Network Security and
Cryptography
Lecture 1: Introduction to Cryptography
Presented By: Kamaljeet Kaur
Faculty of Computer Science and Engineering
08/03/2024 PCTE INSTITUTE OF ENGINEERING AND TECHNOLOGY 1
Unit 1 Syllabus
• Introduction to Cryptography, Security Threats, Vulnerability,
Active and Passive attacks, Security services and mechanism,
Conventional Encryption Model, CIA model
08/03/2024 PCTE GROUP OF INSTITUTES 2
Content:
• Computer security
• Cryptography
• Vulnerability
• Security Threats
• OSI security Architecture
• Security Attacks
• Security services
• Security Mechanisms
• CIA Model
08/03/2024 PCTE GROUP OF INSTITUTES 3
Computer Security
• Is the protection of computer systems and information from
harm, theft and unauthorized use.
08/03/2024 PCTE INSTITUTE OF ENGINEERING & TECHNOLOGY 4
Introduction to Cryptography
• The term is derived from the Greek word kryptos
• Study of secure communications techniques
• Allow only the sender and intended recipient to view content
08/03/2024 PCTE INSTITUTE OF ENGINEERING & TECHNOLOGY 5
Vulnerability
• a weakness or opportunity that can exploit and gain
unauthorized access to a computer system
• Types:
• Network vulnerability
• OS vulnerability
• Process vulnerability
• Human vulnerability
08/03/2024 PCTE GROUP OF INSTITUTES 6
Malicious Code
• Virus
• Worms
• Trojan Horse
• Spyware
• Adware
• Keylogger
• Ransomware
• Backdoor (Remote Access Trojan)
• Example: Zeus, Mydoom, Stuxnet
08/03/2024 PCTE GROUP OF INSTITUTES 7
OSI Security Architecture
• Focuses on security attacks, mechanisms, and services.
• Security attack: action that compromises the security
• Two types of security attacks
a) Passive attack
b) active attack
08/03/2024 PCTE GROUP OF INSTITUTES 8
Passive Attack
• To make use of informati on but does not affect resources.
• Two types of passive attacks are:
• Release of message contents and
• Traffi c analysis.
08/03/2024 PCTE GROUP OF INSTITUTES 9
Release of message contents
08/03/2024 PCTE GROUP OF INSTITUTES 10
Traffic Analysis
08/03/2024 PCTE GROUP OF INSTITUTES 11
Active Attack
• Involve some modification of the data stream or a false stream
• Subdivided into four categories:
• Masquerade
• Replay
• Modification of messages
• Denial of service
08/03/2024 PCTE GROUP OF INSTITUTES 12
Masquerade
08/03/2024 PCTE GROUP OF INSTITUTES 13
Replay
08/03/2024 PCTE GROUP OF INSTITUTES 14
Modification of data
08/03/2024 PCTE GROUP OF INSTITUTES 15
Denial of Service
08/03/2024 PCTE GROUP OF INSTITUTES 16
Security Services
• Enhances the security of system and information transfer .
• Categories:
• Authentication
• Access control
• Data confidentiality
• Data integrity
• Nonrepudiation
08/03/2024 PCTE GROUP OF INSTITUTES 17
Security Mechanisms
• It is designed to detect, prevent or recover from a security attack.
• It is a tool or technique used to implement security services.
• Some mechanisms are:
• Encipherment
• Access control
• Notarization
• Data integrity
• Authentication exchange
• Digital signature
08/03/2024 PCTE GROUP OF INSTITUTES 18
Techniques for providing Security
• A security related transformation on the information to be sent
• Secret information transmitted without knowing to opponent
• Conventional encryption Model
08/03/2024 PCTE GROUP OF INSTITUTES 19
Model for Network Security
08/03/2024 PCTE GROUP OF INSTITUTES 20
CIA Model
08/03/2024 PCTE GROUP OF INSTITUTES 21
Queries?????
………………
08/03/2024 PCTE GROUP OF INSTITUTES 22