0% found this document useful (0 votes)
13 views5 pages

1.cryptography and Network Security

The document discusses the importance of cryptography and network security in protecting data during internet usage, highlighting various security challenges and software attacks. It explains key concepts in cryptography, including encryption, decryption, and terms like confidentiality, data integrity, authentication, and non-repudiation. Additionally, it categorizes cryptography keys into symmetric and asymmetric types, detailing their functions in the encryption process.

Uploaded by

yugantshewale7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

1.cryptography and Network Security

The document discusses the importance of cryptography and network security in protecting data during internet usage, highlighting various security challenges and software attacks. It explains key concepts in cryptography, including encryption, decryption, and terms like confidentiality, data integrity, authentication, and non-repudiation. Additionally, it categorizes cryptography keys into symmetric and asymmetric types, detailing their functions in the encryption process.

Uploaded by

yugantshewale7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cryptography and Network Security –

• Today, the use of computer with internet is increasing.at


the same time security challenges are also increases.
• A number of software attack on your information. That
attacking scenario your personally loss some things.
• Attacker can attack through internet and theft your
data.
• Computer security means to protect information, data,
your bank data, personal data.
• Actually Network security means protected data on the
network during data transmission.
• Using in this following methods to secure your network.

Cryptography –

• Security in networking is based on Cryptography.


• Cryptography is the art or science of achieving security by
encoding.
• Cryptography means simple message or data are
converted into coded or other textual format.
• Cryptography is combined two word Greek words,
Krypto- hidden or secret and graphene -writing.
• In Cryptography involves the of encryption and
decryption message.
• E.g.
Plain text == hello world
Cipher text== qwwdeddf

• In cryptography performing following terms (Network


Security)-

1. Confidentiality refers to certain rules and guidelines


usually executed under confidentiality agreements
which ensure that the information is restricted to
certain people or places.
2. Data integrity refers to maintaining and making
sure that the data stays accurate and consistent
over its entire life cycle.
3. Authentication is the process of making sure that
the piece of data being claimed by the user belongs
to it.
4. Non-repudiation refers to ability to make sure that
a person or a party associated with a contract or a
communication cannot deny the authenticity of
their signature over their document or the sending
of a message.
Terminology used in Cryptography –
1. Plain text
2. Ciphertext
3. Cryptograph
4. Encryption
5. Decryption
6. Key
7. Cryptoanalysis
8. Cryptology

1.Plain text –
• The original message are called plain text .
• Plain text is human readable or understandable like
English statements, java code, Php scripted code etc
• E.g.
Plain text= Java is pure virtual language.
2.Cipher text –
• It means that original message are converted into code
or encoding or binary format.
• Cipher text is not human understandable.
• E.g.
Cipher text= assgdfgjkl
3.Cryptograph-
• Cryptograph is art of codifying messages, that meassage
is unreadable.
• Cryptograph process of secret writing.
4.Encryption Algorithm –
• The encryption algorithm is the algorithm that performs
various substitution and transformations on the plain
text.
• Encryption is the process of changing plain text to cipher
text.
5.Decryption algorithm-
• The Decryption algorithm is reverse algorithm.
• In decryption changing cipher text into plain text.
6.Key –
• A key is a number(or set of number) that the algorithm
uses to perform encryption and decryption.
7.Cryptoanalysis –
• Transforming cipher text into plain text without
knowledge of the key is called as cryptoanalysis.
• In cryptoanalysis process leaks of information.
• Cryptoanalysis is the art of decipher the encrypted
information without knowing the key used for
encryption.
8.Cryptology-
• It is the combination of cryptography and cryptoanalysis.
Cryptography Key can categorized
1. Symmetric key
2. Asymmetric key
1.Symmetric key(Secret key)-
• The encryption process where same keys are used for
encrypting and decrypting information.
• Symmetric key refers to as Secret Key.

2. Asymmetric key(public key) –


• The encryption process where different keys are used for
encrypting and decrypting information.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy