Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Learn software

Rating
-
Sold
-
Pages
24
Uploaded on
17-01-2025
Written in
2024/2025

The depth of the subject may be known here

Institution
Course

Content preview

Cryptography and Network B.Tech
Security
UNIT- I:
Basic Principles
Security Goals, Cryptographic Attacks, Services and Mechanisms, Mathematics of Cryptography


WHAT IS NETWORK SECURITY ?
Network Security consists of the provisions and policies adapted by network Administrator to prevent and
monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible
resources.
WHAT IS CRYPTOGRAPHY?
Cryptography is the study of secure communications techniques that allow only the sender and intended
recipient of a message to view its contents.
The term is derived from the Greek word kryptos, which means hidden.
MODEL FOR NETWORK SECURITY - TERMINOLOGY
 Plaintext - the original message
 Cipher text - the coded message
 Cipher - algorithm for transforming plaintext to cipher text
 Key - info used in cipher known only to sender/receiver
 Encipher (Encrypt) - converting plaintext to cipher text
 Decipher (Decrypt) - recovering cipher text from plaintext
 Cryptography - study of encryption principles/methods
 Cryptanalysis (code breaking) - the study of principles/ methods of deciphering cipher text
without knowing key
 Cryptology - the field of both cryptography and cryptanalysis

, Cryptography and Network B.Tech
Security
SECURITY GOALS




Cryptographic Attacks

Accessing of data by unauthorized entity is called as attack
Passive Attacks
Active Attacks

Passive Attacks:
In a passive attack, the attacker’s goal is just to obtain information. This means that the attack does not
modify data or harm the
system.Active Attacks:
An active attack may change the data or harm the system. Attacks that threaten the integrity and
availabilityare active attacks.




Passive Attacks
(a) Release of message content –
Capture and read the content transmissions.
(b) Traffic Analysis–
 can’t read the information, but observe the pattern
 determine the location and identity of communicating parties
 observe frequency and length of communication

, Cryptography and Network B.Tech
Security




Active Attacks
(a) Masquerading: Masquerading or snooping happens when the attacker impersonates somebody else.




(b) Replay–
The attacker obtains a copy of a message sent by a user and later tries to replay it.

Written for

Course

Document information

Uploaded on
January 17, 2025
Number of pages
24
Written in
2024/2025
Type
Class notes
Professor(s)
Muskaan
Contains
All classes

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
muskaanshaik0305

Get to know the seller

Seller avatar
muskaanshaik0305 Jawaharlal Nehru technological University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions