Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
112 views
44 pages
CNS Unit-1
Network security
Uploaded by
Surya Chandravelu
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CNS UNIT-1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
112 views
44 pages
CNS Unit-1
Network security
Uploaded by
Surya Chandravelu
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CNS UNIT-1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CNS UNIT-1 For Later
You are on page 1
/ 44
Search
Fullscreen
CS 6101_- CRYPTOGRAPHY AND NETHORK SECURITY UNIT T. - (INTRODUCTION & NUMBER THEORY Services , Mechanisms and atfrcles Lie Oot Securt anchitecloe -| velwerk eeuaihy Malcl ~ classical Erenyrton “ecbriquos Sporotric Cipha. ron | aubstihalto techniquos ) Transposon tochntays0s Stegnogragh) FINITE FIELAS AND NUMBER THEORY ! Groups , Rings, Fiolds + Nodulax asttfimehio - Euclel's Algonttin- Finite Fields - Totgpersal Attics -! Fimo Numbas ~ fesanl’s ard fuler's ‘Teme ~ | Testing fox prtveality L Tho cite Remainder Theorem - Discrete Lege, | UNIT L - BLOCK CIPHERS § PUBLIC KEY CRYPTOGRAPHY Paka Eoxnloo Stanand Black Cho. Pietlon~ Block | Giha. todos af Operalton | Advanced Eromptton Stardaxd (AEs) ~ Triple DES ~ Bloofesh - Ros oe Public. Koy | Cryebgeaphy : | Fethetples 4 nue toy cayposytams| The a algositfun — Key Maragorant + iene Heltean Key Erehame’ FlUphte cuwo asttimetic- ElUtte curve eoyrtoys aphy UNUT i - HASH FUNCTIONS AND DIGITAL SlgNATURES ; | Audforticectton requtrement + Authonttedtton Renclten |- MAC - | Hoh Functton Sealy q tosh tuncton'and MAc?=Mins ~ SHA! | | HMAG - CMAG ‘ nigital Sinature ard aucliantiertion probeeolel + | | B8le Gamal - Shovw ,UNIT- \v GECURITY PRACTICE @ SYSTEM SECURITY Audhenticerlion applications - Keakoros }-%:509 Accthanbiccrlion | seavicos |- Tntenek Firewalls yx Trusted Qysterm 4 Roles es of Firowalls - | Haul ralaked sontecagy | “Typos of Frac - Froud designs | SET for’ F-tommerce Teansachons\ Int de- dni Petoclon store | Virus and ebtel threats — Countermeasures -) Firawcalls design prindtples - Trusted Cyptoms - Prackial tenplamantelan of “opel, oat “uniy D - EWA 20 @ Wes secuRTy eral SocwSty | amine Sowicos fev E-mail abtocks posstblo | toch | E-mail | Establishing “t rom Acctfen aon of io. | Sow - Nos “otegatly - Nop Repudiadtton L Ply Gecee\ Prvecy (Pee) - | Sloe e seanihy * «Ove via a a soot = IPlard LP v4 | ‘Rolando Hood. Fpcapsuladny” Seay Rafond (esr) Votundt Ko Exchange (tras que TSAKMP(TKE Encabind) . | Wid Gousity + 954 | (tLe Basic € Probe | oxopatiy ‘Ya hoy - Chest aucthontiection — ~ Fd oa ceplogel by SSL Macks xed to 3+ | Peportabity - Eceing ~ Grane Heckooic Tranadnn (St) -| UNIT T -INTRoDUCTION @ NUMBER THEORY 4 dolwduction | | Tu choos ard communledions Links rqriver measuics | ty: puotaek. abo. Aang tetany | ® mata_Sousi | Te Bee erence @ Shy 4 weliods ob precing dake. fur uraufforzel discloaue £ tnedifiatwo, W redo. @ Inloarirtion cccusthy ¢ Tk % abad enabling collelowticn ichtle raven ing gisk wtf. an aaperch “Wot talancs availability Vous, con anki | of doko . | Compuber Scoutity » | Gencic pame for tha ccllechon of tools dosigned to | prokeck data ard to Vhucart fickoss . w Nola ke Geeussly » : Neasuses ty patteck dota dusteg Hots Hansmisvon , W Tbourat_Soeusily Moasuies ty protec data Ausing “thet transmission | | | ova ee 3 itercooneckedl rekvoorka « * Nead : In oe te avoid sccusthy videtions - ooo of *Kem ON) = Us A tranmils a sensitiv fafoamation file ty usr BR. ‘tte unacckosised usor 0 8 able ty monitor te Laansmixsion and capiwe a copy ¢ Fe file dusing Its transmission ,| Gphortox + back + plaintor 4 Maing > A mesage & cork fiom a custome Joa ebehi with indauchions for vaslous transactions . Arbsqquanty oth investments Jose Value and tfa customon danics sanding the 1: ' > whele Pranawstfteg fio massaga bho two users the uinauctortzed uso, vntercopls “Vo mosage » allkews its. cooker, 3 add ov delcko optsios , and) then forwards {fa moisage ty + destination usor. * Teaminology | Q) Coyebogsaphy The , proces q converting a pltntert toto ciphortoxt and then rotten forming rok morsage back 4p plaintext . ( Platotoxt : . The original message . OO Ceghaukext > The beantfor mad mosage priduced as oukpub © Df doperds on plaintext & hoy. W Ciphar +» fy algosttim fos Lransfonwing plazoto xt into ctghar tort . ; w ‘op \ Some. ertieal) informechion acd