Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2 views4 pages

Network Security Notes

Notes of Network Security

Uploaded by

playfreefire538
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views4 pages

Network Security Notes

Notes of Network Security

Uploaded by

playfreefire538
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Network Security - Detailed Explanation of All Topics

1. Passive and Active Attacks

Passive Attacks: - The attacker silently observes the network. - No changes are made to the data. - The
goal is to gather sensitive information like passwords, messages, or credit card numbers. - Examples: -
Eavesdropping: Listening to private communication. - Traffic analysis: Studying data flow to deduce
patterns.

Active Attacks: - The attacker interferes with the communication. - Data may be modified, deleted, or
replayed. - Examples: - Man-in-the-middle attack: Intercepting and altering messages between two
parties. - Denial-of-Service (DoS): Overloading a system to make it unusable. - Spoofing: Pretending to
be someone else to gain access.

2. Symmetric Encryption

• The same key is used for both encryption (converting message to unreadable form) and
decryption (back to readable form).
• Fast and efficient for large volumes of data.
• Key must be securely shared between sender and receiver.
• Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard).

3. Encryption Algorithms

DES: - Symmetric encryption with a 56-bit key. - Now considered weak due to small key size.

AES: - Replaced DES. - Uses 128, 192, or 256-bit keys. - Strong and widely used.

RSA: - Asymmetric encryption using a public and private key. - Used for secure data transmission.

4. Key Distribution

• Process of securely providing keys to communication parties.


• Methods:
• Manual key exchange.
• Key Distribution Center (KDC).
• Using RSA to encrypt symmetric keys.

5. Traffic Padding

• Extra data is added to messages.


• Prevents attackers from identifying real message patterns.
• Used to confuse attackers and hide traffic size and frequency.

1
6. Message Authentication

• Ensures the message is from the claimed sender and hasn’t been changed.
• Uses:
• Message Authentication Code (MAC).
• Digital signatures.
• Verifies authenticity and integrity.

7. Hash Function

• A function that converts input into a fixed-length string.


• Used to check data integrity.
• A small change in input creates a very different output.
• Not reversible.

8. Secure Hash Function

• A cryptographic hash that is resistant to:


• Pre-image attack.
• Collision (two inputs having the same hash).
• Example: SHA-256.

9. Public-key Encryption (Asymmetric Encryption)

• Uses a pair of keys: Public (shared) and Private (kept secret).


• Data encrypted with the public key can only be decrypted with the private key.
• Example: RSA.

10. Digital Signature

• Ensures data origin and integrity.


• Sender signs data with their private key.
• Receiver verifies it using sender’s public key.
• Prevents forgery and tampering.

11. RSA Public Key Encryption Algorithm

• Based on mathematical difficulty of factoring large numbers.


• Public key = (e, n), Private key = (d, n).
• Used in:
• Secure communications.
• Digital signatures.

2
12. Key Management

• Involves generating, storing, distributing, rotating, and destroying encryption keys.


• Poor key management = weak security.
• Central to any secure communication system.

13. SSL/TLS (Secure Socket Layer / Transport Layer Security)

• Used to secure internet communication (HTTPS).


• Encrypts data in transit.

SSL Architecture: - Contains multiple layers for different security tasks.

Record Protocol: - Takes application data, fragments it, applies MAC, encrypts, and sends it.

Handshake Protocol: - Establishes session. - Negotiates encryption type. - Exchanges keys.

Change Cipher Spec Protocol: - Indicates switch to encrypted session.

Alert Protocol: - Sends error/warning messages (e.g. invalid certificate).

14. IPSEC (IP Level Security)

• Protocol suite for securing IP communications.


• Provides:
• Authentication.
• Data integrity.
• Confidentiality.
• Operates at the network layer.

15. PGP (Pretty Good Privacy)

• Provides security for emails and files.


• Combines:
• Symmetric encryption for data.
• Public key encryption for key exchange.
• Ensures confidentiality, integrity, and authentication.

16. Firewall

• Monitors and controls network traffic.


• Applies predefined rules.
• Types:
• Packet filtering.
• Stateful inspection.
• Proxy firewall.
• Next-gen firewall.

3
17. VPN (Virtual Private Network)

• Creates a secure tunnel between the user and the network.


• Encrypts all traffic.
• Hides user’s real IP address.
• Commonly used for:
• Privacy protection.
• Remote access to a corporate network.

These topics form the foundation of Network Security and are critical for understanding how data is
protected across modern communication systems.

You might also like