Seminar Report
Seminar Report
On
Submitted to
BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY
By
PAVITRA VAISHNAVI
21J41A1242
Under the Guidance of
Mr. M. Siva Sankara Rao
Assistant Professor
DEPARTMENT OF IT
MALLA REDDY ENGINEERING COLLEGE
(An UGC Autonomous Institution, Approved by AICTE, New Delhi &Affiliated to JNTUH,
Hyderabad Maisammaguda, Secunderabad, Telangana, India 500100)
APRIL-2025
MALLA REDDY ENGINEERING COLLEGE
(An UGC Autonomous Institution, Approved by AICTE, New Delhi & Affiliated to JNTUH, Hyderabad).
Maisammaguda(H), Medchal - Malkajgiri District, Secunderabad., Telangana State – 500100,
www.mrec.ac.in
DEPARTMENT OF INFORMATION TECHNOLOGY
CERTIFICATE
Place: Hyderabad
Date:
i
MALLA REDDY ENGINEERING COLLEGE
Maisammaguda, Secunderabad, Telangana, India 500100
ACKNOWLEDGEMENT
I extremely thankful to our beloved Chairman and Founder of Malla Reddy Group
of Institutions, Sri. Ch. Malla Reddy, for providing the necessary infrastructure facilities
for completing seminar work successfully.
I express my heartfelt thanks to Dr. Deena Babu Mandru, Professor and Head of
the Department, Department of IT, MREC (A) for all the kindly support and valuable
suggestions during the period of our seminar.
PAVITRA VAISHNAVI
DEPARTMENT OF IT
21J41A1242
ii
ABSTRACT
Network security is a critical concept that ensures data protection during wireless
transmission. It helps maintain the confidentiality of messages using cryptographic
techniques. Data security plays a key role in secure data transmission over unreliable
networks. Network security involves controlling access to data within a network,
managed by a network administrator. It is essential in both private and public networks
used by organizations, enterprises, and institutions. The goal of network security is not
only to protect individual systems but also to safeguard the entire network. Network
security is widely used in applications such as government agencies, businesses, banks,
and enterprises. One of its key techniques is cryptography, which ensures that only the
intended recipient can understand a message. This is achieved through cryptographic
operations such as hash functions. A hash function is a mathematical representation of
data that allows the receiver to verify the integrity of the received information.
Cryptography is an essential technology for network security. Historically, it was used to
protect military information and diplomatic correspondence. However, with
advancements in communication, its applications have expanded significantly in modern
times. Cryptography now plays a vital role in protecting sensitive data, preventing cyber
threats, and securing e-commerce transactions.
Keywords: Network Security, Data Security, Network Security, Hash Function, Decipher
Regn. No : 21J41A1242
Semester : VIII
Branch : IT
Date :
iii
TABLE OF CONTENTS
DESCRIPTION PAGE NO
1 INTRODUCTION 1-3
CERTIFICATE i
1.1 Key Process Techniques
ACKNOWLEDGEMENT 2-3
ii
2 BACKGROUND STUDY
ABSTRACT 4-7
iii
2.1 History
TABLE of Network Security and Cryptography
OF CONTENTS 4-7
iv
3 WORKING
LIST OF FIGURES METHODOLOGY 8-15
v
LIST3.1
OFCryptographic
ABBREVIATIONSPrinciples vi8
3.2 Cryptography Goals 8-9
3.3 Cryptosystems types 9-10
3.3.1 Asymmetric Cryptosystems 9
3.3.2 Symmetric Cryptosystems 10
3.4 Cryptographic Model and Algorithms 10-11
3.4.1 Encryption Model 10
3.4.2 Algorithms 11
3.5 Advantages of Network Security and Cryptography 11-13
3.6 Applications 13-15
3.6.1 Network Security 13-14
3.6.2 Cryptography 14-15
4 CONCLUSION 16-18
LIST OF FIGURES
SNO Description Pg no
1 Basic Cryptography Process 2
2 Asymmetric-key encryption 3
3 Hash Function 3
4 Encryption and decryption process 8
iv
5 Asymmetric Cryptosystems 9
6 Symmetric Cryptosystems 10
7 Encryption Model 10
8 Network Security Model 12
9 Cryptography Model 13
LIST OF ABBREVIATIONS
CHAPTER 1
INTRODUCTION
-
Network Security protects our network and data from breaches, intrusions and
other threats. This is a vast and overarching term that describes hardware and software
solutions as well as processes or rules and configurations relating to network use,
accessibility and overall threat protection. Network Security involves access control,
virus and antivirus software, application security, network analytics, types of network-
related security [endpoint, web, wireless], firewalls, VPN encryption and many more.
