Cryptography and Network Security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
18-10-2010, 04:21 PM



Prepared by:
A.SATYASRI
V.RAMADEVI


.doc   NETWORK_SECURITY___CRYPTOGRAPHY.doc (Size: 203.5 KB / Downloads: 238)



Introduction

Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
There are many aspects to security and many applications,
Ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for
Secure communications is that of cryptography.

Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription.
In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
Within the context of any application-to-application communication, there are some specific security requirements, including:
• Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)
• Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
• Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
• Non-repudiation: A mechanism to prove that the sender really sent this message. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication.
Types of Cryptography:

The three types of cryptographic algorithms that will be discussed are (Figure 1):
• Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
• Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
• Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Reply
sgrparmar
Active In SP
**

Posts: 1
Joined: Oct 2010
#2
28-10-2010, 01:22 AM

hello there,
please send me the copy of seminar and presentation report of subject "cryptography and network security".
thanks.
Reply
ProjectsForAll
Active In SP
**

Posts: 1
Joined: Oct 2010
#3
28-10-2010, 10:01 AM

I can provide you the report. Please contact if interested.
Reply
kavya_1990
Active In SP
**

Posts: 1
Joined: Aug 2011
#4
07-08-2011, 09:36 AM

pls send d report.......................................................................
Reply
harshitjack
Active In SP
**

Posts: 4
Joined: Aug 2011
#5
07-08-2011, 10:50 PM

hey pls. mail me the report on Cryptography and Network Security
ASAP
on jackhd2009@gmail.com
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#6
08-08-2011, 09:59 AM


To get more information about the topic "Cryptography and Network Security " please refer the link below
topicideashow-to-cryptography-and-network-security-full-report

topicideashow-to-cryptography-and-network-security

topicideashow-to-cryptography-and-network-security-full-report?page=2

topicideashow-to-cryptography-and-network-security-full-report?page=3

topicideashow-to-cryptography-and-network-security-full-report?page=4
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Biometric Security Palm Vein Technology project uploader 2 1,475 19-08-2013, 09:55 AM
Last Post: study tips
  Routing protocols in Mobile Ad Hoc Network PPT project girl 0 589 08-02-2013, 11:37 AM
Last Post: project girl
  INFORMATION SECURITY USING STEGANOGRAPHY ppt seminar tips 0 872 07-02-2013, 04:20 PM
Last Post: seminar tips
  Visual Cryptography for Color Image using Color Error Diffusion seminar ideas 1 1,106 05-02-2013, 10:26 AM
Last Post: seminar tips
  CYBER CRIME AND SECURITY REPORT project girl 1 840 02-02-2013, 11:45 AM
Last Post: seminar tips
  FILTERING UNWANTED PACKETS ON ATM NETWORK PPT project girl 0 831 20-12-2012, 05:53 PM
Last Post: project girl
  OPERATING SYSTEM SECURITY project uploader 4 3,203 19-12-2012, 01:02 PM
Last Post: seminar tips
  virtual private network VPN full report computer science technology 11 15,756 07-11-2012, 10:54 AM
Last Post: seminar tips
  CYBERCRIME & NETWORK SECURITY seminar flower 1 1,581 05-10-2012, 11:44 AM
Last Post: seminar tips
  CYBER AND SECURITY ppt seminar flower 0 592 24-09-2012, 03:55 PM
Last Post: seminar flower