Encryption/Decryption analysis
Digital certificate role

Conclusion

Raj Kumar Rampelli

3/3/2014

2


What is a Network ?
◦ Data Carrier



Data ?

◦ Anything which conveys something between
1st person (sender/receiver) and
2nd person (receiver/sender)



Categories of Data ?

◦ Normal
◦ Confidential  Data can’t be enclosed to 3rd person.



Goal ?

◦ Protection of DATA i.e. Information Security.
◦ Preventing compromise or loss of DATA from
unauthorized access

Raj Kumar Rampelli

3/3/2014

3


What is Network Attack ?



Categories of Attacks

◦ An action that compromises the security of DATA
◦ Passive





Learn from DATA and make use of system information
Do not alter the DATA
Very difficult to identify the attack
Ex: Eavesdropping (Interception)

◦ Active

 Modifies the DATA
 Ex: Denial of Service



Possible Attacks
◦
◦
◦
◦

Interruption
Interception
Modification
Fabrication

Raj Kumar Rampelli

3/3/2014

4


Normal Flow
Sender



Receiver

Interruption
Sender

Disturb

Receiver

◦ Attack on “availability”

 Disconnection of a wireless or wired internet
connection
 Unavailability of a particular web site
 Inability to access any web site

Raj Kumar Rampelli

3/3/2014

5


Interception (No Privacy)
Intruder
Sender

Receiver

◦ Attack on “confidentiality”
◦ Packet Analyzer software

 Intercept and log traffic passing over a network
 Captures each Packet and decodes the data
 Ex: Microsoft Network Monitor

◦ Man in the middle attack
◦ Wiretapping: capture the data
◦ Intruder can be a person or a program or a computer

Raj Kumar Rampelli

3/3/2014

6


Modification
◦ Attacker modifies the data sent by the sender
◦ Gain access to a system and make changes
 Alter programs so that it performs differently

◦ Attack on “Integrity”


Fabrication
◦ Attacker acts like Sender
◦ Gain access to a person’s email and sending
messages
◦ Attack on “Authenticity”
◦ Lack of mutual authentication

Raj Kumar Rampelli

3/3/2014

7


A Transaction/Communication (or a service)
is secure if and only if the following security
features are provided
◦
◦
◦
◦



Confidentiality
Integrity
Authenticity (Mutual Authentication)
Non-repudiation

Cryptography
◦ Symmetric key Cryptography
◦ Public Key Infrastructure

Raj Kumar Rampelli

3/3/2014

8
String of information that binds the unique identifier
of each user to his/her corresponding public key.

Services

•Provide
security
features

Digital
Certificate

Symmetric Key
Cryptography
•Data Encryption
Standard (DES)
•Triple DES
•Advanced ES

Cryptography
Public Key
Infrastructure
Digital
Signature

•Public-Private
Key
•RSA

A mathematical scheme for demonstrating the
authenticity, non-repudiation and integrity of a
digital message

Encryption and
Decryption

•ECC

•Cypher Text

Raj Kumar Rampelli

3/3/2014

9


Symmetric Key scenario

Sender
(plain text) 
SK(plain text)



Cipher Text
(Encrypted
text)

Receiver
SK(Cipher text)  Plain text

Public-Private Key scenario

Sender
(plain text) 
PubKey(plain
text)

Cipher Text
(Encrypted
text)

Receiver
PrivKey(Cipher text)  Plain
text

Raj Kumar Rampelli

3/3/2014

10
• Generation of Public-Private key pair

Performance
factors at
client

• Generation of certificate request
message
• Receive and store digital certificates
• Encryption and Decryption
• Generation and verification of digital
signature message
• Verification of Digital certificate

Raj Kumar Rampelli

3/3/2014

11




Generate public and private key pair at client
Check the following details using different
Public Key Cryptography (PKC) algorithms

◦ Time taken for key pair generation
◦ Storage space required for storing the key pair
◦ Repeat above two steps by changing the key size in
the algorithm
◦ Analyze the results and choose optimal algorithm
suitable for your application.



PKC algorithms
◦ RSA
◦ ECC

Raj Kumar Rampelli

3/3/2014

12


Generate certificate request message (CRM) using
public-private key pair
Apply for new Digital Certificate



CA verifies the requester credentials



◦ Send CRM and user/app credentials to Certificate
Authority (CA)
◦ Approves/Rejects the application
◦ If approved,

 Generate Digital Certificate using requester credential with public
key information
 Store it in Digital certificate data base locally
 Send Digital certificate to requester



Receive Digital certificate from CA and store
locally.

