Submitted By:
Murali P
Seminar on
Enhancing LAN using Cryptography
and other modules
CONTENT
• Introduction
• LAN/Network Security Problems
• Cryptography
• Key process Techniques
• Cryptographic Technologies
• Cryptography Tools
• Applications of Cryptography
• Application of network security
• Steganography
• Steganography Tools
• Conclusion
• Reference
INTRODUCTION
 A Local Area Network (LAN) is a computer network that
interconnects computers within a limited area such as a
residence, school, laboratory, university campus or office
building.
 Enhancing LAN or Network security deals with the problems
of legitimate messages being captured and replayed.
 Network security is the effort to create a secure computing
platform.
NETWORK SECURITY PROBLEMS
 “SECURITY” in this contemporary scenarios has
become a more sensible issue either it may be in the
“REAL WORLD” or in the “CYBER WORLD”.
 Nevertheless the security breaches and eavesdroppers,
the technological prowess has been stupendously
developed to defy against each of the assaults.
Network security problems can be divided roughly into four
categories:
I. Secrecy - has to do with keeping information out of the hands
of unauthorized users.
II. Authentication - deals with whom you are talking to before
revealing sensitive information or entering into a business
deal.
III. Non-repudiation - deals with signatures.
IV. Integrity control - deals with long enterprises like banking,
online networking.
CRYPTOGRAPHY
• Cryptography is the science of using mathematics to encrypt
and decrypt data.
• Cryptography enables you to store sensitive information or
transmit it across insecure networks (like the internet). So that
it cannot be read by anyone expect the intended recipient.
• While cryptography is the science of securing data,
cryptanalysts are also called attackers.
• Cryptology embraces both cryptography and cryptanalysis.
KEY PROCESS TECHNIQUES
There are three key process techniques. They are:
 Symmetric-key encryption
 Asymmetric-key encryption
 Hash functions
PRIVATE KEY METHOD
SYMMETRIC-KEY ENCRYPTION (ONE KEY):
 There is only one key in this encryption i.e. is private key.
This key is only used for both encryption and decryption. This
is also called as private-key encryption.
 In this method the sender encrypt the data through private
key and receiver decrypt that data through that key only.
 It could be as easy as shifting the letters in a password
a certain number of places in the alphabet.
 AES, Twofish, Blowfish, RC4, Serpent and 3DES are the
commonly used algorithms.
Public Key Method
Asymmetric-key encryption (two keys):
Public key cryptography, or asymmetrical cryptography, uses
pairs of keys:
• public keys which can be disseminated widely.
• private keys which are known only to the owner.
This accomplishes two functions:
• Authentication, where the public key verifies that a holder of the
paired private key sent the message, and
• Encryption, where only the paired private key holder can decrypt
the message encrypted with the public.
 RSA, DSA, ECC, Diffie-Hellman are the commonly used
algorithms.
HASH FUNCTIONS:
• Hashing encryption creates a special, fixed-length signature for a
message, password or set of data. Algorithms or “hash functions”
are used to protect information, and the slightest change in info
results in a completely new hash making it incredibly difficult for
hackers to invade.
• As long as a secure hash function is used, there is no way to take
someone’s signature from one documents and attach it to another,
or to alter a signed message in any way.
 SHA-224, SHA-384, SHA-512, and SHA-256 are the commonly
used algorithms.
CRYPTOGRAPHIC TECHNOLOGIES
Based on layers:
• Link layer encryption
• Network layer encryption
• IPSEC, VPN, SKIP
• Transport layer
• SSL, PCT (private Communication Technology)
• Application layer
• PEM (Privacy Enhanced Mail)
• PGP (Pretty Good Privacy)
• HTTPS
CRYPTOGRAPHIC TOOLS
• Sage-S
• Keccak Tools
• HashClass
• ARX Toolkit
• CryptLogVer
• S-box Tools
• S-function Toolkit
• Linear Hull Cryptanalysis
• Automated Algebraic Cryptanalysis
APPLICATIONS OF CRYPTOGRAPHY
• Defense service
• Secure Data Manipulation
• E-Commerce
• Business Transactions
• Payment Systems
• Pass Phrasing Secure Internet Comm.
• User Identification Systems
• Access control
• Computational Security
• Secure access to Corp Data
• Data Security
• Internet
STEGANOGRAPHY
• Steganography is a method of hiding data within another normal
data. Its goal is to prevent the detection of secret message.
• Steganography uses techniques to communicate information in a
way that is hidden.
• The most common use of Steganography is hiding information
image or sound within the information of another file by using a
stegokey such as password is additional information to further
conceal a message.
When the same image is viewed under different colors like
white, blue, green and red lights reveals different hidden
numbers.
STEGANOGRAPHY TOOLS
•BMP Secrets
•DarkcryptTC
•Deepsound
•ImageSpyer G2
•MP3Stego
•OpenStego
•Outguess
•Steg
•StegaMail
•S-Tools
APPLICATIONS OF STEGANOGRAPHY
• Printers
• Intelligence Services
• Online Puzzles
• Distributed Steganography
APPLICATIONS OF NETWORKS
Computer networks were primarily used by university researchers
for sending email, and by corporate employees for sharing printers.
Under these conditions, security did not get a lot of attention.
But now, as millions of ordinary citizens are using networks for:
•Banking
•Shopping
•Filling their tax returns
These sensitive information becomes more vulnerable for the
external threats like data theft, in order to prevent these one must
use certain measures to protect their valuable information.
CONCLUSION:
• Enhancing LAN/Network security is a very difficult topic. Every
one has a different idea of what “Security” is, and what levels of
risks are acceptable.