Network Security is the most vital component in information security because it is
responsible for securing all the information passed through networked computer.
Network Security refers to hardware and software functions, characteristics, features,
operational procedures, accountability, measures, access control, administrative and
management policy required to provide an acceptable level of protection for hardware
and software in a network. Internet has become more widespread, if an unauthorized
person is able to get access to this network, he can not only spy on us but he can easily
mess upour lives. Network security problems can be divided roughly into four
intertwined areas:
Secrecy: Secrecy has to do with keeping information out of the hands of unauthorized
users.
Authentication: Authentication deals with whom you are talking to before revealing
sensitive information or entering into a business deal.
Nonrepudiation: Nonrepudiation deals with signatures.
Integrity control: Integrity control deals with long enterprises like banking, online
networking.
These problems can be handled by using cryptography, which provides means and
methods of converting data into unreadable from, so that valid User can access
Information at the Destination. A Network Security system typically relies on layers of
production and consists of multiple components including networking, monitoring and
security software in addition to hardware’s and appliances. All components work together
to increase the overall security of the computer network. Security of data can be done by
a technique called Cryptography. Cryptography is the science of writing in secret code.
Network Security and Cryptography is a concept of protecting the network and data
transmission over a wireless network. Modern Cryptography exists at the intersection of
the disciplines of mathematics, computer science, and electrical engineering. An
application of cryptography includes ATM cards, computer password, and electronic
commerce.
The development of the World Wide Web resulted in broad use of cryptography
for e-commerce and business applications. Cryptography is closely related to disciplines
of
cryptology and cryptanalysis. Techniques used for decrypting a message without any
knowledge of the encryption details fail into the area of cryptanalysis. Cryptanalysis is
what the layperson calls “breaking the code”. The areas of cryptography and
cryptanalysis together are called cryptology. Cryptography means “Hidden Secrets” is
concerned with encryption. Encryption is the process of converting ordinary information
(called plaintext) into unintelligible text (called cipher text). Decryption is the reverse
process of encryption, moving from the unintelligible cipher text back to plaintext.
Cryptosystem is the ordered list of elements of finite possible plaintext, cipher text, keys
and the encryption and decryption algorithms which correspond to each key.
Fig.1: Basic
Symmetric-key encryption (one key): There is only one key in this encryption.
That is private key. This key is only used for both encryption and decryption. This is also
called as private-key encryption. In this method the sender encrypt the data through
private key and receiver decrypt that data through that key only.
Asymmetric-key encryption (two keys): There are two keys in this encryption.
Two keys – a public key and a private key, which are mathematically related, are used in
public key encryption. To contrast it with symmetric-key encryption, public-key
encryption is also sometimes called public-key encryption.
Hash function: An improvement on the public key scheme is the addition of a one-
way hash function in the process. A one-way hash function takes variable length input. In
this case, a message of any length, even thousands or millions of bits and produces a
fixed-length output; say, 160-bits. The function ensures that, if the information is changed
in any way even by just one bit an entirely different output value is produced.
way. The slightest change in signed documents will cause the digital signature
verification process to fail.
CHAPTER 2
BACKGROUND STUDY
Forouzan (2007) [3], in his book Data Communication and Networking (4th
Edition), provided a foundational guide to computer networks, explaining key concepts
Gross and Odersheim (2011) [6] introduced the concept of vertical protocol
composition in network security. Their research, presented at the 24th IEEE Computer
Security Foundations Workshop (CSF 2011), explored how different security protocols
could be integrated to enhance overall system security. The study highlighted the
challenges of protocol layering, including compatibility issues, potential security
loopholes, and performance trade-offs. By analyzing real-world implementations, the
authors demonstrated how protocol composition could improve security resilience against
attacks such as man-in-the-middle (MITM) attacks and replay attacks.
