Information Security & Cryptography

19
INFO SECURITY & CYPTOGRAPHY

description

Information Security & Cryptography

Transcript of Information Security & Cryptography

  • 1. It's a Presentation from THIAGARAJARPOLYTECHNICCOLLEGE (Autonomous Institution) Salem - 5

2. Information Security & Cryptography 3. Presented & performed by

  • Ranjith. B
  • Arunachalam. PL
  • COMPUTER ENGINEERING

4.

  • INFORMATION SECURITY
    • OBJECTIVES OF SECURITY
    • PASSWORD AUDITING
    • DATA SECURITY
    • AUTHENTICATION
  • CRYPTOGRAPHY
    • Encryption and Decryption
    • Public & Private Key Cryptography
    • Digital signatures
    • RSA ALGORITHM
  • DEMONSTRATION
  • CONCLUSION

Synopsis 5. INFO SECURITY ->a small intro

  • Why it is needed ?
  • Where ?
  • How?

6. OBJECTIVES OF SECURITY

    • To avoid data threats
    • To avoid denial of services
    • To secure our data from Masquerades
    • To safeguard our data's from traffic analyzer
    • To not to make the message for the third person available

7. PASSWORD AUDITING

  • Shouldnot be in uppercases
  • Must haveat least 8 characters
  • Mustinclude alphabets, numeric keys and special characters
  • Passwordshould not be the name of the user, dictionary word etc.,
  • Itmust be updatedat least once a month

8. DATA SECURITY

  • To monitor the usersACCESS CONTROLS
  • Systems that are connected in networks must be protected withFIREWALLS
  • Toprotect the integrity and availability of the institutions information assets

9. CYPTOGRAPHY -> small intro

  • KEYWORDS
    • Cryptography
    • Encryption & Decryption
    • Public Key Cryptography
    • Private Key Cryptography
    • Digital Signatures
    • RSA Algorithm

10.

  • Cryptographyis the science of usingmathematicsto encrypt and decrypt data.
  • Cryptography enables you to store sensitiveinformation or transmit it across insecurenetworks (like the Internet) so that it cannot bereadby anyone except the intended recipient.
  • Its very usefull toOURArmy and Police networks totransfer confidential datas.

Cryptography 11. ENCRYPTION AND DECRYPTION

  • Encryptionis a technique that converts the original textinto an unreadable text
  • The converted original text is called asCIPHER TEXT
  • Decryptiontechnique is used to convert the cipher textinto the original text
  • Authentication is the verification process which identifiesthe password and username
  • Digital signaturesare signed to make the cipher textinto unreadable or unchangeable

12. Principles of public key system Johns public key John Annie plaintext cipher text Dec.ALG Enc.ALG plaintext 13. The SD3 Security Framework Secureby Design Secureby Default Secure in Deployment

  • Build threat models
    • Conduct code reviews
    • Run code withminimal privileges
    • Minimize your attacksurface
    • Enable services securely
    • Leverage the security best practices
    • Create security guidance
    • Build tools toassess application security

The Secure Windows project team atMicrosofthas adopted a simple set of tactic called SD3.

    • Minimize your attacksurface
    • Enable services securely
    • Minimize your attacksurface
    • Enable services securely

14.

  • Published in 1978 by MIT, US
  • The main function of this algorithm is to providing approach to public key cryptography and encryption
  • In this the CIPHER TEXT are all the integers between 0 to n-1
      • C = m emod n
      • m = c dmod n
      • = (me)d mod n
      • = med modn

RSAAlgorithm

        • m -> message
        • e -> encryption
        • d -> decryption
        • n -> integers (p*q)
        • P and Q are the prime numbers

15. Decryption Algorithm Message Source Encryption Algorithm Destination Crypt. Analyst Key Pair Source X Y X PR a PR a PU a X=E(PR ,X) a X=D(PU ,Y) a X=WELCOME Y=5370379 Principles of public key system -> a DEMONSTRATION 16. Conclusion 17. This Paper has been submitted under the guidance of

  • Over headed by
    • M.Saravanan (M.E) Lecturer (Computer Tech).
    • PL.SindhuB. E Lecturer (Computer Tech).

MR.D.ARUL SELVAN M.E., Head Of the Department / Computer Technology 18. Thank You For every lock there is a Key Itis better toKEEP SAFE YOUR LOCK THAN THE KEY 19. Bibliography

  • References
    • CCNA INTRO - Wendell Odom
    • Network Essentials William Stalings

Website www.wikipedia.com www.securitymeasures.com