SlideShare a Scribd company logo
1 of 20
It’s Presentations from




         Network Security &Cryptography
Friend
Presented & performed by


              Mr: Rahulprasad yadav
              Mr: Nakul Naikwade
            (Information Technology)




Network Security & cryptography
Network Security & Cryptography
Synopsis
       Network security
        ->Objective of Security
        ->Password Auditing
        ->Data Security
        ->Authentication
      Cryptography
       ->Encryption & Decryption
       ->Public & Private Key Cryptography
       ->Digital Signatures
       ->RSA Algorithm
      Demonstration
      Conclusion
                  Network Security & Cryptography
ETWORK SECURITY ->a small intro....


    ->WHY it is needed?
   ->WHERE it is needed?
    ->HOW it is needed?
    Network Security& Cryptography
OBJECTIVE OF SECURITY
     To avoid data threats

     To avoid denial of services

     To secure our data from masquerades

     To safeguard our data’s from traffic analyzer

    To not to make massage for the third person available




        Network Security & Cryptography
PASSWORD AUDITING
  Should not be in uppercase

  Must have at least 8 characters

  Must include alphabets, numeric keys & special
  characters
  Password should not be the name of the user,
  dictionary word etc.,

  It must be updated at least once a month

       Network Security & Cryptography
DATA SECURITY

 To monitor the user’s ACCESS CONTROLS

 System that are connected in network must be protected
  with firewalls

  To protect the integrity & availability of the institution’s
  information asset’s

            Network Security & Cryptography
RYTOGRAPHY->a small intro……

keywords
    ->cryptography
    ->Encryption &Decryption
   ->Public& Private key cryptography
    ->Digital signature’s
    ->RSA Algorithm


          Network Security & Cryptography
CRYTOGRAPHY

    Cryptography is science of using mathematics to
encrypt decrypt data

     Cryptography enable you to store sensitive
information or transmit it across insecure networks(like
internet) so that it cannot be read by anyone except the
intended recipient

    It’s very useful to our Army & Police network to trans
for confidential data
               Network Security & Cryptography
ENCRYPTION AND DECRYPTION

  Encryption is a technique that convert’s the original
  text into an unreadable text

 The converted original text is called as Cipher text

 Decryption technique is used to convert the cipher text
 into the original text
 Authentication is the verification process which identifies
 the password & username
 Digital signature are signed to make the cipher text into unread-
 able

             Network Security &Cryptography
PUBLIC & PRIVATE KEY
CRYPTOGRAPHY

     Public-key cryptography refers to a cryptography system
require 2 separate keys, one to lock or encrypt the plaintext
& one to unlock or decrypt the cipher text

    Private-key ,a private or secret key is an encryption
decryption key known only to the party or parties that exchange
secret massages a problem with PKC is that sender & receiver of
message must agree on a common key via alternative secure
channel

               Network Security & Cryptography
RSA ALGORITHEM

        Published in 1978 by MIT,US
   (1)The main function of this algorithm is providing approach
    to public key cryptography & Encryption
   (2) In this the CIPHER TEXT are the integer’s between 0 to n-1

C=e M mod n           m->message ,e->encryption
M=d C mod n           C->cipher text ,d->decryption
  =(e M) d mod n      n-> integer’s (r*a) r & a are prime number’s
  =m e d mod n




               Network Security & Cryptography
PUBLIC KEY SYSTEM->a Demonstration
CONLUSION
   This paper describes a technique to successfully
hiding and secure the data or massage with the help
of Encryption or Decryption technique with the
Cryptography And Network Security.
However ,this research work & software package
provide a good starting point for anyone interested in
learning about Cryptography.



