- 1. It's a Presentation from THIAGARAJARPOLYTECHNICCOLLEGE
(Autonomous Institution) Salem - 5
2. Information Security & Cryptography 3. Presented &
performed by
4.
-
- Encryption and Decryption
-
- Public & Private Key Cryptography
Synopsis 5. INFO SECURITY ->a small intro
6. OBJECTIVES OF SECURITY
-
- To avoid denial of services
-
- To secure our data from Masquerades
-
- To safeguard our data's from traffic analyzer
-
- To not to make the message for the third person available
7. PASSWORD AUDITING
- Shouldnot be in uppercases
- Must haveat least 8 characters
- Mustinclude alphabets, numeric keys and special characters
- Passwordshould not be the name of the user, dictionary word
etc.,
- Itmust be updatedat least once a month
8. DATA SECURITY
- To monitor the usersACCESS CONTROLS
- Systems that are connected in networks must be protected
withFIREWALLS
- Toprotect the integrity and availability of the institutions
information assets
9. CYPTOGRAPHY -> small intro
10.
- Cryptographyis the science of usingmathematicsto encrypt and
decrypt data.
- Cryptography enables you to store sensitiveinformation or
transmit it across insecurenetworks (like the Internet) so that it
cannot bereadby anyone except the intended recipient.
- Its very usefull toOURArmy and Police networks totransfer
confidential datas.
Cryptography 11. ENCRYPTION AND DECRYPTION
- Encryptionis a technique that converts the original textinto an
unreadable text
- The converted original text is called asCIPHER TEXT
- Decryptiontechnique is used to convert the cipher textinto the
original text
- Authentication is the verification process which identifiesthe
password and username
- Digital signaturesare signed to make the cipher textinto
unreadable or unchangeable
12. Principles of public key system Johns public key John Annie
plaintext cipher text Dec.ALG Enc.ALG plaintext 13. The SD3
Security Framework Secureby Design Secureby Default Secure in
Deployment
-
- Run code withminimal privileges
-
- Minimize your attacksurface
-
- Leverage the security best practices
-
- Build tools toassess application security
The Secure Windows project team atMicrosofthas adopted a simple
set of tactic called SD3.
-
- Minimize your attacksurface
-
- Minimize your attacksurface
14.
- Published in 1978 by MIT, US
- The main function of this algorithm is to providing approach to
public key cryptography and encryption
- In this the CIPHER TEXT are all the integers between 0 to
n-1
RSAAlgorithm
-
-
-
- P and Q are the prime numbers
15. Decryption Algorithm Message Source Encryption Algorithm
Destination Crypt. Analyst Key Pair Source X Y X PR a PR a PU a
X=E(PR ,X) a X=D(PU ,Y) a X=WELCOME Y=5370379 Principles of public
key system -> a DEMONSTRATION 16. Conclusion 17. This Paper has
been submitted under the guidance of
-
- M.Saravanan (M.E) Lecturer (Computer Tech).
-
- PL.SindhuB. E Lecturer (Computer Tech).
MR.D.ARUL SELVAN M.E., Head Of the Department / Computer
Technology 18. Thank You For every lock there is a Key Itis better
toKEEP SAFE YOUR LOCK THAN THE KEY 19. Bibliography
-
- CCNA INTRO - Wendell Odom
-
- Network Essentials William Stalings
Website www.wikipedia.com www.securitymeasures.com