Cryptography and Network Security
#1


Prepared by:
A.SATYASRI
V.RAMADEVI

[attachment=6490]



Introduction

Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
There are many aspects to security and many applications,
Ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for
Secure communications is that of cryptography.

Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription.
In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
Within the context of any application-to-application communication, there are some specific security requirements, including:
• Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)
• Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
• Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
• Non-repudiation: A mechanism to prove that the sender really sent this message. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication.
Types of Cryptography:

The three types of cryptographic algorithms that will be discussed are (Figure 1):
• Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
• Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
• Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cryptography and network security pdf2 titde, cryptography and network security video lectures, wireless cryptography security 2012, cryptography and network security doc file, cryptography and network security seminar ppt, cryptography or security, cryptography and network security question bank doc,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Cryptography and Network Security - by seminar surveyer - 18-10-2010, 04:21 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  cryptography and network security full report computer science technology 21 31,889 31-05-2016, 12:17 PM
Last Post: dhanabhagya
  Visual security is feeble for anti-phishing seminar surveyer 5 4,416 18-10-2012, 01:15 PM
Last Post: seminar details
  Seminar on Cisco Self-Defending Network computer girl 0 8,901 11-06-2012, 12:54 PM
Last Post: computer girl
  ROBOTIC SURGERY AND TELE-SURGERY: BASIC PRINCIPLES AND DESCRIPTION OF A NOVEL CONCEPT projectsofme 1 2,915 27-02-2012, 01:12 PM
Last Post: seminar paper
  virtual private network VPN full report computer science technology 7 11,279 09-02-2012, 12:47 PM
Last Post: seminar paper
  wireless internet security full report computer science technology 1 5,076 26-01-2012, 10:46 AM
Last Post: seminar addict
  Java Cryptography Architecture (JCA) computer science crazy 4 6,596 19-01-2012, 11:05 AM
Last Post: seminar addict
  IP Authoring and Integration for HW/SW Co-Design and Reuse seminar class 0 1,451 05-05-2011, 11:07 AM
Last Post: seminar class
  Network Latency Monitor seminar class 0 1,841 06-04-2011, 04:08 PM
Last Post: seminar class
  Cryptography: Securing the Information Age seminar class 0 2,008 23-03-2011, 11:24 AM
Last Post: seminar class

Forum Jump: