0% found this document useful (0 votes)
41 views17 pages

Network Security Classnotes

1. Structured ciphers divide the block of data into two halves at a time. Non-structured ciphers have a more flexible structure allowing for easier parallelization. 2. Synchronized stream ciphers encrypt data one bit or byte at a time from a synchronized key stream. The key stream must be synchronized with the plaintext for the receiver to decrypt it properly. 3. With symmetric encryption algorithms, the secret key must be securely shared between communicating parties before encrypted communication can take place. This is typically done through key exchange or distribution during initial setup.

Uploaded by

rrssa108
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views17 pages

Network Security Classnotes

1. Structured ciphers divide the block of data into two halves at a time. Non-structured ciphers have a more flexible structure allowing for easier parallelization. 2. Synchronized stream ciphers encrypt data one bit or byte at a time from a synchronized key stream. The key stream must be synchronized with the plaintext for the receiver to decrypt it properly. 3. With symmetric encryption algorithms, the secret key must be securely shared between communicating parties before encrypted communication can take place. This is typically done through key exchange or distribution during initial setup.

Uploaded by

rrssa108
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

fustel V8 Nom feictl afhes

Bloek cihhes wtich ahe

thot Ad iLe blocks o4 data


fed
thei slhucte
The dus tinc hom is in

Foltl Cphen olig


Stususo ’ fiste Che sttaso hat inveles
half is htocated
the imput block into
hound uti'le the half Alonainß tincdagod.
mehagod
The fhoeused half ç them Comdind with he
half and

the data.

Exale The Stendasd ( DES) e clasi


feutd cifhs.
DES diices the inpad bloek tuo 32-bit

half
charartes
’Ceate ist o al he lain text
he 8-bit bia fot
olain text to Acíi omd
rito tn halves.

e sandom binany kay l k! and K2 ) of


tent
the kalf the
fos the ho sounds
fiut
Ri and Ki as

(L2) ad ayt kal! (K) afkes hond


) Now the neuhalf
as fallows

Suond Round of eney iom

6) Noy the laft half (3)


half (Rs) aftes
homd fllous.
L3 n2
ciphea tent.
hon s je d foan oleeybtion to Aibive he
text fron the ci,hen tent
Non- feistd Ciphen
homddlo not
SthucL follou
No feislal fhen Ahe othe

substtideó. pesmtatue
ahangemeids , such
Ncha seN) clate

manipulatad imulbraguly
EYamde Adyameed Eneyption stomdad (AES)
Campaviiom
both achine
Secuity Fais tel and mom teistd ciphes Com

saleific gtucte that


2. Stutuse flstd Cikhens have
inoloes diidinga he block nto tun
Oont half at time.
mohe flxibb sthuetng loussg
Nom- festel Chhe hare a
fos
lata bloch
be more shaig ht faannd to
and
alleu foh eastea penalllralis.
fst Ces, sucd as AES, ofes e4fiiat
lon heeluhe and [oftwae
in boh keduahe
Aovn No 2.
lasses
at
that a digital data team ome bit or yteclases
maun
4me etagosid he seeei
Symchoi aten bevem dlmdos and

StAeam Cbhess he
Synchonized ith the
Aoxt oh eihes text
One ky steam to the

festue The kay stAzarn genetated brdafen denbay


ciphea the gendeh Gmd
Aeeuive enust he amchgrized tuith the sane fnitfal gtate.

Exomlo A wed
algonitom, which used
Global ys tem for ovo bile Cornmun' cal ) fos
taa ffic data.
Sthean iphes
&eom
the
steearn

daperdat on hAaious paxta


ihes txt. the
nchaoiatuón is maint alned witin
e

festuy The hey taeam Aemehatôn adatts to he


Conditonp of the Commumi Catusn channel 02

ciphes tet, it mohe flesible Cn

exon
Fxanee The Rc4 ( Rivat ciphes 4) adgotithm
8elf-aynchoizimg theam ccphe
of

lohotools
estion-No-4

Spmmebie Gyptbat
Single-hag paivete

dghtom.
algoitbms
Comhtibay
wnth

ky distibutia The seeet


must be sucuay shead
betuem the comni cang ah ties.

ornonta o4 data,tch as in data dtoage


and eue commentation chael nce Gecwne huy
establ'shad.
(wchage has belon

keomhlas
onaldes JES, AES, and 3£S
publ'e
kby Pai
a hat 0f neys- a publi ky ornathesatall
fok These hys
hlated , but it is infeasibk to olosie
fiom other.

Comploxity of mhntal ohesafins


iirobrud.
ky
mst be kitt corfeletal.

kuy ecdange(f
( in T2s/ s.) aitl
igitd aipmatae and scusi'y
Comanicatin bohee

une
Aygter)
of symmie ancsyton afsitomns,
6es tiom - to5
Secu lecthoni Tkansacton. stamclesd
Eleethonic thansrta å(ST) a
ohatocal firaneial
Camndusted ove he nenet

viba andl mastaCand, to emhenee the


blin hanatim
ncluds
of SÉT Joho tocol
Alis digitd cstfiatu to voitr
joaties molt in a thanast
denity of the
eluhe commmicataon chamnos.
eene socket ays (sSL) os

(ii)Ju sijmatuaes ’ SET adual- matue omehansm,


thu Aaynent infosnadon bith theis Jotiat
he ohdes
and tte meschant fnfosomadua
thed phivak
acts
oneschants ssrer ad
(Thomsaton fhocu ASET hang actabn lotoCSS
the ifotmat mitiation
Ond
of
melehan

digit
tohoteet the
hueh casd
cae
dlmaitive imtobntnuek as aredet
nfidantfalsty ot sinai
Shnbe Omd hans astgn ammount.