Maurer (1993) [9] proposed a novel method for secret key agreement through
public discussion in IEEE Transactions on Information Theory. His research explored
how cryptographic keys could be securely established between parties without prior
shared secrets. By leveraging common information and statistical properties of
communication channels, Maurer’s work contributed to the advancement of modern key
exchange protocols, such as quantum key distribution and physical-layer security
techniques.
Preneel (2010) [11] discussed the successes, failures, and future challenges of
cryptography in network security at the International Conference on Mathematical
Methods, Models, and Architectures for Computer Network Security. His presentation
covered the evolution of cryptographic techniques, highlighting breakthroughs in
encryption, digital signatures, and authentication mechanisms. Preneel also addressed
vulnerabilities in existing cryptographic systems and the need for next-generation
security frameworks, particularly in the face of quantum computing threats.
Simmonds, Sandilands, and van Ekert (2004) [14] developed an ontology for
network security attacks in their paper published in Lecture Notes in Computer Science.
Their research categorized cyber threats into different types, providing a structured
framework for understanding, analyzing, and mitigating security vulnerabilities. By
defining relationships between different attack vectors, the ontology contributed to
improving security awareness, threat intelligence, and defensive strategies in
cybersecurity.
CHAPTER-3
WORKING METHODOLOGY
Confidentiality: It is the most important goal, that ensures that nobody can understand
the received message except the one who has the decipher key.
Authentication: It is the process of proving the identity, that assures the
communicating entity is the one that it claimed to be, This means that the user or the
system can prove their own identities toot her parties who don’t have personal
knowledge of their identities
Data Integrity: Its ensures that the received message has not been altered in any way
from its original form. This can be achieved by using hashing at both sides the sender and
the recipient in order to create a unique message digest and compare it with the one that
received.
Non-Repudiation: It is mechanism used to prove that the sender really sent this
message, and the message was received by the specified party, so the recipient cannot
claim that the message was not sent.
Access Control: It is the process of preventing an unauthorized use of resources. This
goal controls who can have access to the resources. If one can access, under which
restrictions and conditions the access can be occurred, and what is the permission level of
a given access.
It uses two different keys to send and receive the messages. It use public key for
encryption and another key is used ford encryption. Two user A and B needs to
communicate, A use public key of B’s to encrypt the message. B use private key to
decipher the text. It is also called as public key cryptosystems. Diffie-Hellman key
exchange generate both public and private key.
Fig.5: Asymmetric
Cryptosystems
3.3.2 SYMMETRIC CRYPTOSYSTEMS
In Symmetric cryptosystems both the enciphering and deciphering keys are
identical or sometimes bother related to each other. Both the key should be kept more
secure otherwise in future secure communication will not be possible. Keys should be
more secure and it should be exchanged in a secure channel between two users. Data
Encryption Standard (DES) is example of Symmetric cryptosystems.
Fig.6:
Symmetric Cryptosystems
There are two encryption models namely they are as follows: Symmetric encryption and
Asymmetric encryption. In Symmetric encryption, Encryption key=Decryption key. In
Asymmetric encryption, Encryption key Decryption key.
3.4.2 ALGORITHMS
There are of course a wide range of cryptographic algorithms in use. The
following are amongst the most well-known:
DES: This is the 'Data Encryption Standard'. This is a cipher at operates on 64-bit blocks
of data, using a 56-bit key. It is a 'private key' system.
MD5: MD5 is a 128bit message digest function. It was developed by Ron Rivest.
AES: This is the Advanced Encryption Standard (using the Rijndael block cipher)
approved by NIST.
HMAC: HMAC is a hashing method that uses a key in conjunction with an algorithm
such asMD5 or SHA-1. Thus, one can refer to HMAC-MD5 and HMAC-SHA1.
Another major advantage is secure remote access and cloud security. With the rise
of remote work and cloud computing, employees and organizations rely on virtual private
Network security also supports efficient data sharing and collaboration. Many
businesses operate in global environments where teams need to share information
securely across different locations. Encryption, secure socket layer (SSL)/Transport
Layer Security (TLS) protocols, and virtual private networks (VPNs) enable safe
communication between users, ensuring that sensitive files and transactions remain
confidential and cannot be intercepted by malicious actors.