by Yfe cipho, Known only to Me cord & vocoivon . Wa Epetphor (encode) + Tho procens converting a Plaintoxt to phorboxt ting a cipha Qa toy. VU) Doct phon. (decode) + Tho prau of converting a a Cipkr ga feyTho shdy af princt ples & elias 1) Cuptanaly ais ck ty plain toxt | ff twainsfosming an dpha tert pa | | yithow “tte foousledge qf re tay « Alyo celled “code bralog | [ coutly, Gaal | ey Confideartiali | a ty 4 Ww) Avaslabibity. | CONFIDENTIALITY Bee refers to Uiwiting nfoxrratton acces and | gradloowe to aulforizad wor and poverting accow by oF disdosue + unarclrorized ores « consitive infowrnation should ba kopt Sook. from individuals who ai pot audhowtzed to xo fo informacion | INTEGRITY TE volo ty fo taut worthtnon 4 \nfprmation rosounces . TE ensuses that information pot changed ox alkmod in tvansit . | AVAWLABILITY ‘UH means that poople cho ose authorized 4 uso inhpimetion arc pot proveoted {roi doing $0.| > X Boo dobines a socutty sola asa cervico protded by a partoeal tayor 4 commmuntcatieg open. Gystems | hich ensues adequate saeuaitly of to ayotoms « | =X 800 divides Seuss Grvier toto five calepyies | © Aerfontieation a) Accoxs Conto? GW dala Confidentiality W) Mla “nteg ty W) Non- repudiation . © AUTHENTICATION + a Th ie Re proc 4 dekerrsining uholbes gomoone. — gorshing & , in fock , who o¥ what a is dedared b bo. Authentication 8s co mwconly dona Vhacugh tho wa gin passwords . | = Two opecitic authenticate caves aro apie in % S00 ‘> Poor entity Authentication wed tr axsoctation | with a legial conrection tp provide confidance 0 “fo, Wootity a fe ontition connected . %S tata Origin Audfentication does pot provide ee apetnat sha duplication ov modificadion of} dota units. :| W AccEas CONTROL ; | rb he ability to Limit and contra te | acces tv oct aystems € applications via communiation | Rinks « | > This outer contwls who can haw aces | fo a Tosure . | (WW) DATA CONFIDENTIALITY : | > Ut & the Concealment Of Inuemation ov | yosourcas . UE 2s he probection vanamitted dala from pamive attacks . = Tk & clawitied as ' ue Connaction confidarrabty : Tho protection of all wo dala én a copneckion . & Copnacontoe confidentiality The pwtechion a wer data toa single data block . & Edloctine Field confjcanhaly ‘Tho confidentiality Of alocted {cds within the wer dala on a coonection (oi) in a aide data lsleck & Traltie ftovo Cenfidan ality + The pactection Ao iWoumation fab | rwigrt bo doxined for of svation traf flows . |W DATA antegeiTy : 7A ray apply to a Gream mavages , a sgl morsage ov wloched fields within o Mostege=> Medificalion causes {oss ct — “Unbeyly . dala Integrity can be clasified as | & Conracttto inkeqtity wat necorerd GS Coorechion inbegalty witfiad recov | & Gdecfive Field connectton Tokay 4 Coorwelnnles “Lotegrity G Gloctive field ccnnachonloss Lnkegity « w NON -REPUDIATION + | > Ut provrta ctthor andor ox recoiver fore | denying a bransmited mooge . | F When a trorsage £5 donk Hho srecsiveA aan pHDve. | trot fe alleged gender in Pact eonk iho Mewago . > Kho a morsage & Yeodived , to Sender can Pre Vol He aller) eairo in fack rmcatrad fie. mozeqe *Mechaniow. Space Seousity mochan\ame Pervasive Srewslty Trechonisin . Ls Shoctfie Secunthy Mechanism + u ray bo incor porated tot The. apprprials preted foyer tp orda to provide. come f tho ost Seousitty eovicas.(D Encipherrant \ The use of malicmaticn) algorilims to | transfers data into a fore hak 2s pot vead ity inkelgbe Digital’ eigneen . | Paka appended tp, or a cryphograrhic transfor mation 4 1a dala unit at allows a ‘roerptont Ly hie dota unit ty prve the aurea '% lotegraity te | data anit t protect agatasl ger: | te) Accor Cont yl Sf A varioly of ra machaniens thot enforce ‘acces agra tor sos cos. @ dala. In yeh : Hh cat A vasioly cf inor mation mochanigms used | b ensue To inlean ty qo data unik ov clroam of dota usits « © Accthontication Exehange : A mechanism intended to ensue tho | Wontily fan entity by moans 4 ‘erising exchange , YY) Tralf ic Padding. ‘ ' Tho insertion q bits foto gaps in a data streams f frustyake traffic analysis atfompls - ® Nola tization ‘Tho use 4 a. inuted “thixd pay to swe Certain properties of a data exchangeWs Pervasive Soousity Mechanisms + Mechanisms ‘hat aro pot specific bo any partial ost Seoustly orice ov protocol Sower . 2 Trusted ‘hockenality : That & percatved to bo eos rock with smeared. to eve cnifora., W Event dobechvn + Debection 1 coousity rolarank oyonts - @" Secusity lobol The reskg hound to rosourco. that hamos 08 designates ie coounify atti butos Hot wesowire . (ay ay Recover: © Did cath. mua, fiom ‘mochanisms; such as erent andi @ maragermant pinctons @ tahod faced actions . K Bavthy _Aldacks Macks ¢ Computer based oho, Have ih Valuahle “Oorepononts ss H[v ; -8[00 te -dada Booustios Those Compandtts Gia evaluated ip tosmna (diab Hes, on al oll. Bore G Fem are C8” flows !> Awol + & Avel means people , propsy & information . Gy People tray Include emplayens , cushions, - Lr Propark auok ooniat of both. tangible % intangible iboms ‘ek can be assigned o Value. poly ‘Infos ipahon trasy Include DB, slw code,--- > Vulnoatility Gu yolas to fe eeunity flaw e in a. Gpstom that allows analfask fo be! axceemful » ° & Testing for vullroxabilities 3 sofa Fox mainkaintng ongerg sucusi ty 5 ollsing fo people vaponsibilities fox ite Socustty of one's, resources to Tespond effectively to naw dangers as fog axkse « > Thieal GT TYre tp a, sous co tres fa parbieulas type of attack; v Tanks come to many “fori Aopanliing on ‘Ahety mole, 4 obfack Fiom Weuses trojans , 7 Spyware & bots, thacals have evelved toto ‘serubeale enya totonded b> harm compas > Rink : 4 Hab" Bn rifeudltan of owsels seats" @ Wnaabiliies. Ge) , : Re A¥T4v,> Contol : LUE ts ap action, devieo , procdise oF bechne, 4Rak sremevos - ox. x rablucos sete rig Aebive of ie D 2 freed ‘ wa Ge denial of Passe Hacky poledsa” if wrouage Corks Froftio: Analysis . _* Pasaive aprace. Ly TE alfainptar ty leatn or ial wwe ¢ Info vneetics Prono), fo ayatem. oak Bow, nok. ajfert * ayabom POSTURCOS , SG tha! alfickon’ afma'te obkarn tolamnadion' pak i, to transit’. The tom pasive thdzeabes tat fo offacker Anos not adfempls “fp gaiform any rocdlifteations “+o “a dala. wv oo oh, Mawaqe Contant ata: REI © Fend conor G mnsxage Freo Opponank | eaadas sto Roéoive] ee iG »! Gendoy 7 “ o0hg I vol! Sp ee Sanh Pal a and a bransfoxsed file Troy colar Sept (@) conf da infbsman | yoo opould. Like ,to. provenk- opponent fom Henan cg the trantairsig Content . siThalfie Analyers + Rit Tobsave patter of wosag rom orelo to eat g Tl ae Tg Gondor Roceiver. Mask ‘tic.’ Contents i momage , So ‘rat opponants cout not oxtrack tha ‘nforrradoo from fe mnouage . Enayptrop 2s wed Bx masking. : Ka [Note]: Pawive Attacks axe voy difpiaedlt to dabock poeause “thoy Ao not. ‘gp ‘any dala alterahn , , * serve “AvTAcKe | Ls Uk involves oma eae 6 the data trea or “fhe creation qa a false Stream, Thos atfocks cay oo be provantad coal. : ‘ wo Masquerade 7 1,] Oppawoe * [Mowage from et tok apponia to be Prom condor] 12 Gen Rockivox QE tahos glace uber one ankily probands to be oo dasfeaot, _eokiky « apa attacks aso called as Tasqptiada allacks . :CH) Replay ° Leapise mesage Soro ] " 3 Te conde to Teccivr | lobe oppenan replay Wows age. to Tattle | 1 pas Gerda Rocoivor VU invdves the _ pausive caphuo 44 data unit and Hs Subsequent eres fo produce an ‘unautfiorizad ded 1) Modification ¢ Mewae : L Opponent rocdifias metiag: : "ete + Brom sardes, fo Receive] ;2—~Gas=- og te ty Tk tvelves come change fo “fhe ong! message - Tk produces an unauhiorized effeck W Dental _of Sauteo : opponent: [piers rs 2 Te a 4 & Fabiteation comes pos altacks . \ Another form is disruption of entire N)i0, ether by Ksabling the nehoowk os by sais it wthmessages 80 ax to Aeqradea parfermance . The first tye Dos attacks wow ingle source adfachs , rod a Single ee wos used tp “cdtack anol ayotom ant cauue somali & Otho ager b tae : =) abn flood . >| Gotvan~, TARGET a0uRCE GyaTEM eyaTeM Passive aTTAck. 7: | _Aetive armact WU Bw ‘he rokuan ¢ wv i rove, some rool ttadien covepdsoppieg | oD, ov qe 4 ffo dala ctreare ov fhe a, bammixcons ” ! create fa tale strom. | | | w Types Rikase : ‘menage bw “ype: Masquowocle , content Gi traffic ails. Modification of mosap @ Dos. 1 © vous dzptieult: todalect: 1s) ©) tary te doteck - W Te dros not abtack@) | WT afficts ta ayehm. alfget “fa ajoten, a+ Mao — ‘nfo Middle Affack « Ve an attack , in which an attacko j able fo wed, insol © roodtfy mrowsages b|vo shor pasty, without etdhr panty knowing tat tfo Unk blo ther has feon cerpramist) ' syot JG U woy indude ope oF Toowe. of é 7 ow cavsdacpping . G) Checon clphatfoxt Attack | w) Bubstihdtivn Meta Ww Poplay Packs Dos | Attacks, * 081 