Raj Kumar Rampelli

3/3/2014

13









String of information that binds the unique identifier of each client
to his/her corresponding public key.
Pre-requite for obtaining Digital certificate
◦ Generate public-private key pair locally
◦ Generate certificate request message
Digital certificate used to authenticate server credentials during
mutual authentication process
Mutual authentication process:
◦ a client authenticating themselves to a server and that server
authenticating itself to the user in such a way that both parties are
assured of the others' identity [wiki]
Authenticating an entity using its Digital certificate:
◦ Check the validity period of certificate
◦ Verify the digital signature of CA on the certificate using CA’s
public key

Raj Kumar Rampelli

3/3/2014

14



Client encrypts the message using server’s public
key
The time taken for encryption of fixed size
message
◦ Using server’s ECC public key
◦ Using server’s RSA public key
◦ Analyze the results.




Client decrypts the received message (from
server) using client’s private key
The time taken for decryption of fixed size
message
◦ Using client’s ECC private key
◦ Using client’s RSA private key
◦ Analyze the results.

Raj Kumar Rampelli

3/3/2014

15
Performance factor-4:
Digital signature generation & verification

A valid digital signature gives a recipient reason to believe that the message was created by a
known sender (Authenticity), such that the sender cannot deny having sent the message
(Non-repudiation) and that the message was not altered in transit (Integrity).
Raj Kumar Rampelli

3/3/2014

16


A method to Secure “Data transactions” between
users is needed
◦ Should ensure all desired security features for any
transaction.



Cryptography: collections of standards/techniques
for securing the Data.
◦ PKI ensures all security features







As the key size increases, the more difficult to crack
the data.
Analyze PKI Implementation factors using different
cryptographic algorithms with different key sizes
Digital certificate: Mainly used for authenticity
Digital signature: Mainly used for Integrity of data

Raj Kumar Rampelli

3/3/2014

17



Have a Look at:
My PPTs:



http://www.slideshare.net/rampalliraj/



My Tech Blog:



http://practicepeople.blogspot.in/

Raj Kumar Rampelli

3/3/2014

18

More Related Content

What's hot

Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its UsesMohsin Ali
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation swarnapatil
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPunnya Babu
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 

What's hot (20)

Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Key management
Key managementKey management
Key management
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
Cryptography
CryptographyCryptography
Cryptography
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

System Booting Process overview
System Booting Process overviewSystem Booting Process overview
System Booting Process overviewRajKumar Rampelli
 
Learn python – for beginners
Learn python – for beginnersLearn python – for beginners
Learn python – for beginnersRajKumar Rampelli
 
Introduction to Kernel and Device Drivers
Introduction to Kernel and Device DriversIntroduction to Kernel and Device Drivers
Introduction to Kernel and Device DriversRajKumar Rampelli
 
Tasklet vs work queues (Deferrable functions in linux)
Tasklet vs work queues (Deferrable functions in linux)Tasklet vs work queues (Deferrable functions in linux)
Tasklet vs work queues (Deferrable functions in linux)RajKumar Rampelli
 
Learn python - for beginners - part-2
Learn python - for beginners - part-2Learn python - for beginners - part-2
Learn python - for beginners - part-2RajKumar Rampelli
 

Viewers also liked (8)

System Booting Process overview
System Booting Process overviewSystem Booting Process overview
System Booting Process overview
 
Linux GIT commands
Linux GIT commandsLinux GIT commands
Linux GIT commands
 
Learn python – for beginners
Learn python – for beginnersLearn python – for beginners
Learn python – for beginners
 
Introduction to Kernel and Device Drivers
Introduction to Kernel and Device DriversIntroduction to Kernel and Device Drivers
Introduction to Kernel and Device Drivers
 
Linux watchdog timer
Linux watchdog timerLinux watchdog timer
Linux watchdog timer
 
Tasklet vs work queues (Deferrable functions in linux)
Tasklet vs work queues (Deferrable functions in linux)Tasklet vs work queues (Deferrable functions in linux)
Tasklet vs work queues (Deferrable functions in linux)
 
Learn python - for beginners - part-2
Learn python - for beginners - part-2Learn python - for beginners - part-2
Learn python - for beginners - part-2
 
Linux Kernel I/O Schedulers
Linux Kernel I/O SchedulersLinux Kernel I/O Schedulers
Linux Kernel I/O Schedulers
 

Similar to Network Security and Cryptography Overview

networksecurityandcryptography-140303114745-phpapp02.pdf
networksecurityandcryptography-140303114745-phpapp02.pdfnetworksecurityandcryptography-140303114745-phpapp02.pdf
networksecurityandcryptography-140303114745-phpapp02.pdfYasmin297583
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.pptjayarao21
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersMukesh Singh
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of TrustYousof Alsatom
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptxRiddhiGupta84
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 

Similar to Network Security and Cryptography Overview (20)

networksecurityandcryptography-140303114745-phpapp02.pdf
networksecurityandcryptography-140303114745-phpapp02.pdfnetworksecurityandcryptography-140303114745-phpapp02.pdf
networksecurityandcryptography-140303114745-phpapp02.pdf
 
Cryptography
Cryptography Cryptography
Cryptography
 
digital_sign_interview.ppt
digital_sign_interview.pptdigital_sign_interview.ppt
digital_sign_interview.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
10. grid security
10. grid security10. grid security
10. grid security
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
signyourdoc
signyourdocsignyourdoc
signyourdoc
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
PKI & SSL
PKI & SSLPKI & SSL
PKI & SSL
 
Cryptography
CryptographyCryptography
Cryptography
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
NS Unit 3 AAR.ppt
NS Unit 3 AAR.pptNS Unit 3 AAR.ppt
NS Unit 3 AAR.ppt
 

More from RajKumar Rampelli

Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxRajKumar Rampelli
 
Introduction to Python - Running Notes
Introduction to Python - Running NotesIntroduction to Python - Running Notes
Introduction to Python - Running NotesRajKumar Rampelli
 
Linux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewLinux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewRajKumar Rampelli
 

More from RajKumar Rampelli (7)

Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linuxWriting Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
 
Introduction to Python - Running Notes
Introduction to Python - Running NotesIntroduction to Python - Running Notes
Introduction to Python - Running Notes
 
Linux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver OverviewLinux Kernel MMC Storage driver Overview
Linux Kernel MMC Storage driver Overview
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 
Turing awards seminar
Turing awards seminarTuring awards seminar
Turing awards seminar
 
Higher education importance
Higher education importanceHigher education importance
Higher education importance
 
C compilation process
C compilation processC compilation process
C compilation process
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Network Security and Cryptography Overview