Lastly, network security and cryptography enhance trust and compliance. Many
industries are required to follow strict cybersecurity regulations, such as GDPR, HIPAA,
and PCI-DSS, to protect user data. Implementing encryption and network security
measures ensures compliance with these standards, avoiding legal penalties and
reputational damage. Additionally, businesses that prioritize cybersecurity build trust
among customers and partners, fostering long-term relationships and ensuring safe digital
interactions.
3.6 APPLICATIONS
Additionally, filing tax returns online has become a standard practice for
individuals and businesses, making cybersecurity more important than ever. Governments
and financial institutions employ advanced security measures such as end-to-end
encryption, secure authentication, and real-time monitoring to prevent unauthorized
access to sensitive financial data. Ensuring secure data transmission and protection
against cyber threats helps maintain the confidentiality and integrity of tax-related
information.
3.6.2 CRYPTOGRAPHY
Another key application is secure data manipulation, which ensures the integrity
and confidentiality of data in various industries. Cryptographic techniques such as
hashing and encryption algorithms help in securely storing and transmitting sensitive
information, preventing unauthorized modifications. This is particularly useful in sectors
like healthcare and finance, where maintaining accurate and tamper-proof records is
crucial.
CHAPTER 4
CONCLUSION
With the explosive growth of the internet and increasing reliance on cloud-based
services, network security and cryptography have become fundamental concerns for
individuals, businesses, and government organizations. The security of data transmission
over networks is now a critical aspect of digital communication, requiring robust
encryption mechanisms and strong key management strategies. Ensuring user data
privacy in cloud computing environments demands advanced cryptographic techniques
that involve multiple keys and secure exchange protocols. The ability to securely transmit
sensitive information between the sender and the receiver without interception by
malicious actors is essential for maintaining confidentiality and authenticity.
A secure network is built upon well-defined security policies that align with an
organization’s needs and risk tolerance. By implementing strict security policies and best
practices, organizations can evaluate potential risks and enforce security measures
effectively. However, cybersecurity is not just a technical challenge but a collective
responsibility that requires cooperation among all stakeholders, including IT
The future of network security and cryptography will revolve around enhancing
key distribution and management mechanisms to strengthen data security in cloud
computing, IoT (Internet of Things), and emerging digital ecosystems. As cyber threats
Furthermore, as more devices connect to the internet through IoT, ensuring their
security becomes a major challenge. Cryptographic methods must be adapted to provide
lightweight yet effective encryption for IoT devices while maintaining energy efficiency.
Secure multi-party computation (SMPC) and homomorphic encryption are other
emerging cryptographic techniques that will enable privacy-preserving computations on
encrypted data, enhancing security in cloud-based applications.
In the future, organizations will need to adopt zero-trust security models, which
operate on the principle of "never trust, always verify." This model ensures that every
access request is authenticated, authorized, and continuously monitored, significantly
reducing security vulnerabilities. Additionally, legal and regulatory frameworks will
continue to evolve to address global cybersecurity challenges, requiring businesses to
stay compliant with data protection regulations such as GDPR, HIPAA, and PCI-DSS.
Ultimately, network security and cryptography will continue to play a crucial role
in securing digital assets, preventing cyber threats, and enabling trust in the digital world.
As new technologies emerge, the need for stronger security frameworks will only grow,
making it essential for organizations to invest in cutting-edge cybersecurity measures to
protect their systems, data, and users.
REFERENCES
[2] Algorithms:http://www.cryptographyworld.com/algo.htm
[4] Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo, “Hash Functions for Message
Authentication”,1996.
[5] William Stallings, “Cryptography and Network Security Principle and Practice”, Fifth
Edition,2011.
[6] William Stallings, “Cryptography and Network Security Principle and Practice”, Fifth
Edition,2011.
[10] Maurer, U.: Secret key agreement by public discussion from common information.
IEEE Transactions on Information Theory39(3),733–742(1993)
[11] Shyam Nandan Kumar, “Technique for Security of Multimedia using Neural
Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02, Issue: 05,pp.1-7.Sep-
2014
[15] Simmonds, A; Sandilands, P; van Ekert, L (2004). “An Ontology for Network
Security Attacks”. Lecture Notes in Computer Science. Lecture Notes in Computer
Science 3285: 317-323.