Socustty Architechue + TE focuser on socusity abtack: , Fs @ Sorte . sof A OSL Secusily [ 4 Axchibechwa j ee pte Any acho sfhak compromises the infor mateo socusity, : 4 : Socunthy Aitack : Gecusily Vechanlan 4 procoHs Hab Bs dasrgnal to datos, Provert OF macD ret frm a ei yack Scousihy Guia A Process! ng OF Communication cower ok eRances “tha soouily’ of a data PRR ng ayatem| ‘Applicadivr) ror sh oc Pi ¢ : _ 7 foot Fibeediclabde Applicaton Lay ale TF | NTTP, DNS MTP, "TTP, oxa,oure, | ~ peraPar mebefl-ETP., cramp, Popg| FTP ane, POPS, | 5 ae rye ee 6SL, TLS, i en i ; — ae Crnp- Crellerge Transport ayo h acid ae vp ree! gp are SP 3 phen | OPEN | ot asst ching layer : ; withing laur| 4: iat do 64 ater PAP P a sad , e j (00 aro. Rea oP oh a oy. ~ Seep Slt Nekwork fauyon ECP.cHAP 4 vane, , TS -TL teat for aig ee] Physical Transriss ior na ee te Phuyctoal_tovjor : SM Hfis layor, Ha socunitty framawosk protocks the ble plant , the woising @ folocommuniadtuos inhastruchwo - The physiol layer te proheehal by wedundant power and woAN connection . TE also maxns protecting fo. physical Ho, “+ Prolecking fe plysteal toyer entatli beaks, aloams on onbyancs , climalo cootwls @ aceen + data conto. W. Dataltok & No layers : AL the datallink & Nho layne, He cocust Pramercosk probe cha Sapte wt a numbar 4 tochnologios :© VPNs protoek infeersodion by encrypting it ard * Gerding ik Hengh encrypbod bunnals though. Tabor gy The tobouok . * ; , W NiDs Cho Trbnuicn Dobockin Septons) “eakch dogg, i Flowing oYOL te wires tohang Pr pit atraam palens ffl Could tndicale. aback, Ov walictous tobent.. Wr Host Istnesten Dolochon ajstons rooni by bi Shrauna, : : e entustrg “fa. host rochinas at tha leo Tolar Cosd-(Wad) p,.) ‘ aio teokitng fov Suspteous pottans. : ~ a. Nebooske & ‘Tuansport Tawjors i > OM te Nin @ Transpenk Nasjon oie coowity, (aman si vues froballs ty do _Skatahl Ynapoction GF pockets “enkoug & Leasing to. Niw- 4 oa sq sldion > Routous , using Accors Oonbrol fists (ACL) filha ep addion p Prterenking tragpie ‘Lyon “pg ystems tot hove Oho aad for tk, ee * AE to Mo @ transport tojen | >Fo altachiarks ty Decking ov Vins Saoning sho Maxaaicg Packals euch ay e-mash , embeded viruses or moalrerous Coda.i. Sesion , Presentation § Appltexlten_foyors : > At Roe Jaspus , to accusihy framorcomk C3 nuns of elniys @ tb canoe op. F Bro of Haw techniquas ara policies for system Renapprent 2uch ax, fedening fo, 08 yhaaping patch Sovols and 08 revisions wp to dale , mung § yori. only fa, carvicas rooded 4b Seppe Ro Sutras pros & tale i, ah otfon. press , dhe . V- Presantalen @ Applicakwy logs» Ver Mt Hee Mayors 1 the coaustty Framacork odtlizas | usar account manogoront,. Eo contre? acco tp the Nlw , aystoms : > Th saath Prama,potk ee on ayctom Ors, be contre acco ty thaty Machines , wl administrators to marge sox necors to fats Nios g applicatton managers eile as DBA f> qarknl acces to appligshons @ dake . -B™ fost Intrumn’ Sotectton ayesha ‘tatD5) , achive i tne fox lovely fa. reo, eovek jot fase loys te | umboh “for charpps +e crttial eystam Files, ‘thos eysbom tahorow. “rok might irditale an atfackr ying to grt contre of tho sister oo eouust ty framaxotk carn ale control sor acco contsally using a ‘role [Rule -Pasod Access Contyol (REAC) ongine , fiat uses a divectory sich os LDAP. PKI digital astificates con fo wed,A trowage 18 to bo transfered from Sowa tp Bostinalion acwas are sort of Intosnol. pote Ho stlos mn, coopaale for tho data exchange . SK tapiead ifptmeton chan charnd) B ertalbleshed toy dehy Q@ vwulo ‘fiough fo wtornol: From_aotace ty dostinali, | Ga te jochntgics fox provalan accuscty ‘fave fee | Componants | om eccuaty volated brauforadtien on ho infor maken & bo sont. ® amo coot tnformalnn —shatod 5 tooo puipeiples, it 2 dara punknovor hy te oppronk . Tuusbed Third Fox& CLASSICAL “ENCRYPTION TECHNIQUES + Te (Bipomabrie Oras Noel | Bibstitubon ‘Techniques , 7S . oes Transposition “Techniqhas , Geqnesraphi) + cyorcbte ihn Nl & This twoddl has five ingscbants * G Plointext is the origina) massago oF data Wak is fed toh 00 allgorttin ox inpu. . w Foo pon Agari tapos vasinus + aubukthbos & transformations on tho Gant iyir f <= UW Soerak. toy Bo valaa indepondest f' a plaintext & te algesttm, CM) Cephos text ts tho eearbled “neways produced os tubput . Ut dapord of a plaankat & so cack hoy. a W deenpten Aguuitfin takos