  • 2.   Need for Network security Classification of Network Attacks ◦    Possible Attacks Security Features Security Mechanism: Cryptography Types of Encryption-Decryption techniques ◦ Symmetric: Shared Key Type ◦ Asymmetric: Public/Private Key Type  Public Key Infrastructure   Digital Signature Public Key Infrastructure implementation and its factors ◦ ◦ ◦ ◦  Generation of key pair Obtain Digital certificate Encryption/Decryption analysis Digital certificate role Conclusion Raj Kumar Rampelli 3/3/2014 2
  • 3.  What is a Network ? ◦ Data Carrier  Data ? ◦ Anything which conveys something between 1st person (sender/receiver) and 2nd person (receiver/sender)  Categories of Data ? ◦ Normal ◦ Confidential  Data can’t be enclosed to 3rd person.  Goal ? ◦ Protection of DATA i.e. Information Security. ◦ Preventing compromise or loss of DATA from unauthorized access Raj Kumar Rampelli 3/3/2014 3
  • 4.  What is Network Attack ?  Categories of Attacks ◦ An action that compromises the security of DATA ◦ Passive     Learn from DATA and make use of system information Do not alter the DATA Very difficult to identify the attack Ex: Eavesdropping (Interception) ◦ Active  Modifies the DATA  Ex: Denial of Service  Possible Attacks ◦ ◦ ◦ ◦ Interruption Interception Modification Fabrication Raj Kumar Rampelli 3/3/2014 4
  • 5.  Normal Flow Sender  Receiver Interruption Sender Disturb Receiver ◦ Attack on “availability”  Disconnection of a wireless or wired internet connection  Unavailability of a particular web site  Inability to access any web site Raj Kumar Rampelli 3/3/2014 5
  • 6.  Interception (No Privacy) Intruder Sender Receiver ◦ Attack on “confidentiality” ◦ Packet Analyzer software  Intercept and log traffic passing over a network  Captures each Packet and decodes the data  Ex: Microsoft Network Monitor ◦ Man in the middle attack ◦ Wiretapping: capture the data ◦ Intruder can be a person or a program or a computer Raj Kumar Rampelli 3/3/2014 6
  • 7.  Modification ◦ Attacker modifies the data sent by the sender ◦ Gain access to a system and make changes  Alter programs so that it performs differently ◦ Attack on “Integrity”  Fabrication ◦ Attacker acts like Sender ◦ Gain access to a person’s email and sending messages ◦ Attack on “Authenticity” ◦ Lack of mutual authentication Raj Kumar Rampelli 3/3/2014 7
  • 8.  A Transaction/Communication (or a service) is secure if and only if the following security features are provided ◦ ◦ ◦ ◦  Confidentiality Integrity Authenticity (Mutual Authentication) Non-repudiation Cryptography ◦ Symmetric key Cryptography ◦ Public Key Infrastructure Raj Kumar Rampelli 3/3/2014 8
  • 9. String of information that binds the unique identifier of each user to his/her corresponding public key. Services •Provide security features Digital Certificate Symmetric Key Cryptography •Data Encryption Standard (DES) •Triple DES •Advanced ES Cryptography Public Key Infrastructure Digital Signature •Public-Private Key •RSA A mathematical scheme for demonstrating the authenticity, non-repudiation and integrity of a digital message Encryption and Decryption •ECC •Cypher Text Raj Kumar Rampelli 3/3/2014 9
  • 10.  Symmetric Key scenario Sender (plain text)  SK(plain text)  Cipher Text (Encrypted text) Receiver SK(Cipher text)  Plain text Public-Private Key scenario Sender (plain text)  PubKey(plain text) Cipher Text (Encrypted text) Receiver PrivKey(Cipher text)  Plain text Raj Kumar Rampelli 3/3/2014 10
  • 11. • Generation of Public-Private key pair Performance factors at client • Generation of certificate request message • Receive and store digital certificates • Encryption and Decryption • Generation and verification of digital signature message • Verification of Digital certificate Raj Kumar Rampelli 3/3/2014 11
  • 12.   Generate public and private key pair at client Check the following details using different Public Key Cryptography (PKC) algorithms ◦ Time taken for key pair generation ◦ Storage space required for storing the key pair ◦ Repeat above two steps by changing the key size in the algorithm ◦ Analyze the results and choose optimal algorithm suitable for your application.  PKC algorithms ◦ RSA ◦ ECC Raj Kumar Rampelli 3/3/2014 12
  • 13.  Generate certificate request message (CRM) using public-private key pair Apply for new Digital Certificate  CA verifies the requester credentials  ◦ Send CRM and user/app credentials to Certificate Authority (CA) ◦ Approves/Rejects the application ◦ If approved,  Generate Digital Certificate using requester credential with public key information  Store it in Digital certificate data base locally  Send Digital certificate to requester  Receive Digital certificate from CA and store locally. Raj Kumar Rampelli 3/3/2014 13
  • 14.      String of information that binds the unique identifier of each client to his/her corresponding public key. Pre-requite for obtaining Digital certificate ◦ Generate public-private key pair locally ◦ Generate certificate request message Digital certificate used to authenticate server credentials during mutual authentication process Mutual authentication process: ◦ a client authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity [wiki] Authenticating an entity using its Digital certificate: ◦ Check the validity period of certificate ◦ Verify the digital signature of CA on the certificate using CA’s public key Raj Kumar Rampelli 3/3/2014 14
  • 15.   Client encrypts the message using server’s public key The time taken for encryption of fixed size message ◦ Using server’s ECC public key ◦ Using server’s RSA public key ◦ Analyze the results.   Client decrypts the received message (from server) using client’s private key The time taken for decryption of fixed size message ◦ Using client’s ECC private key ◦ Using client’s RSA private key ◦ Analyze the results. Raj Kumar Rampelli 3/3/2014 15
  • 16. Performance factor-4: Digital signature generation & verification A valid digital signature gives a recipient reason to believe that the message was created by a known sender (Authenticity), such that the sender cannot deny having sent the message (Non-repudiation) and that the message was not altered in transit (Integrity). Raj Kumar Rampelli 3/3/2014 16
  • 17.  A method to Secure “Data transactions” between users is needed ◦ Should ensure all desired security features for any transaction.  Cryptography: collections of standards/techniques for securing the Data. ◦ PKI ensures all security features     As the key size increases, the more difficult to crack the data. Analyze PKI Implementation factors using different cryptographic algorithms with different key sizes Digital certificate: Mainly used for authenticity Digital signature: Mainly used for Integrity of data Raj Kumar Rampelli 3/3/2014 17
  • 18.   Have a Look at: My PPTs:  http://www.slideshare.net/rampalliraj/  My Tech Blog:  http://practicepeople.blogspot.in/ Raj Kumar Rampelli 3/3/2014 18