            Network Security & Cryptography
“for every lock there is a key………
It is better to keep safe your lock than the key”

                 “




          Network Security & Cryptography
Bibliography

    References
     CCNA INTRO-wendell odom
     NETWORK ESSENTIALS-william stalings
  Website
     www.wikipedia.com
     www.securitymeasure.com


         Network Security & Cryptography

More Related Content

What's hot

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Encryption
EncryptionEncryption
Encryption
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Security services
Security servicesSecurity services
Security services
 

Viewers also liked

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 

Viewers also liked (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography
cryptographycryptography
cryptography
 
Network security
Network securityNetwork security
Network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Network security
Network security Network security
Network security
 
Hash
HashHash
Hash
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Network security & cryptography

Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography pptSoma Subbama
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptxRiddhiGupta84
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxNavanathDarwante1
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 

Similar to Network security & cryptography (20)

Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Encryption
EncryptionEncryption
Encryption
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography
CryptographyCryptography
Cryptography
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Network security & cryptography

  • 1. It’s Presentations from Network Security &Cryptography
  • 2.
  • 3.
  • 5. Presented & performed by Mr: Rahulprasad yadav Mr: Nakul Naikwade (Information Technology) Network Security & cryptography
  • 6. Network Security & Cryptography
  • 7. Synopsis Network security ->Objective of Security ->Password Auditing ->Data Security ->Authentication Cryptography ->Encryption & Decryption ->Public & Private Key Cryptography ->Digital Signatures ->RSA Algorithm Demonstration Conclusion Network Security & Cryptography
  • 8. ETWORK SECURITY ->a small intro.... ->WHY it is needed? ->WHERE it is needed? ->HOW it is needed? Network Security& Cryptography
  • 9. OBJECTIVE OF SECURITY To avoid data threats To avoid denial of services To secure our data from masquerades To safeguard our data’s from traffic analyzer To not to make massage for the third person available Network Security & Cryptography
  • 10. PASSWORD AUDITING Should not be in uppercase Must have at least 8 characters Must include alphabets, numeric keys & special characters Password should not be the name of the user, dictionary word etc., It must be updated at least once a month Network Security & Cryptography
  • 11. DATA SECURITY To monitor the user’s ACCESS CONTROLS System that are connected in network must be protected with firewalls To protect the integrity & availability of the institution’s information asset’s Network Security & Cryptography
  • 12. RYTOGRAPHY->a small intro…… keywords ->cryptography ->Encryption &Decryption ->Public& Private key cryptography ->Digital signature’s ->RSA Algorithm Network Security & Cryptography
  • 13. CRYTOGRAPHY Cryptography is science of using mathematics to encrypt decrypt data Cryptography enable you to store sensitive information or transmit it across insecure networks(like internet) so that it cannot be read by anyone except the intended recipient It’s very useful to our Army & Police network to trans for confidential data Network Security & Cryptography
  • 14. ENCRYPTION AND DECRYPTION Encryption is a technique that convert’s the original text into an unreadable text The converted original text is called as Cipher text Decryption technique is used to convert the cipher text into the original text Authentication is the verification process which identifies the password & username Digital signature are signed to make the cipher text into unread- able Network Security &Cryptography
  • 15. PUBLIC & PRIVATE KEY CRYPTOGRAPHY Public-key cryptography refers to a cryptography system require 2 separate keys, one to lock or encrypt the plaintext & one to unlock or decrypt the cipher text Private-key ,a private or secret key is an encryption decryption key known only to the party or parties that exchange secret massages a problem with PKC is that sender & receiver of message must agree on a common key via alternative secure channel Network Security & Cryptography
  • 16. RSA ALGORITHEM Published in 1978 by MIT,US (1)The main function of this algorithm is providing approach to public key cryptography & Encryption (2) In this the CIPHER TEXT are the integer’s between 0 to n-1 C=e M mod n m->message ,e->encryption M=d C mod n C->cipher text ,d->decryption =(e M) d mod n n-> integer’s (r*a) r & a are prime number’s =m e d mod n Network Security & Cryptography
  • 17. PUBLIC KEY SYSTEM->a Demonstration
  • 18. CONLUSION This paper describes a technique to successfully hiding and secure the data or massage with the help of Encryption or Decryption technique with the Cryptography And Network Security. However ,this research work & software package provide a good starting point for anyone interested in learning about Cryptography. Network Security & Cryptography
  • 19. “for every lock there is a key……… It is better to keep safe your lock than the key” “ Network Security & Cryptography
  • 20. Bibliography References CCNA INTRO-wendell odom NETWORK ESSENTIALS-william stalings Website www.wikipedia.com www.securitymeasure.com Network Security & Cryptography