Network Security and Cryptography CSE Seminar Download

The research paper Network Security and Cryptography CSE Seminar Download explains the reasons for security requirement. It says that there are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect of secure communications is that of cryptography. Cryptography is the science of writing in secret code and is an ancient art.

The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

How it is done: The research paper explains how encryption is done. It says that the receiver applies the same key (or rule set) to decrypt the message and recover the plain text. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption. 

With this form of cryptography, it is obvious that the key must be known to both the sender and the receiver; that, in fact, is the secret. The biggest difficulty with this approach, of course, is the distribution of the key. Secret key cryptography schemes are generally categorized as being either stream ciphers or block ciphers.

Latest Cryptographic Techniques:

The research paper identifies the two latest cryptographic techniques:

  • Message Digest (MD) algorithms
  • Secure Hash Algorithm (SHA)

What is Pretty Good Privacy: The research paper explains PGP. It says that Pretty Good Privacy (PGP) is one of today’s most widely used public key cryptography programs.PGP can be used to sign or encrypt e-mail messages with the mere click of the mouse.

Threats to Network: The research paper identifies different types of threats to Network. All these have been explained in depth.

  1. Application Backdoors
  2. STMP session hijacking
  3. Operation system bugs
  4. Denial of service
  5. Email bombs
  6. Macros
  7. Viruses
  8. Spam
  9. Redirect bombs

Conclusion:

The research paper concludes saying what cryptography can do. It says that cryptography can hide information while it is in transit or storage. In general, cryptography can:

  • Provide SECRECY.
  • AUTHENTICATE that a message has not changed in transit.

Implicitly authenticate the sender.

Leave a Reply

Your email address will not be published. Required fields are marked *