IS Notes
IS Notes
Types of cipher:
1. Block cipher: In this a text block is transformed or replaced with a cipher text block instead of
single character transformation.These are again divided in three categories:
S-BOX: Substitution is performed at bit level. It contains three things:1.Decoder: Decoder transform n-
bit into 2n bit structure.2.P-Box: P-box perform permutation on this decoded data.3.Encoder: The
encoder is used to transform the permuted data into cipher text.
Product Block: If we want more reliable and secure cipher then we can combine P-Box and S-Box to
create new cipher, known as Product Block.It applies both the processing on the plain text for
transformation into cipher text.
2. Traditional cipher: Most of traditional ciphers use single alphabet or character as a unit for
transformation. Means one plain text alphabet is replaced with one cipher text alphabet.These
are again divided in two categories.
Substitution Cipher: Replace bits, characters, or character blocks in plaintext with alternate bits,
characters or character blocks to produce cipher text. A substitution cipher may be…
• Monoalphabetic cipher: A single alphabet is used to encrypt the entire plaintext message. For
example, if the letter A is enciphered as the letter K, this will be the same for the entire
message.This is an easy method but to find the key is very difficult so this is a good cipher.
Example: Plain text: Cipher is an algorithm. Then Cipher text: PVCUREVFNANYTBEVGUZ
• Polyalphabetic Cipher: A more complex substitution using a mixed alphabet to encrypt each bit,
character or character block of a plaintext message.In this Vigenere square or Vigenere table is
used.In this table multiple alternates are existing for single character.The final alternate is
depending on the character and the keyword to encrypt the text.for transformation a key is also
used and this key is different for each dataset. For example, take a plain text APPLE and the
keyword is RIGHT, so now A is used with R, P is used with I, second P is used with G, L is used
with H, and E is used with T.
• Caesar Cipher: This is very simple. In this each alphabet is replaced with its upcoming third
subsequent alphabet.Example: A is replaced by D, B is replaced by E etc.
Transpositon Cipher: A transposition cipher rearranges the order of letters or blocks according to the
specific algorithm.In a simple columnar transposition cipher, a message might be read horizontally but
would be written vertically to produce the ciphertext. . For example, using a columnar transposition
cipher with the key "2 1 4 3", the plaintext "HELLO WORLD" could be encrypted as "EHOLLLWDOR".
• Polygraphic cipher: A polygraphic cipher performs substitutions with two or more groups of
letters. It is similar as substitute cipher, but in this plain text blocks are replaced with cipher text
blocks instead of individual letters or characters.
• Premutation cipher: Permutation means rearrange the order of characters and alphabets in
plain text. This is quite opposite of substitute ciphers. In this the plaintext is rearranged in any
possible order
Firewall
• A hardware/software that monitors the incoming and outgoing traffic based on predefined rules.
• A firewall in an information security program.it is similar to a building’s firewall.it prevents
specific types of information from moving between the outside world, known as the untrusted
network (for example, the Internet), and the inside world, known as the trusted network.
• The firewall may be a separate computer system, a software service running on an existing router
or server, or a separate network containing a number of supporting devices.
• Acts like a barrier.
• Host based (software) and network based (hardware)
Application Gateway
• The circuit gateway firewall operates at the transport layer. Again, connections are authorized
based on addresses. Like filtering firewalls, circuit gateway firewalls do not usually look at traffic
flowing between one network and another, but they do prevent direct connections between one
network and another.
• Advantage: A circuit-level gateway acts as a proxy for hiding the internal host from the serving
host.
• It avoids the filtering of individual packets.
• These gateways are inexpensive.
• Address schemes can easily develop.
• Simple to implement.
• Every application does not require a separate proxy server.
• Disadvantage: Circuit-level Gateway does not filter the individual packets
• Frequent updates are required
• Within the firewall, it does not offer protection against data leakage from devices.
• For using Circuit level gateways the TCP/IP stacks are mandatory to be modified by the vendor .
• MAC layer firewalls are designed to operate at the media access control sublayer of the data link
layer of the OSI network model.
• This enables these firewalls to consider the specific host computer’s identity, as represented by its
MAC or network interface card (NIC) address in its filtering decisions.
• Thus, MAC layer firewalls link the addresses of specific host computers entries that identify the
specific types of packets that can be sent to each host, and block all other traffic