Posts: 1
Threads: 1
Joined: May 2010
hi i am lakshmi.i want the topic which is described above in title.i.e.,
cryptography and network security full report
CRYPTOGRAPHY and NETWORK SECURITY ppt for seminar purpose
Posts: 610
Threads: 262
Joined: Jun 2010
Posts: 2,300
Threads: 878
Joined: Sep 2010
[attachment=7097]
Cryptography and Network Security
Introduction
seen evolution of information systems
now everyone want to be on the Internet
and to interconnect networks
has persistent security concerns
can’t easily secure every system in org
need "harm minimisation"
a Firewall usually part of this
Posts: 3
Threads: 0
Joined: Jul 2010
Quantum Cryptography:
Quantum cryptography uses quantum mechanics to guarantee secure
communication. It enables two parties to produce a shared random bit string known only
to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental part of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using quantum superpositions or quantum entanglement and transmitting information in quantum states, a communication system can be implemented which detects eavesdropping. If the level of eavesdropping is below a certain threshold a key
can be produced which is guaranteed as secure, otherwise no secure key is possible and
communication is aborted.The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the
computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. Quantum cryptography is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt and decrypt a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key.
Posts: 4
Threads: 1
Joined: Aug 2010
hi, everyone this is jessica.... can any one, send me "Network security and Cryptography" ppt and abstract by evening 4pm please... thank you
Posts: 6,566
Threads: 1,107
Joined: Jul 2011
Posts: 4,190
Threads: 817
Joined: Feb 2012