CNS - A2
CNS - A2
Karjat - Raigad
ASST CrNMENT-09 Page No. :
Date:
KGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCERGErGOEKGGEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCE
class 3 TE
Roll No 32
Subiect CNSE
CNS
DOP DOA Rernark Sian
K.G.C.E.
Karjat - Raigad
|PageNo. :
Date :
KGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEVCCEV
weRYOCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOCEKGCEKGCEVO
KGCEKGCEKGCEKGCEK
KO
re-Tound
transformatton
Round1 key
Expans on
Round 2
Round N Kn
shift RoWs
SubBytes Subßytes
shift RoWs
MX Columns Add Round key
Add Round key MX columns
shift Rows
SubBytes SubByes
shrft RoWs
Add Rou nd key Add Round key|
Encoyatton
DAES conctders each block cs l6-byte(4 byte x
4 byte 129)artd tna column-matar arsaqernent..
bo b4b2b12
b1 b5 b9 b13
1
b2 b6b10 b14
b3b+bi1 b15
e)sub Bytec
-Tn this tten each byte fs cubstttuted by_another byt
a)shrt Rowso
roW îe shitec d partteular numlber oftmec
Each
>The Pirst oy îs chtted
not
bo b b12 bo b4 b8 bl2
b1 66 b9 b13lb5 b9 b 13 bl
Karjat
K.G.C.E. Date
Karjat- Raigad
6)Mx Column.s -
KOENOCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOEKGCEKGCE
KGCEKGCEKGCEKGCEKGCE
le2
|23231 3
1
b2
b
3I 21 Lb3
6)Add Round keys
Resultant autput aE prevlolr stage fs xoR-ed
Wth the carrespand?nq aund key
Platntext
SubBytes
Round 1 shiftRoWs
MIX Colu mns
Add Rou Round key (ktU
nd Key4
inher
key
Last
SubBytes
Round SubBytes
Add Round keye ROund tey
Ctpher Text
- After 4hese ouDd.s 129 bits
all
af encrypted
data are qtVen back s autput.
-Tht:prbces 1sepeated uttl all the
tn be enypted
data
underqoes thts piocesc,
proCess
Page No. :
K.G.C.E. Date :
Karjat - Raigad EKOCEKCEKGCE
CEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKOCEvorEe
EKCCEKGCEKGCEKGOEKGCEKGCEKGCEKGCEKGCEKG
ecTVnton undane
lo
stage.cthe Tound.s can be eactly
oThe
stage.s have an appacíte to ft whtch
ac theSe
rtVerts the chanqe:
when perforned the 1O,12 ar 14
122 blo ck aces thTolah
Eacb
on key size
round.s cepending a
af decsyptian
each rauDd
ca) Sfaqes af
fallowS -
> Add round key
>TnYerseMX ColumD
> ShRoNs
TDYeme subBrte
> encryptian
procese Is the
eThedecryptton tn r yerse.
done
Dreces
5) TOYerce MixCalumns to Mix Columns ctep tn
stmtlar ured to
-This sten îs the matmx
encryptor but differt în
aperatton.
Carry aut the fs usec
îs the matx
muttplicatian
- Matix atep
nf thic concta nt
- The autput values anda
of ald
multtpli cattan
nnatix 14 I| 13 9 co]
13]
Cbi]= c21
b2]=
b3 13 14
decryptien.
|Date
K.G.C.E.
Karjat - Raigad
wHh c StTHable
e xao (GCEKGCEKGCEKG
RSA algarithm
GCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGGEKGGERGGERGCEkGCEKGCEKGOE
2)Explatn
-ATHEORY c a publtc key encryptton
alq ontthm as the moct
GORSA constdered
and
fechntaue
af encyptfon.
secLITeWay by Ryect shamr and
) WNas nyented by RSA
n veay 194 and hence named
Adleman
algethm.
ollowînq featungs
holcls the
G)The RSA algortthm th
a popular exponentiattan
-RSA algox?thm i
BALCoRITHM
RSA algothm uer the followîng procedure to
Loenernte publte and prtvate keyci
C1) select two large prine numberspand q
)Multply these numbes to fnd n=p X
where D fs called the modulus for
encrypttarn and
decryptten.