tie ecphakoxt @- the goer I @ produas tho omyinal platotort . * The prvcers of roanipslahng mosages to make foro socwe 2s called cay phagresphy = the objective 1 3 to dowtar. an enexyphron “edatgie. % Wok TL wall be very digheull fo an i trathonized poy to understand fe contonts of the caphartert > The wo can recom “fo. onginal Wosage only by Aeouphng tic, @phortoxt uring (Wo Soak hey,a ; Frcuy pttoo Ag ovitfirn| + Model of ccnvontional) Cryphoeystem 7) cic whoo a , Yo ~ cephortexd - Ge - Eno elton Agoatfin K~ ene phin Koy x ~ nenpt ao thea, ocd movage [-plazotoxt ‘pita 1 Beesphvn Agorittine | oS Dees pion ia 3s Ciphokert ; ~ Chasacheutstios of ( A eth ay & The | tipo ¢ opesat tons wad fox Erameforntig plaintert 4" Cephostext ; ‘> The nbs ef hays ued. + The way (0 Rich tio plaiotert 2s proconad* Substitution Techniques : sen SS Gubstihadion —caplaen changos chasactors wy {ho plainke xt 4o pratico ax ciphatest . ; & B a fochniquo in-chich fio lettors f Plintoxt. are -roplacad by olfids. lolfors ov by Numbors | eyeT+ Cacsax Cipher * TH ia a Special are of subettifon techniques whawtn ach alphabet in Metage ta ‘replaced by an allphabot tfsco placs down thie Lene. For 9) Plazntext — Hello world Ciphostort — KHOoR ZRUOG Minabedepghtjtimrorareravergr CHAD ELE GHZ T KL MNO PleRETUVURYZ ABC Numerie) cxuivalont to each Jott is as Follows I AHO op bOL pore Zoe? od > For cach plaiotoct lelfa P, eubstihue caphortert lettor Co ' c=. &8,P) =(P43) tod a6, 4 ty ny on 8 fo, ae algort a i Coch e) aa =(PHR) Mod 26 , het KX anges fmm | tas, re a Decusphine olyostiim 2s P= Dly,c) = Cex) mad 2¢ Domesits + > Encayptton g mm cuyphon algorbiens ave known > ondy 9 ead | top gtoitny. => Easily mecogmizable . ooV- Monoalphabokic Cephos : Subtituhes ona let of, tho aliphobes. with anctier lelter cf {fo alphabo! . Reina be des ght {kSmnopgret wv we YZ Gm mrAbverzaadeghikipotugt reed Faq) Plain text Mossare. \ hello ow are You Caphortest Menage a.0g4 k aky moc wy fi. Plated Cipha LE & based on tha we 4 BX5 trabas of dottos conetmucted using Kogoord Fox &q) Plointert 1 St0ARAT IS MY BIRTH RIGHT Kayword MONARCHY . —+ aus dn} MJ Orpen A [etic Pal NU yo ec] w hyefie] D> e fe [a fais] « CG er te | atl Lea als Trask , opltt' the plistoxt tno Auaphs Poastext + Swol AR} As. tL MY] Biler| nelial wr. Cxhorfext : QX NA XB BS NC AG ZK Bo GF DP TP Game wo > tmadiake gh] ht sue Acoso + tonalFQ) © Wide he gold tn fe tra shunp- | Play pate @ wo are diceovred . exw Ce | Pease Ws Wil_epha : {> Tk, takes mo cuccowte ‘plaintost lelfes ard [ Substituos foo thom ro ctphorhoxt leffors, Leach chasanter te ami gral & numerical value os G0 bal z= ab. Cle (en Prt hn P2 +a P3) mod 96 C2 = (kar Pr t Koo Po + Kas Ps.) Wood 2.6 C3. (kaiP) + Kan Po + Kaa P3') toed 26 , > Those, Linear euahns can be weproxnbed as: {i Biginhnds: K GPT Roby Or |}, © {kor Kan, Koa | | Pa '| ined 26 cs kar Kaa Kaa] | Ps coho C> Cpha, text & Pe a) K> 3x8 thabvix 4 toy for €q) “Plaintext or Pay be tote Nerey tog of ot t@ af 2. aOD Ciphestert & Planted axe column vechxe fy length 2 c= KP ted 96 a(t 15 : or ge ai} | o wnod 26 > 2 a Oh 335 n i &19 tod 26 => ta ae wu oe 1 g « Pointext => Phy Mise. Nenay Cigar taxt > INS HDLE WMTRO | c= (KP) = KP md 2. P= o(k,p) = Kile mod 26. Vv: Polualphatctic Cubstittton ' & Each ocawence aI a chasacler have Se fferont gubkitutc:. The welahinhee Blo a chaacher in ‘He plaintes! io'a checks fo the otphalert $s one to mang.” Fp wep cote & The Vigenero aiphor ¥chonses a eagptepce ct kup, ‘represented bya olny. Tho Selo axe applicd fo Guccewtve plaintext chaachur , and wofien the ond fe vey B veadhed | Aart cyor >! 5 Plantert + “the Boy has the Bag fay ye,[ | Hp PlipText
OPK WW CLY OPK WIM . Vi. Oro Tima fad + & The string is thosen at random © attest as long “us the mosage , go it does nt Topeak. Vernar Cipher user one time pad. Fa) Potntext ° .come { ' ‘4 Le t NCBT™ZQ ARX. Plo&nText. a Mac! longi: s " lg Whe rotate! stel__Ciphor ' a \ The UP b te conn adgoatin ann a Batra block o. fongtt. dw bits ard @ key &. Ly The plaintext lock L divided into 2 hesbees mek as Lele Us) gq Rapttt (Re).Y ' ' ' De 1 ' ! \ io G& Pasamotou 4 Block Aiz2 Fut Shoo enexygio | Daceg pron ath case ef rally (ener Gag] be? FF og y PlaipTent (aw Bits)= Connie, tho -Evaiyptron pray , , © REIS RE w= Ley & F URES Ke) => On te lads pion. Side) LBj = Rdg = LEQ ie REys ROL = Eps x FE CRD, Kye) = REY KE (RES , Kis) : [Les xF Cees Kw) K FCRE:s Ki) Ld = Res & RD, = Lee. thesation of tho encryption algorithm , Ler = Ree, Ree = Lee, XF CREp sake) #& Transposition Techefqyas : \ re Teassangos the Chasochoer in thie plintext to form tho ciphotoxt the lcbPors awe net . 4) Rail Fenee Cephr . © For evample + To enctpher- to plaintert “rect me offer thie pally" woh a wail foes oh depth 2, Mm e@ m a ft e fi 2 a, + et pein Y tt pry. ‘votiphor tect + mematrhaatet fet py,Erangle 3° Plaintoxt-,, The bavke 4) suitable os a ae _ call study Yor Cha giles io: Bobo why Bea Publobed | to er 07? gr acis Seat bio gba Set be ee es chore ° BSLeD bt FE 1 EL ESBaUTTOS ) “WrART . + Steguuodenniye? >” & can bo wed to hide @ motaqe wtendad for lar wehvieval by a epoetfie indindual oF grup. Stoqnegraplyy (Covered coating Comat charms’) Protockton’ ogatnst.:'Acbockipp 0) + Ee ogpalinat: *romoval (dota hiding), (Aecwtrenk reeahing) 4 veakocrnave? : i : inges petoti cong,» Gall beets ce. mead Cami aif oie ‘WH tho’ came usaiy’) $ coats) ery object B Masked @pectsie)% hepnography @ encrypt ona bath used to | evisu dato confidarstiadthy “PW hides “tha existance of sect rrowage * Steg nogptaphy pron . > shegooguaphy, Techniquos + Ls Genome Shageregepy = Eneaeg a hion thewage Th a’ atvand ot houman DNA. & Hiding Ww tort - Inhov mato hidden ty documents by masipulak ra Tho positions of Linas G1 008 ds a data io htm) frles. & Hiding in ro disk space - Heeleng data in unused 07 yexnrvad space. G Nieking Taka in Slo Greuatry— Pata can bo hidden fn the layout ef “code Cr) olechonic haukLs Shoo mio hiding in Images fargo Jrom 16 j ‘norton to maslting and filtoring to. applying’ toom aophtelicahed {magp. pearing dp ] \> Widang lo Nlw packets’ Haddon in packaks transmitted HReough He totou.. FINITE FIELDS @NUMBER THEORY * Nk Then : G& ere ‘ tothe at od pail Diva ly Ans DAs Given too toteyeis “bland “bl , toe. doug Sal ditvidas * How fe an irlager ¢ auch tak b=ae - > Th a didlos b, wo write alb . > Prvasibility Slasoments * + comat Jo Uispralb ¢ then afke fr all ¢. G TH al and ble (thon afe Soy albiard afc , then alebtte Vett. ly eee “C#0 . Ab iPand o only if eafcb “TH [ yw tebe. | 3 )3% + Tao 0 ]ou + fabs ay | 0% Tee ,® Pima Number : > Tb fs an Ywheger Wok can only he dinded | witout remainder by positive Negachtve values of |) haath and t ; Tf in He eat f prime nummbos , Hon [ego on et, a Ts OF | oa Po] whore “each apo, > Relatively Paine Intogots Too Iotoger aeb ora. lativaly. prime if qed lab) =). Fp Js 44 a. pmine 9 dy, The for fF = 4. The prtmes Wis ffan 4 aso 9,8,5 and +. If 94 Ys divbible by ang ase Numbos , it ta pot prme , How ,it Is, dot , 80 4% bs pam. . We Geet Sena ueel(scn) : PON positive “otega ‘Ate “alled tha QCD ef te Non-zeL0 ilegeus of aib iy : Ly &: B al Uivisoy af both. ab. Gr pny divteor ” of both a £6 ts aleo o divisor $4, => Sf a ge b shiter Do Common factoos - Moy atc weletively prime .FQ) qed (tyos 1081) yoo = foatx | 4 992 : ged (rot , lost = goo x 3 + 15 4e4 (899, 115)) goo = Ws ka + 92 ged (15,99) Palen? is = aanl +98 ged (22 29) ga eater =, O88 Fo. 43 (a2 )) ? 2, god (tqos 1921) = 28 y | * Finite Tiolds : A od with rite numba of elaments . 3 Car fo chown fiat to odor of a a. finite frold must be a power dia pains p?) | cctasm'h! Pa jie inhep ' S Finthe! Meld 4 ordeal i cain’ bo Ln using ast timotte med ps 2 : @ TE can’ be’ ahown ‘that’ Pini be Protas have oxdox Pp), usttenasep Ba prim. | os QTE ean bo, shaon tak Por each gate p ard cach peaifive Inhogoe 'p', thaw 2s | : Mo Nomex pheem ) a Unique -femte Field f own p?, @) Let GF Lon) wpramt a finite Pol) cf ordoy . p?.Le Const ri ctivn > eaele tee a tilt GF Cp) = Dans tee "tap aX + Lt ayy Go | arezey Fg) GF Us) = Ge (ak) = farstbxs ton 4d lL abierd € zy. G Groups > fh group (@) ts @ don- ~etophy aol togota with a binary operation (4) such «fat the following propathes aw gatistrod | v. ‘Asbootaivity Cod b) & a = has (na) For al? a,b,c OG, W Tdentty | than fs an oloment © € G auch that axe seta . For ale (oc eng! () Uverses | For each’ clomonl a 2 Gr, ‘Rome Bs an clumont be & euch. tak axb'i: bea =e. | | a ae gs aoe eee | deb tba Combutanvy “thon at cablled an | “Abelian @soup", 9” ee ee | A Ring RB a non-emphy eek with | feo Bina, operation, » addztion @ rmultipladtioo , Bch that | for a abe eR. |& Poly tomiad Rergs : A polynomial OVO. commutative rng b Ban axprosion f fe form , FU) = One® ge HAE Oy Addition gf pobppornial 2 $OO4 qs) = bm xP 4 TB ge ral @atho) x04 (@1+b,) ¥ + Goths), Nalliplicaitn d) polypomiels 1 AS FO) geo = Cy cnn ce toe hese, ex = 2 at by. MHypek * Modular Asttimalic + DARL nner In asthmatic, toodulo Se oe ig me YIN. Fa.) Wy mo) {a Ios Pepalie Wola titanic polis 0) {le toed n) +, Lb tod » wed. n=. Caeb) melen . (le mod 5) ~ Us mod J} road = (@-b) med n () (la red 6) ¥ Cb mad 55} med = (axb) mab ov.| | io, [ee 55 mab ae = 5] ee ee ~ Modular Espenentiatton : Yt tra type of
