security and privacy issues incommmunications
Post on 08-Apr-2018
222 Views
Preview:
TRANSCRIPT
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
1/24
SECURITY AND PRIVACY
ISSUES IN COMMUNICATIONS
INTERNAL GUIDE
Mrs. P.GAYATHRISUBMITTED
BYA.SHANTHI
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
2/24
CONTENTS
y Introduction
y Cryptography
y Cryptographic algorithmsy Steganography
y Advantages and Disadvantages
y Applications
y Conclusion
y Future scope
y References
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
3/24
INTRODUCTION
y Security has became a more sensible issue either it may be in
real world or in cyber world.
y
The main problem that occurred in network security aresecrecy,authentication,nonrepudiation and integrity control.
y Data security deals with security during transmission of data.
y Commonly used technologies are cryptography,steganography.
y
As the internet and other forms of electronic communicationsbecome more prevalent ,electronic security is becoming
increasingly important
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
4/24
CRYPTOGRAPHY
y The art of protecting the information by transforming it into an
unreadable format ,called cipher text.
y
The wordcryptography
means secrete writing.
y Cryptography is the science of using mathematics to encrypt
and decrypt data.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
5/24
Example
y Here is a quick example of the encryption anddecryption steps involved with the simplesubstitution cipher. The text we will encrypt is'defend the east wall of the castle'.
y K
eys for the simple substitution cipher usually consistof 26 letters (compared to the caeser cipher's singlenumber). An example key is:
plain alphabet : abcdefghijklmnopqrstuvwxyz
cipher alphabet: phqgiumeaylnofdxjkrcvstzwb
An example encryption using the above key:
y plaintext : defend the east wall of the castle
y ciphertext: giuifg cei iprc tpnn du cei qprcni
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
6/24
NEED OF CRYTOGRAPHY
y Confidentiality :ensuring that no one can read message expect
the intended receiver.
y
Authentication :the process of proving ones identity.y Data integrity :Only authorized parties are able to modify
computer system assets and transmitted information.
y Non-repudiation: Both the sender & receiver are unable to deny
the transmission.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
7/24
TYPES OF ALGORITHMS
y Secret key Cryptography (symmetric)
y Public key Cryptography (asymmetric)
y Hash function
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
8/24
SECRET KEY CRYPTOGRAPHY
y Follows symmetric algorithms.
y Single key is used to encrypt and
decrypt.y Key must be known by both parties
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
9/24
PUBLIC KEY CRYPTOGRAPHY
Follows asymmetric algorithms.
Each entity has two keys.
private key (a secret)public key (well known)
Public keys are used for encryption
Private keys are used for decryption
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
10/24
HASH FUNCTION
y Hash function also called message digest &one way
encryption, are algorithms that in one sense use no key. Instead
a fixed hash value is computed based upon the plain text that
makes it possible for either the contents or length of plain text
to be recovered.
y Hash function is easy to compute.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
11/24
STEGANOGRAPHY
y Steganography is a art & science of hiding the fact that
communication is taking place.
y
Steganography is the practice of hiding private or sensitiveinformation within something that appears to be nothing out of
the usual.
y Steganography in the modern day sense of the word usually
refers to information or a file that has been concealed inside a
digital Picture, Video or Audio file
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
12/24
TYPES OF STEGANOGRAPHY
y Secret message is hidden in different forms:
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
13/24
STEGANOGRAPHY IN TEXT
y The code word is embedded in the document by altering textual
features. by applying each bit of code word to a particular
document.
y line-shift coding: lines are vertically shifted.
y word shift coding: code words are horizontally shifted.
y feature coding: coding done using certain text features.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
14/24
STEGANOGARPHY IN IMAGES
y Image Steganography has come quite far in recent years with
the development of fast,powerful graphical computers.
y
The techniques used are:1. Image compression
2. Image encoding techniques
least significant bit insertion
masking and filtering techniquestransformations
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
15/24
STEGANOGRAPHY IN AUDIO
y Low bit encoding method is used to hide information inside
audio files which is similar to LSB used in images.
y
Spread spectrum is another method used to hide theinformation inside the audio file. This method works by adding
random noises to the signal information is conceal inside a
carrier and spread across the frequency spectrum.
y Echo data hiding is another method of hiding information
inside an audio file.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
16/24
STEGANOGRAPHY IN VIDEOS
y Steganography in videos is similar to that of in images, apart of
information is hidden in each frame of video.
y
When only small amount of information is hidden inside thevideo it is generally isnt noticeable at all, however more the
information that is hidden the more noticeable it will become.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
17/24
ADVANTAGES
y The main advantage is we can provide security to data with
multiple levels of security.
y
We can embed huge volumes of data with modernSteganography.
y Symmetric encryption is simple and fast.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
18/24
DISADVANTAGES
y Transmission time for documents encrypted using public key
cryptography is significantly slower then symmetric
cryptography.
y Message is hard to recover if image is subject to attacks such as
translation and rotation.
y Some data hiding methods follow the principle that the edge
area can tolerate more changes than smooth areas. this does not
differentiate the texture features from edge ones.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
19/24
APPLICATIONS
y Smart IDS
y Military applications
yBanking applications
y Companies secret data safe circulation
y ATM security
y Computer password
y Digital signatures
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
20/24
CONCLUSION
The system deals with providing easy and secure files
transmissions across the network. The data is encrypted and
embedded with any container file and transmitted through the
network, at the receiving end the data is deembedded,decrypted
and displayed.
The application can now be used in any organization
that uses networks. the proposed methods achieves higher
embedding capacity and physical property.
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
21/24
FUTURE SCOPE
y Crypto smart cards
y Java rings
yDNA cryptography
y Quantum cryptography
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
22/24
REFERENCES
y www.cryptography.com
y www.wikipedia.com
ywww.cryptography.org
y wikipedia contributers.steganography.wikipedia
y An introduction to Steganography ,IEEE security and privacy
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
23/24
THANK YOU
..
-
8/7/2019 SECURITY AND PRIVACY ISSUES INCOMMMUNICATIONS
24/24
QUERIES ?
top related