Cryptography and Network Security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
18-10-2010, 04:21 PM

Prepared by:

.doc   NETWORK_SECURITY___CRYPTOGRAPHY.doc (Size: 203.5 KB / Downloads: 237)


Does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
There are many aspects to security and many applications,
Ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect for
Secure communications is that of cryptography.

Cryptography is the science of writing in secret code and is an ancient art. The first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription.
In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
Within the context of any application-to-application communication, there are some specific security requirements, including:
• Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)
• Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
• Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
• Non-repudiation: A mechanism to prove that the sender really sent this message. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication.
Types of Cryptography:

The three types of cryptographic algorithms that will be discussed are (Figure 1):
• Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
• Public Key Cryptography (PKC): Uses one key for encryption and another for decryption
• Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
Active In SP

Posts: 1
Joined: Oct 2010
28-10-2010, 01:22 AM

hello there,
please send me the copy of seminar and presentation report of subject "cryptography and network security".
Active In SP

Posts: 1
Joined: Oct 2010
28-10-2010, 10:01 AM

I can provide you the report. Please contact if interested.
Active In SP

Posts: 1
Joined: Aug 2011
07-08-2011, 09:36 AM

pls send d report.......................................................................
Active In SP

Posts: 4
Joined: Aug 2011
07-08-2011, 10:50 PM

hey pls. mail me the report on Cryptography and Network Security
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
08-08-2011, 09:59 AM

To get more information about the topic "Cryptography and Network Security " please refer the link below

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: seminar report cryptography and network security, information technology cryptography seminar topics, seminar paper on types of cryptography, seminar topics on cryptography and network security, cryptography in network security seminar, seminar report pdf file on cryptography and network security, latest news about cryptography and network security,
Popular Searches: full paer download on cryptography network security, seminar on network security and cryptography pdf, cryptography and network security for project, project synopsis on network security and cryptography, cryptography and network security viva questions, ieee paper on cryptography and network security pdf, free download of network security and cryptography seminar topic 2012 document,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Biometric Security Palm Vein Technology project uploader 2 1,448 19-08-2013, 09:55 AM
Last Post: study tips
  Routing protocols in Mobile Ad Hoc Network PPT project girl 0 579 08-02-2013, 11:37 AM
Last Post: project girl
  INFORMATION SECURITY USING STEGANOGRAPHY ppt seminar tips 0 861 07-02-2013, 04:20 PM
Last Post: seminar tips
  Visual Cryptography for Color Image using Color Error Diffusion seminar ideas 1 1,084 05-02-2013, 10:26 AM
Last Post: seminar tips
  CYBER CRIME AND SECURITY REPORT project girl 1 827 02-02-2013, 11:45 AM
Last Post: seminar tips
  FILTERING UNWANTED PACKETS ON ATM NETWORK PPT project girl 0 821 20-12-2012, 05:53 PM
Last Post: project girl
  OPERATING SYSTEM SECURITY project uploader 4 3,178 19-12-2012, 01:02 PM
Last Post: seminar tips
  virtual private network VPN full report computer science technology 11 15,724 07-11-2012, 10:54 AM
Last Post: seminar tips
  CYBERCRIME & NETWORK SECURITY seminar flower 1 1,566 05-10-2012, 11:44 AM
Last Post: seminar tips
  CYBER AND SECURITY ppt seminar flower 0 582 24-09-2012, 03:55 PM
Last Post: seminar flower