Ak3B=h Sit Sot med Bat] Eg) (¥65 tod a. = ts /to = [yt +0823 “Slut eta = UFbY ites HEY at, ce V#ES; todd TD = C Fa) bee rod ag (53) ped a! Bl Ned 97! lo5 \o oe at eh a9 tae)’ mod AF =» (29” Ipod ony rood 97 => > => (195 %tn0d aah 18. mod -a9 > > or Cau mod oF AG mod ge TH ed 13 ; b BP” mod 97 = 2EaIkh mod VFmo ood BB. : \ : Ss -Qeyiee wes we? ana! Womed 53a = tt. WP med 53 = 11 med 53 = Is. WY nod 53 “= tue)" mod 53 = (mod sa)A> teed 53 =) 15% Wood 53 = 225 mod 53 = UB. ns {7 ppl Ba 5 UD)” ined 5a - ADE baipey pay 42 (Sito) "2 ye 139 rédins 7 = (0. : 13 Cp we thee nee! PTB tasp* Euclid's Algosittine » ‘> Aigpsitfime to find tha @eD of -too positive intagors . G @eo of foo tntagars Ys doped ax 3 An Tohegen e & called qe Cab) th fe following too Conditions ‘hold : ®wela Vv clo ® for any comomnen Biviess a af&b,dle. RD G@ep Cos 20). lbs = G4an +5 qed (20,5) oo PVA KEY, J & Polynomial Avimate : | A polpomal ‘ t8° an “exprenron ef tha form OnX” FO, 4 Faye +O for | Some. Don Rawat v ‘hoger Dd. We whan ag # > , “Hfe tt te called as poly nomtal 4 pe " Le tf a= 1 than the polynonital 3 atl fo be Tonic « ; G Th d=0 , ‘ion we sitply have a constant Renown as a constant polynomial ,* Fermat'e Thora * ‘uh pts prim @ a sO positive ikea not divisible by p, ion ab '= | mod Cp)” Fox mats Little Thoewem t WTR BB prtme & ‘ad ts an integer not divisible by p. thon 44 ® ‘And fox ere inleger a: a@ = altel p) ®) wofud in Pebice way-(R5A). 2 * Euler's Theowwm : Fox every ‘a! and ‘n' Hat avo rly pring: > = at 2-1 Cod, 0) = Bx, xa, Keay : pax, ™od.n), Cars,tnod D)e x peanmed] The ad 8 2s a. poumutaion of B ; Ao !| Texting: Ba Pama &_Poopottios » | © TH p 2 prim G a ts 4ve tnteges ows fon Pi tfon oF wed pian! “Fh and’ oka TH etthor & Mod P=t Cor) wod pe -| andi pe p-l. ® sob P be a prtme futher raat fan 2, Wwe ean ther writ p-t = ok 4. wtih kro ,q odd. | Bodie Redes aan Rup pane aed (ijn) #1 j-Clvon a b, thew extte erackly ona @oludion (p09) mo) +8 the strulkancous congrucne uno. antain, opodétions « % = a(mod m),- 1 = 6 tml n) Fa) Stabe CRT ond Pind x oy he fe ook of | congo equations sing Wee Xz Ke . Dy) % (rool). we: me m=3, ms 5, n3Ft " " Stops’ find WN + Lied NiN2.NS & dt,da,ds Nemexno%n3a ak = BXx5XF 3 . Ne nixnaaAng wre Ny 3M : die wood 11 Xzc ae PCa. xnardot ]TH Nee Worf wos Ing Nae Ning + Moo, 2 Why, = tof [ure 2] [te or | 2 5 Ayes tod nt, do: te woh no |. 42,7 tg toed ho wee : Wo] 2, + we oA 2 te tond 5 < “a tod “1 eal [ Bath faae 1] Honea, «= (OLewindt) + (2 %W2%d3) 4 (osnia cdi) = (onopna) 4 (ar21K!) 4 (2m 1) = Sho +6234 30 223, wed tos" yi bea + dioowhe Logetiyas + & Fundamental bo a pumbor 4 hie Bai Dpprins indvbing Ditto Neiman hay Orcharg @ DAN “The powou. of an intogon tocdiulls i Evox a and n thal aw vreledively pwma ! a) = 1 (ind n) ' toro (0) ~7 tularb qunlionl. function, ~ for room genoa) ex proston : a” = 1 (md 0),Fa) Considler “tre pours 44, modulo 14 “= tod 14 Pos ka = oat +i 2 t Conod 19) 18 = 8h3 = 18K+1 = ¢ (med 19) TH sayot = (2b x47 = & Cimed [@) aD = theos = 284 nlatn = I (mod (9) | 3” = 1 (red 14) & The logasttin of a muon is dofinad to be He powor 4p whitch some pasitive base must be yaiscl tn oder be eqpol fa twmbar. for base x ard fora Valuo yt yo oy og Prrvparbios of logaxétirn : o yl) =o w yx =! ca fea bp) = Og 4 Log W Boge ty)> 7 ge) + Lind p) , of tS bed of (inp) pct sled ' b b \W \ Ls Ths exposank 2s relaxed ty ax tea. Ascacto [epsitins
You might also like
Ns Unit 1
PDF
No ratings yet
Ns Unit 1
11 pages
Ics Unit - 1
PDF
No ratings yet
Ics Unit - 1
46 pages
Nis 6-16
PDF
No ratings yet
Nis 6-16
54 pages
Os Unit - 5
PDF
No ratings yet
Os Unit - 5
12 pages
Chapter 8 CN
PDF
No ratings yet
Chapter 8 CN
19 pages
CS6701 Cryptography and Network Security
PDF
No ratings yet
CS6701 Cryptography and Network Security
27 pages
Cyber Security (Class 1 - 16) (BCA)