)Choose a number e less than n such that
n Îs relatyely pitme to
neans that e and (p-l) X Cq-) have ha.
Commen fatar except 1 Choose e&uch
that 1<e<Cn)e s ortme to Cn).
qcd(e,rd (n))=1
K.G.C.E.
Karjat - Raigad
Page No.:
Date:
voeEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGGEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEVOCEVOcE
Ecnunttan
1)Convert the platnte xt mes. M toto an
toteqer m, where o<m <n
h) Encrupt messcge using
Cmad n)
pabltc key :
)Relteve ciphertext c.
) Decrypt ciphertexdt ustng pvate key
NOCEROCEKGOEKGOEKOOEKOCEKOCEKGCEKOCEKOCEKOCEKGCEKOCEKGCEKGCEKGCEKGC CEKGCEKGCEKG
CEXAMPLE8 A ute.
-In a RSA cryptotystem,a paTticipant
p=13 andq=14 n
4wo
nenerate
prtme numbhecs
her pubc and ptvate key . TE
key.
Soluton
Nyen Pime numbers ip=l3q=14
Publ?c key 35
Sten. b1
01 :p=l3and Ia=|4
sten 02 Calculattng n: D=pXq = 3 X 12
n=21
Step 03.t Eulers Totient functon Cn)
n)=Cp-1) x q-)
12X 16
GCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOCEK kGCEKGCE
Step 2 the
Server yertfre.s USer
The Authentcaton
stng database cnd 4hen
tte
access rahts
(nantng Ttcke (TOT)ana
prnv?dec a Tcket
sesston_ key. The reult are encrypted uain
the users passWerd
D1IMITATTONS
Kurbero.s 5:0 addre sser
severl
-A.csLuDes Norkstattonc unerabiltHes
are cecur.
K.G.C.E.
Karjat - Raigad Page No. :
Date
acKGCEKGCEKGOEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCE
4) ts
Whoat PtrealL ? 1Rst out
a ts vatoUS
aTchte cture cnd explatn any ahe o 1
AFLREWALL
)A renall ie
ts stmply aproqTam ar hardware
dlevtce that lters the inforroatton comîng.
though the nternet connectton into_ yaur
YÎYote netWork ar cormnputer ysterm
2) Tt also lters all traffte between intranet
and extranet Nhtch runs thOLah tt.
3) The matn puXpo.se is to keep attackers
though
autctde 4he rotected envronment
e)Tt ?s a banier place betweer îneider and
nutstdex netwark to prntect atnantsattan
from hackers.
eFTREWAI ARCHTTECTURE -
a)ArrNall sa kind f
referencemonitor. AlL
network traffic pacces through rewall. A
fArewal is kenttsolated and cannot be
mdtPed by anyhody, ather than admântshato.
)followna a cammen architectal implement
attons of reNalle.
()Packet fltertoq crateway
(tUstateftu) TInspectton Phevallc
(T)AppltcatPon Aoxtes
v) CruaTd.s
(V) Personal ftrewalls
KGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKOC KGCEKCEK
- No contfqu mton
pITtected
change Dececcay to the
Norkstattons.
(3) Dicodva
ntaaec
-Packet Rlertnq freNalls atfere least
-Nlo screeningof secuft
packet
Cormplex pcylaadevatlable
reÑall_palfeler are di£ftcult to
Iroplernent usihe
filterinq rulec alone.
C.E
Karjat - Raigad
Page No.:
Date :
GExnlaîn DiHe
Hellman Key
cKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOEKGCEKGCEKGCEKGCEKGCEKGCEKGCE
exchnqe alqotthm
ATHEORY(INTRODUCTION3
TWo parttercan aqree ona
key ustng this ymmetic
techntque
(2) Thic can be then
sed Por encrypttan
decrypten.
(3)Thic algcithm can be only foY key
used
aqreement, but nat for encryptioh ar
decnypticn.
e IH Ýs based an
mathemattcal otnctpler.
6ALGORTTHM -
)tty and Bob aaree upon 9 laqe
Alfce
pYtme Dumbers - n and a Thece number
need not be secret and can
be shard oubicly
C2)AIfce chooses another lanae random number
x(prtvate ta her) and calculates A Ruch thati
nm Page No.
Date:
K.G.C.E. KGCEKGCEKGCEK
Raigad
Karjat -
upon 2larqe
ptme
end Bob aqrce
6)Allce
6CEKGCEKGCEKGÇEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKEGCEKGCEKGCM
number
Bab
Allce
X=3 y=6
A=9*mod n B=grncd n
Page No.:
8lpRoCESS oE MAC
Sender Recefver
MESSAGE |MESSACE
MAC MESSAGE
Keylk)-* key(k)-+MAC
|Algotthm MAc Algorfthnm
authentc cnd
Trtearthy checked
ELce i sornethtng
A Kumbho
CEKGCEKGCEKGCEKGCEKGCEKGC
Page No Karjat
Date :
K.G.C.E.
Karjat -Raigad KGCEKGCEKO
ts tn
conditfon
Tce?ver then B. the first
Kk to Message M.
aA Sends the artalnal nes caqe M and
MAC to .
Ca) When B nncetve.s the message also
es kto calculate 1te awn MAc
MAC oVer
me.sscqe m.
Page No.:
6TMPLEMENTATIAN SCENARTO.SS
cerDato o Pass WOYd Storage
-When yoL clqn up for a webatte and create a
password Instead t unc youY passWoe
thmugh hash functton and etarec the hached
|Date:
K.G.C.E.
Karjat - Raigad KGCEKGCEKGCEKG
No Rejedt
Hash Functton
|Message key méssge
equa
MAC val ue Hach functon
Accep+
Send Message and
me tae
MAC MAC Value
K.G.C.E,
Karjat - Raigad
Page No
eeKGCEKGÇEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGC
GCEKGCKGCEKGCcEKOCEKO
Date :
Messag e
MAC alue
EKGCEKGCEKG
5OmDat
Nme Page No.
Date:
K.G.C.E. KGCEKGC
Karjat - Raigad
entttt es and
wlh all t basîc
KGCEKGCEKGCEKGOEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKCOe
Req uests
key
a
cereete certifrcate
CA
Verston
Certtfcate
SertalNumber
Signature
ratgote Alaortthm
Sdlenffex paramneters
Perfod
ISsuer nae
Not before
vatratyt
Verson3
verston
Yeson
Not after
Subiec name
Subjects
Algorfthm
key Parameters
fnfo key
I&Suer unique
tdentfer
Subject untque
fdenttfter
Extenstons
Algertthm
Stanature paramneters A
oSfons
Venteo
encrypted
archtecture.
KGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEHKGCEKGCEKGCCEKGCEKGCF
8s_protocol
(EExplain ocket Layer.
assL stands for Secuxîty Work
to TCP and 4 does not
(2)sSL ls spectftc
With UDP.
progtamming fnterface
prevides
)8sL applcattor
(API) to applicatfons the applicatton
e)SSL Dproto col s lacated hetween
model and uces
and hransport loy er af TCP/TP
diattal certtffcate and digttal sianature to
Securely communicate between clfent and cerver
macht ne.
protoce|
(eg- HTTP)
SSL Reco rd Protocol
TCP
IP
SSL Proto co |Archttecture
ate No. K.G.C.E,
Karjat - Raigad
TLS
stands for
EKGCEKGCEKGGCEKGCEKGCKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCE
archthectu
Ironcport Layer
to SSL Cecutty
proYide Wtth the aîm ic to
secutty and
Iayer hetween data at the
(3)Al wo web appl? Tansport
Neb cattons
no broWSers Aupport TLS and en3ure c
enVesdrappi ng and tampertng
message of Hhe
|(4)Trnnsport layer
secutty CTLS)
aperate ahove
protocols
the TCe ayer,
use popular
TP
protocals
Decian of thest
Interfacec CAPT) to TCP Applîcatton Praa arn
Ioterfac?ng wth TCP
called zackete" fer "
layer.
(5) Applications are
noN Interaced to
Secuxfty Layer' înstead of TCP Transpot
Cc) TLS te
directty
chnîcally ne sides between
appli catHon
and transport layer,
thct actsr at TCP lcwer
enhanced wth securîty cervîce c.
G) The reason for
popularîn af ucing
cecuty at Transport Layer Tr
simplhchy
Applfcatton
Applicatton TLS
TCP
IP IP
Phystcol Netwerk Phystco Networ
TLS
Page No. :
Date KGCEKGCI
K.G.C.E.
-Raigad col
IPSec proto
Karjat
WORKINE 8
OAuentcatton Nant to communicate
-When two dexîces cother to
they trt authentt cate each
&ecure
theîr oentter
conftm devicec fnoo
Ths preventr unauthzed
tototng the conversatton.
Hhe data
ance authentteated, TPSec encvnto
hetna cent between he deyfcec
tnto a format
- Encryptìon sorambler the data
that ony the tntended can understan
reretpentc
c)Tnteqtthy
-TPSec encures that Hhe data hasnt been
alco
tampered math duYfha tanotssion.
Tt uses checksumt and hashtna algoxtthmr ta
vertty the data
th recefY ed Pe exactty the same
as what we gent
)
Key Management
the data cecurely, IPSec
-To encrypt nd decryp
USes CEyptoqxnph?e keys Ensurer-only auth oxtz ed
devlce s have aCCeas to key.
age
Date:
No K.G.C.E,
Karjat - Raigad
Page No.:
EKGCEKGCEKGCE
Explatn
PP
tn bxte
|Date :
eKGCENnnGEKGCEKGCEKGCEKOoEvoveoEVecEKGCEKGCEKGCEKGCEKGCEKGCEKGUENG
)PTP
stands for
whtch ts Pretthy Ctood Prîvacy (PGP)
phil Zmmermann
1S destaned to_pIovîde all four aspects
TSecuYtty ,ieDatVacy ntegrtty, authenti catten
Ahd noh- repud?atton the
n cendtna of ematl
9 PGP ses a dlatta)
stanature o pravîde
Inteqy authentt cation
CP usea coobination
and
of
noD-repudiatiao
secret key
encryption and ptblic key eneryptlan ta
EXVîde privacy
6)PGP Ys an opensOLUTCe and freely avaflahle
sottare package for ema
cecufty.
CG) PPprovides authentication through the se
cf Dtattal Sianatare
It
TH provtder confhdenttalky through the ure
at ayrnmetrîc block encrypton.
(8) TE poV?de.c Comoxesstan by ustng the zIP
alacrtihm, and EMAIL Coahattbiliy ustna the
Radx-s4 encoding scheme
arinetiork
catuing.and analyzinq packets
indlcatton that
trofftc and ties to give
misused.
computer has heeh
ecte maltctou.s data present înto paucketc
(3)T4 det
Date
K.G.C.E.
Karjat - Raigad
traffc
monttors Detvvork"
DEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGCEKGOCEKGCEK
e0NIDS._continuously rt attemphing
are
that f hacke
and discOVer
to brtak the Syetem which
fnstalled an matn seryer
(5)when NIDS
Constste af multtple hest
ctngle Ina
attcks pre sent n the
network pt detect
Incomng packéts
multale hy
hact by checkingq
ooks USes pTobe or sensorc
that
uncxdinay.
6) Networkbased TDS ingtalled throiahaut
the hetW/ork.
NaTae
Hot
User
NetWOrk HUB
Outstde
attacker
Attack
Pattern S
tnste
attaekey
Nonal Abnormal
to
detec
eunke
ctttackes 23