CSS Ia 1
CSS Ia 1
For cipher matrix with key “occurance ” and plain text “tall tree”
2. Security Attacks
These attacks aim to retrieve the plaintext from the ciphertext or decode the
encrypted data.
Hackers may attempt to bypass the security of a cryptographic system by discovering
weaknesses and flaws in cryptography techniques, cryptographic protocol,
encryption algorithms, or key management strategy
Attacks are generally classified into four categories:
1) Interception:-
❑ It is an attack on confidentiality
❑ The main purpose is to eavesdrop (similar to hear someone’s telephonic
conversation) on the information carried in the message
2) Fabrication:-
❑ It is an attack on authentication
❑ Attacker modifies messages, parameters and other properties.
❑ This gives threats to message authenticity
❑ Primarily affect integrity but could be considered an availability attack as well
3) Modification:-
❑ It means that a party without authorization, not only accesses the data but
tampers the data
❑ This threatens message integrity.
❑ The main purpose is to create confusion or mislead the parties involved in the
communication protocol
❑ This is usually aimed at the network layer and the application layer
4) Interruption:-
❑ It is an attack on the availability of the network, e.g. physical nodes capturing
, corruption of message, malicious code insertion etc.
❑ The main purpose is to launch denial-of-service (DoS) attacks.
❑ The security attacks can be further categorized as passive attacks and active
attacks.
❑ A passive attack tries to learn or use knowledge from the system without
causing any damage to the system’s resources.
❑ An active attack tries to change the system’s resource or disrupt its activity
4.Due to active attacks, the execution While due to passive attack, there is no harm
system is always damaged. to the system.
5.In an active attack, Victim gets While in a passive attack, Victim does not
informed about the attack. get informed about the attack.
7.Active attack influences the Does not influences the services of the
services of the system. system.
4. Security Services
Message Confidentiality − The principle of confidentiality defines
that only the sender and the intended recipient should be capable to
create the element of the message.
Access Control − The principle of access control decides who should be capable to
access information or system through communication link. It supports the avoidance of
unauthorized use of a resource.
Data Integrity − Data integrity is designed to secure information from modification,
insertion, deletion and rehashing by any entity
Integrity involves maintaining the consistency, accuracy and trustworthiness of data
over its entire lifecycle. Data must not be changed in transit, and steps must be taken to
ensure data cannot be altered by unauthorized people (for example, in a breach of
confidentiality).
NON REPUDUTAION
Nonrepudiation avoids either sender or receiver from adverse a
transmitted message. Therefore, when a message is sent, the receiver
can validate that the asserted sender actually sent the message.
Likewise, when a message is received, the sender can validate that the
asserted receiver actually received the message.
AUTHENTICATION
The authentication service is concerned with likely that a connection is
authentic. In the case of a single message, including a warning or
alarm signal, the function of the authentication service is to persuade
the recipient that the message is from the source that it declare to be
from.
5. Security mechanism
6. Eulers
Calculate Eulers totient find
i) Φ(11)
ii) Φ(240)
iii) Φ(49)
iv) Φ(10)
v) Φ(343)
7. Euclidean Algo(numerical)
8. Playfair cipher(numerical)
Plain text = “why don’t you” , key = “keyword” construct play fair cipher
Encrypt the given message using ceaser cipher key = 7
Msg = The house is being sold tonight
Plain text = “The key is hidden under the door” , key = “domestic”
9. Explain Transportation key and keyless & (numerical)
Transposition Cipher:
A transposition cipher does not substitute one symbol for another (as in
substitution cipher), but changes the location of these symbols.
It reorders (jumbles) the given plain-text to give the cipher-text.
They are of two types: Keyed and Keyless Transposition Cipher.
If the plain text (original message) is treated as the string of bits, thus the
substitution technique would restore bit pattern of plain text with the bit
pattern of cipher text.
One-Time Pad − The one-time pad cipher recommend that the key length must be as
long as the plain text to avoid the repetition of key. Along with that, the key must be used
only once to encrypt and decrypt the individual message after that the key must be
discarded.
Caesar Cipher – (eg explain)
Playfair Cipher − The playfair cipher is also known as Playfair Square. It is a
cryptographic technique used for manual encryption of information. This scheme was
developed by Charles Wheatstone in 1854.
The Playfair cipher was used by the British army in World War I and by the Australian in
World War II. This was applicable because the playfair cipher is perfectly fast to use and
does not demand some specific equipment to be used.
MODULE 2
Encryption algorithms are divided into two categories based on the input type,
as a block cipher and stream cipher. Block cipher is an encryption algorithm
that takes a fixed size of input say b bits and produces a ciphertext of b bits
again. If the input is larger than b bits it can be divided further. For different
applications and uses, there are several modes of operations for a block
cipher.
1. Data Encryption:
2. File and Disk Encryption:
3. Virtual Private Networks (VPN):
4. Secure Sockets Layer (SSL) and Transport Layer Security
(TLS):
5. Digital Signatures:
2.RSA (numerical)
3.AES (diagram and one line explaination explain size and explain key)
After all these rounds 128 bits of encrypted data is given back as output. This
process is repeated until all the data to be encrypted undergoes this process.
Decryption :
The stages in the rounds can be easily undone as these stages have an opposite
to it which when performed reverts the changes.Each 128 blocks goes through
the 10,12 or 14 rounds depending on the key size.
The stages of each round in decryption is as follows :
Add round key
Inverse MixColumns
ShiftRows
Inverse SubByte
The decryption process is the encryption process done in reverse so i will
explain the steps with notable differences.
Inverse MixColumns :
This step is similar to the MixColumns step in encryption, but differs in the
matrix used to carry out the operation.
[ b0 ] [ 14 11 13 9 ] [ c0 ]
| b1 | = | 9 14 11 13 | | c1 |
| b2 | | 13 9 14 11 | | c2 |
[ b3 ] [ 11 13 9 14 ] [ c3 ]
Inverse SubBytes :
Inverse S-box is used as a lookup table and using which the bytes are
substituted during decryption.
4.DES
Data Encryption Standard (DES) is a block cipher with a 56-bit key
length that has played a significant role in data security.
Data encryption standard (DES) has been found vulnerable to very
powerful attacks therefore, the popularity of DES has been found
slightly on the decline.
DES is a block cipher and encrypts data in blocks of size of 64
bits each, which means 64 bits of plain text go as the input to DES,
which produces 64 bits of ciphertext. The same algorithm and key are
used for encryption and decryption, with minor differences.
The key length is 56 bits.
DES is a block cipher that operates on data blocks of 64 bits in size. DES uses a 64-
bit key 8 × 8 including 1 bit for parity, so the actual key is 56 bits.
The S-box substitution is the critical step in DES. The algorithm's other opera- tions
are linear and easy to analyze.
The S-boxes are nonlinear and, more than any- thing else, give DES its security.
The result of this substitution phase is eight 4-bit blocks which are recombined into a
single 32-bit block.
Define Non-Repudiation and Authentication as a security service and show with example
Nonrepudiation is achieved through
how each one can be achieved.
cryptography, like digital signatures, and includes other
services for authentication, auditing and logging. In online
transactions, digital signatures ensure that a party cannot later
deny sending information or deny the authenticity of its
signature.