• The key for building a secure network is to define what security
means to the respected organization.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.studymafia.org
THANK YOU!

Enhancing lan using cryptography and other modules

  • 1.
    Submitted By: Murali P Seminaron Enhancing LAN using Cryptography and other modules
  • 2.
    CONTENT • Introduction • LAN/NetworkSecurity Problems • Cryptography • Key process Techniques • Cryptographic Technologies • Cryptography Tools • Applications of Cryptography • Application of network security • Steganography • Steganography Tools • Conclusion • Reference
  • 3.
    INTRODUCTION  A LocalArea Network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.  Enhancing LAN or Network security deals with the problems of legitimate messages being captured and replayed.  Network security is the effort to create a secure computing platform.
  • 4.
    NETWORK SECURITY PROBLEMS “SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”.  Nevertheless the security breaches and eavesdroppers, the technological prowess has been stupendously developed to defy against each of the assaults.
  • 5.
    Network security problemscan be divided roughly into four categories: I. Secrecy - has to do with keeping information out of the hands of unauthorized users. II. Authentication - deals with whom you are talking to before revealing sensitive information or entering into a business deal. III. Non-repudiation - deals with signatures. IV. Integrity control - deals with long enterprises like banking, online networking.
  • 6.
    CRYPTOGRAPHY • Cryptography isthe science of using mathematics to encrypt and decrypt data. • Cryptography enables you to store sensitive information or transmit it across insecure networks (like the internet). So that it cannot be read by anyone expect the intended recipient. • While cryptography is the science of securing data, cryptanalysts are also called attackers. • Cryptology embraces both cryptography and cryptanalysis.
  • 7.
    KEY PROCESS TECHNIQUES Thereare three key process techniques. They are:  Symmetric-key encryption  Asymmetric-key encryption  Hash functions
  • 8.
    PRIVATE KEY METHOD SYMMETRIC-KEYENCRYPTION (ONE KEY):  There is only one key in this encryption i.e. is private key. This key is only used for both encryption and decryption. This is also called as private-key encryption.  In this method the sender encrypt the data through private key and receiver decrypt that data through that key only.  It could be as easy as shifting the letters in a password a certain number of places in the alphabet.  AES, Twofish, Blowfish, RC4, Serpent and 3DES are the commonly used algorithms.
  • 10.
    Public Key Method Asymmetric-keyencryption (two keys): Public key cryptography, or asymmetrical cryptography, uses pairs of keys: • public keys which can be disseminated widely. • private keys which are known only to the owner. This accomplishes two functions: • Authentication, where the public key verifies that a holder of the paired private key sent the message, and • Encryption, where only the paired private key holder can decrypt the message encrypted with the public.  RSA, DSA, ECC, Diffie-Hellman are the commonly used algorithms.
  • 12.
    HASH FUNCTIONS: • Hashingencryption creates a special, fixed-length signature for a message, password or set of data. Algorithms or “hash functions” are used to protect information, and the slightest change in info results in a completely new hash making it incredibly difficult for hackers to invade. • As long as a secure hash function is used, there is no way to take someone’s signature from one documents and attach it to another, or to alter a signed message in any way.  SHA-224, SHA-384, SHA-512, and SHA-256 are the commonly used algorithms.
  • 14.
    CRYPTOGRAPHIC TECHNOLOGIES Based onlayers: • Link layer encryption • Network layer encryption • IPSEC, VPN, SKIP • Transport layer • SSL, PCT (private Communication Technology) • Application layer • PEM (Privacy Enhanced Mail) • PGP (Pretty Good Privacy) • HTTPS
  • 15.
    CRYPTOGRAPHIC TOOLS • Sage-S •Keccak Tools • HashClass • ARX Toolkit • CryptLogVer • S-box Tools • S-function Toolkit • Linear Hull Cryptanalysis • Automated Algebraic Cryptanalysis
  • 16.
    APPLICATIONS OF CRYPTOGRAPHY •Defense service • Secure Data Manipulation • E-Commerce • Business Transactions • Payment Systems • Pass Phrasing Secure Internet Comm. • User Identification Systems • Access control • Computational Security • Secure access to Corp Data • Data Security • Internet
  • 17.
    STEGANOGRAPHY • Steganography isa method of hiding data within another normal data. Its goal is to prevent the detection of secret message. • Steganography uses techniques to communicate information in a way that is hidden. • The most common use of Steganography is hiding information image or sound within the information of another file by using a stegokey such as password is additional information to further conceal a message.
  • 18.
    When the sameimage is viewed under different colors like white, blue, green and red lights reveals different hidden numbers.
  • 19.
    STEGANOGRAPHY TOOLS •BMP Secrets •DarkcryptTC •Deepsound •ImageSpyerG2 •MP3Stego •OpenStego •Outguess •Steg •StegaMail •S-Tools
  • 20.
    APPLICATIONS OF STEGANOGRAPHY •Printers • Intelligence Services • Online Puzzles • Distributed Steganography
  • 21.
    APPLICATIONS OF NETWORKS Computernetworks were primarily used by university researchers for sending email, and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for: •Banking •Shopping •Filling their tax returns These sensitive information becomes more vulnerable for the external threats like data theft, in order to prevent these one must use certain measures to protect their valuable information.
  • 22.
    CONCLUSION: • Enhancing LAN/Networksecurity is a very difficult topic. Every one has a different idea of what “Security” is, and what levels of risks are acceptable. • The key for building a secure network is to define what security means to the respected organization.
  • 23.
  • 24.