Cryptography and Network Security
#1


Prepared by:
A.SATYASRI
V.RAMADEVI

[attachment=6490]



Introduction

Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
There are many aspects to security and many applications,
Ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for
Secure communications is that of cryptography.

Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription.
In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
Within the context of any application-to-application communication, there are some specific security requirements, including:
• Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)
• Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
• Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
• Non-repudiation: A mechanism to prove that the sender really sent this message. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication.
Types of Cryptography:

The three types of cryptographic algorithms that will be discussed are (Figure 1):
• Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
• Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
• Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Reply
#2
hello there,
please send me the copy of seminar report of subject "cryptography and network security".
thanks.
Reply
#3
I can provide you the report. Please contact if interested.
Reply
#4
pls send d report.......................................................................
Reply
#5
hey pls. mail me the report on Cryptography and Network Security
ASAP
on jackhd2009[at]gmail.com
Reply
#6

To get more information about the topic "Cryptography and Network Security " please refer the page link below
http://studentbank.in/report-cryptograph...ull-report

http://studentbank.in/report-cryptograph...k-security

http://studentbank.in/report-cryptograph...ort?page=2

http://studentbank.in/report-cryptograph...ort?page=3

http://studentbank.in/report-cryptograph...ort?page=4
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: wireless cryptography security 2012, cryptography and network security solutions, certificate authentication in cryptography and network security, network security and cryptography full text pdf, notes on network security and cryptography, cryptography and network security topics8435, security and cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,253 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Visual security is feeble for anti-phishing seminar surveyer 5 4,339 18-10-2012, 01:15 PM
Last Post: seminar details
  Seminar on Cisco Self-Defending Network computer girl 0 8,224 11-06-2012, 12:54 PM
Last Post: computer girl
  ROBOTIC SURGERY AND TELE-SURGERY: BASIC PRINCIPLES AND DESCRIPTION OF A NOVEL CONCEPT projectsofme 1 2,861 27-02-2012, 01:12 PM
Last Post: seminar paper
  virtual private network VPN full report computer science technology 7 11,051 09-02-2012, 12:47 PM
Last Post: seminar paper
  wireless internet security full report computer science technology 1 5,014 26-01-2012, 10:46 AM
Last Post: seminar addict
  Java Cryptography Architecture (JCA) computer science crazy 4 6,504 19-01-2012, 11:05 AM
Last Post: seminar addict
  IP Authoring and Integration for HW/SW Co-Design and Reuse seminar class 0 1,406 05-05-2011, 11:07 AM
Last Post: seminar class
  Network Latency Monitor seminar class 0 1,798 06-04-2011, 04:08 PM
Last Post: seminar class
  Cryptography: Securing the Information Age seminar class 0 1,962 23-03-2011, 11:24 AM
Last Post: seminar class

Forum Jump: