Unit V
Unit V
Unit V
Cryptography-
Cryptography is the study and practice of techniques for
secure communication in the presence of third parties
called adversaries.
Public key and Private Key are different. Even if the public
key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
Message authentication-
Message authentication is another form of security.
Similar to data encryption to ensure data confidentiality, the
message authentication data security feature.
OR
A mechanism of source used to notify the integrity of
message. Assures the data received are exactly as sent (i.e.
contain no modification, insertion ,deletion or replay)
Assures that identity of the sender is valid.
Authentication Requirements:
Revelation: It means releasing the content of the message
to someone who does not have an appropriate
cryptographic key.
Authentication-
Authentication is a process which verifies the identity of a
user who wants to access the system. In the digital
signature, authentication helps to authenticate the sources
of messages.
Non-repudiation-
Non-repudiation means assurance of something that cannot
be denied. It ensures that someone to a contract or
communication cannot later deny the authenticity of their
signature on a document or in a file or the sending of a
message that they originated.
Integrity-
Integrity ensures that the message is real, accurate and
safeguards from unauthorized user modification during the
transmission.
Algorithms in Digital Signature-
A digital signature consists of three algorithms:
1. Key generation algorithm
The key generation algorithm selects private key randomly
from a set of possible private keys. This algorithm provides
the private key and its corresponding public key.
2. Signing algorithm
A signing algorithm produces a signature for the document.
•Authentication/Digital Signatures:
Authentication is any process through which one proves
and verifies certain information. Sometimes one may want
to verify the origin of a document, the identity of the
sender, the time and date a document was sent and/or
signed, the identity of a computer or user, and so on.
All traffic flowing from one site to the other passes through
this gateway, which encrypts the traffic sent to the gateway
at the other site. This gateway decrypts the data and
forwards it on to its destination.
Remote Access VPN: A remote access VPN is designed to
link remote users securely to a corporate network.
PPTP is one of the most widely used VPN protocol and has
been in use since the early release of Windows.
Proxy-
Actually Proxy server uses the anonymous network id
instead of actual IP address of client (means it hides the IP
address of client), so that the actual IP address of client
couldn’t be reveal.
Security Protocols-
In today’s world, we transfer the data in bulk, and the
security of this data is very important, so Internet security
provides that feature i.e., protection of data. There are
different types of protocol exist like routing, mail transfer,
and remote communication protocol. But the Internet
security protocol helps in the security and integrity of data
over the internet.