PDF
No ratings yet
Cyber Security (Class 1 - 16) (BCA)
51 pages
DIC Unit 3,4,5-Compressed
PDF
No ratings yet
DIC Unit 3,4,5-Compressed
74 pages
Iss Notes
PDF
No ratings yet
Iss Notes
16 pages
NS Assignment 1
PDF
No ratings yet
NS Assignment 1
7 pages
Screenshot 2024-05-26 152124
PDF
No ratings yet
Screenshot 2024-05-26 152124
40 pages
CSE Cryptography and Ntwork Security Unit-1
PDF
No ratings yet
CSE Cryptography and Ntwork Security Unit-1
33 pages
CNS Unit1
PDF
No ratings yet
CNS Unit1
23 pages
Adobe Scan 16-Dec-2024
PDF
No ratings yet
Adobe Scan 16-Dec-2024
13 pages
IGNOU-MSEI 025 Page 21-30
PDF
No ratings yet
IGNOU-MSEI 025 Page 21-30
10 pages
Adobe Scan 09-Dec-2023
PDF
No ratings yet
Adobe Scan 09-Dec-2023
25 pages
CYRPTO Model QP Solutions
PDF
No ratings yet
CYRPTO Model QP Solutions
58 pages
NIS Notes PDF
PDF
No ratings yet
NIS Notes PDF
10 pages
ISS Unit 1
PDF
No ratings yet
ISS Unit 1
20 pages
IGNOU-MSEI 025 Page 1-10
PDF
No ratings yet
IGNOU-MSEI 025 Page 1-10
10 pages
Information Security: Department of Information Technology University of The Punjab Gujranwala Campus
PDF
No ratings yet
Information Security: Department of Information Technology University of The Punjab Gujranwala Campus
7 pages
Network Security Classnotes
PDF
No ratings yet
Network Security Classnotes
17 pages
DIC Unit 3,4,5
PDF
No ratings yet
DIC Unit 3,4,5
74 pages
Assignment Cryptography
PDF
No ratings yet
Assignment Cryptography
15 pages
Cnsmid
PDF
No ratings yet
Cnsmid
12 pages
Is 1
PDF
No ratings yet
Is 1
13 pages
Unit-2.. E-Commerce
PDF
No ratings yet
Unit-2.. E-Commerce
17 pages
Unit 1
PDF
No ratings yet
Unit 1
45 pages
Unit 4 2 Mark Questions With Answers
PDF
No ratings yet
Unit 4 2 Mark Questions With Answers
10 pages
Network Security
PDF
No ratings yet
Network Security
9 pages
Ns Unit 2
PDF
No ratings yet
Ns Unit 2
18 pages
CSDF Unit 2
PDF
No ratings yet
CSDF Unit 2
34 pages
Unit 5 Social Network Security
PDF
No ratings yet
Unit 5 Social Network Security
27 pages
TECH2400 Week 04 Workshop
PDF
No ratings yet
TECH2400 Week 04 Workshop
49 pages
C&ss Qb2marks Ut2
PDF
No ratings yet
C&ss Qb2marks Ut2
6 pages
Security Practices Assignment
PDF
No ratings yet
Security Practices Assignment
14 pages
Is Notes
PDF
No ratings yet
Is Notes
9 pages
AC
PDF
No ratings yet
AC
51 pages
Ev 5 2023
PDF
No ratings yet
Ev 5 2023
28 pages
CNS Unit-2
PDF
No ratings yet
CNS Unit-2
47 pages
NSC
PDF
No ratings yet
NSC
5 pages
Network Security Using Cryptography
PDF
No ratings yet
Network Security Using Cryptography
11 pages
CSS Topper
PDF
No ratings yet
CSS Topper
135 pages
Css QB
PDF
No ratings yet
Css QB
17 pages
File Transfer Encryption
PDF
No ratings yet
File Transfer Encryption
38 pages
Network Security
PDF
No ratings yet
Network Security
63 pages
NIS Manual
PDF
No ratings yet
NIS Manual
49 pages
Comptia Casp Certification: Cram Guide
PDF
No ratings yet
Comptia Casp Certification: Cram Guide
9 pages
Network Security
PDF
No ratings yet
Network Security
34 pages
09 Security
PDF
No ratings yet
09 Security
51 pages
ccs354 Network Security Important Questions Answers Notes
PDF
No ratings yet
ccs354 Network Security Important Questions Answers Notes
46 pages
Unit5 Pcs
PDF
No ratings yet
Unit5 Pcs
16 pages
Assignment of NIS
PDF
No ratings yet
Assignment of NIS
37 pages
Sic Assignment
PDF
No ratings yet
Sic Assignment
9 pages
NIS Assign 3
PDF
No ratings yet
NIS Assign 3
12 pages
Harsh CL Notes
PDF
No ratings yet
Harsh CL Notes
39 pages
CNS Assignment 1
PDF
No ratings yet
CNS Assignment 1
21 pages
NSC Assignment
PDF
No ratings yet
NSC Assignment
12 pages
Aids Cia 1
PDF
No ratings yet
Aids Cia 1
3 pages
Course Paln Aids
PDF
No ratings yet
Course Paln Aids
15 pages
A Novel Approach For Visual Analytics of Anomalous User Behaviours in Big
PDF
No ratings yet
A Novel Approach For Visual Analytics of Anomalous User Behaviours in Big
1 page
Slip Test
PDF
No ratings yet
Slip Test
1 page
Project List Overall
PDF
No ratings yet
Project List Overall
48 pages
Letter Head Format-5
PDF
No ratings yet
Letter Head Format-5
1 page
3.2.2 - Seminar - Workshop FRMT
PDF
No ratings yet
3.2.2 - Seminar - Workshop FRMT
16 pages
Cse 3.2.2
PDF
No ratings yet
Cse 3.2.2
6 pages
3.2.2 Final
PDF
No ratings yet
3.2.2 Final
9 pages
Ome753 Se Unit-5
PDF
No ratings yet
Ome753 Se Unit-5
16 pages
Unit Iii Models and Theories
PDF
No ratings yet
Unit Iii Models and Theories
78 pages