(vii) alles sET ont the e o4 digital wallit


cUtifcatas
based
botaddeses, dutinattn
Jf d
aumbes method
based pockek
on pltus
onoelel
rl asr of byes melosk the at atis oheskuado)
olecision omakes
baled hen block
om allo to
Or funetisnality
ad date f pocket tndolea Exombnu itbuing
Fitsalls cket 1fo
polivg,
Umautostzed
coriballng ond
aBuch nolohs extunl mgafe
tHial y looten Gnd netwonh betem basier
tablish es to
baed thaffie
ad
Maintai% a
CaTmectib Gdmalts doei ong baud
Context

Ahaffie.
Oposatiln
methal Examiney of caeh Jpochet
the stt ad atlibutes o4
Comtex aw

the stt, Commetusn

Uxtumal saguuta behalf of


libnt

methd
it mohe 8luhe but
slower.
Hidy itmal
Hidy intmal metnh dtails
det
Aolvantays
addt Hond pcalo
Auestiom- No-t

Malicius Sote
Maliciow, oftune maluehe,
dus ifned do has, extoit

vasios fosonß
aim nauthoied access, steal engitive
ohaatos Oh Cuse

that Con sylatt themehes


Ond
apead oHea files
o othes Contuteas.
"Thuy ado ttoch hems ehes to eKeeutable Ales and Can be
aclivatd when the infetd tfile as exeouted.
lohmß ase bhgams thad sfiead
acsoLS nelwnks explorti'ng
othes Comptes, lthe
dLeties. to intet
Wuses, Wosng olo not
Q host
ae dleettive bogtamns that othcs to be
but contalns onallclos Code.

of malte thad
entic
hu aakn tha lemand handom
gHon-No-8

that Com
apcifie koy
for DES that

a
that emnaghton
wealh hy
0X FE FE fE FE FEPE FE FE

hat
with 0me ky and wth cmothes
the

These ae fou awhs of &emi- wreele heyy p


DES, lAcl
tn the
Ome
the ai selulle tu ohisina text.
·01 2f 02 1f 01 o£, OX 1F01 1f01 0£ 020£01)
’/oX
01£0 01 f1 02 F , XEo o1 P1 02 FI 01)
01 £o
1FE 01 FE O1 FE O1E, 0XFE 01 FE01 Ff afE 01 )
D(ox2Ro1 PEOO EF16Ef1 , OX EO1FE01 FF 10Ef t 0E )
Thruin Deter tiom
Aalon- No
ys tem (IDS), Cla ificales of

imtuiom datenten
6ui ciouy behaiouh.
artiitie o fo maliious
doteet

sapord to deeusity Pncidont

Clauifation
0 Netk mtion Moni tos nitsk
ddehiom SystemlNIDS )
sigmaties that ay
imdrat ntubion
TH Can diet atacla that
hats
Rmdiidal doies
toi tors actities buch as file tagity &ystea cally
Onmd af pliatusn effatie fo dotuting
loal tlache and ancmales Oon
foeifie has s.
A oool Bued zDs(IDS ) S It Cobsises
t thet wruld comsistently sesiol at the font end
osotocal
fosoto
cal

enehally Aesides

4md
the tonthusion b morni toimg
the eommniCaton om apiatan

mohe appioaohes to the Rritusion dotectra


Lm the 1DS the hast a4cnt OL system data
Conbimed th motush in totmation

lotavi des eay diteton of Jotenttal

kefose igmfcant danaje ocu and


datbets,
(i) ThAat Pheramtion 8y
Ahuad 1DS Contaibusa t pureatng tvauthoad
wauthod access, elata
amd othes mali cios aeti'thu
IOS chuctial
hob in incicknt
(i) valabe enfoimatisn about the natse

fond lemintaton of JDS


hhoceu
paotocal doelied
I twas
.
intesnt
&uch as
Collab ohatve fot a mayon
yon CAtdit cad Combines
Beeutity
Anasiecad
panties in onlin thamsadluny

cand.
2) Meschat Th buiness oh
nnd
bad he caeet
3 Tsues’ The foranei! ostt tattn that
Cahd to the conal holels

n bekaly of hea melehand.


ol't cand hasactión

ala beten the merehats


websie
he meseha,

domds a
merchaut which auponds by dundmg
auth t he cahdhalde

Aenteatii, The ohlobes % lsues


the cad holde
identiyi
4 Manchat Autankeatn The catdhodla's isnes

Thansactán facytin
thans mision of desitive ln fosmats .
( Thansacten Reguesto The menchant dendk a bymed
th thansastusn otails and he cahelhddese
to tthe

4CCOUnt dtats and

Qthoias code s t

Aecuhes d

You might also like