Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
4 views3 pages

Network Security Notes2

Notes of Network Security

Uploaded by

playfreefire538
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Network Security Notes2

Notes of Network Security

Uploaded by

playfreefire538
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Security - Complete Notes

1. Passive and Active Attacks

- Passive: Eavesdropping or monitoring (no change in data).

- Active: Altering, modifying, or disrupting the communication.

2. Symmetric Encryption

- Same key used for encryption and decryption.

- Example: AES, DES

3. Encryption Algorithms

- DES: Outdated, 56-bit key.

- AES: Secure, supports 128/192/256-bit keys.

4. Key Distribution

- Sharing secret key securely using trusted parties or public key methods.

5. Traffic Padding

- Adding fake data to hide real traffic patterns.

6. Message Authentication

- Verifies sender and checks data integrity.

- Techniques: MAC, Digital Signatures.

7. Hash Function

- Converts input to fixed-size hash value.

- One-way, used for data verification.


8. Secure Hash Function

- Cryptographic hash: collision-resistant, secure.

- Example: SHA-256

9. Public-Key Encryption

- Two keys: public (encrypt) and private (decrypt).

- Example: RSA

10. Digital Signature

- Ensures authenticity and integrity.

- Uses sender's private key to sign, public key to verify.

11. RSA Algorithm

- Public-key system using large prime numbers.

12. Key Management

- Handling the lifecycle of keys: creation, distribution, storage, and destruction.

13. SSL/TLS

- Secures internet communication (HTTPS).

SSL Sub-protocols:

- SSL Architecture: Layers and structure of SSL.

- Record Protocol: Encrypts and sends data blocks.

- Change Cipher Spec: Switches to new encryption settings.

- Alert Protocol: Sends warnings/errors.


- Handshake Protocol: Initializes connection and key exchange.

14. IPsec (IP-level security)

- Secures IP packets with encryption and authentication.

15. PGP (Pretty Good Privacy)

- Email/file encryption using a mix of symmetric and public-key methods.

16. Firewall

- Filters incoming/outgoing traffic based on rules.

- Types: Hardware, Software.

17. VPN (Virtual Private Network)

- Creates secure, encrypted tunnel over the internet.

You might also like