Cns Sem
Cns Sem
https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-
encryption/ & https://www.geeksforgeeks.org/difference-between-substitution-cipher-
technique-and-transposition-cipher-technique/
https://www.javatpoint.com/active-attack-vs-passive-attack
https://www.javatpoint.com/difference-between-the-substitution-technique-and-the-
transposition-technique
CNS UNIT-2
Traditional Block Cipher Structure
Notes & pdf & https://www.tutorialspoint.com/cryptography/feistel_block_cipher.htm
features of the Feistel block cipher structure
1. **Block Division:** The plaintext message is divided into blocks of fixed size. Each block
undergoes encryption and decryption independently.
2. **Key Expansion:** Before encryption begins, the secret key is expanded into a set of
round keys. These round keys are used in each round of encryption and decryption.
3. **Rounds:** The encryption and decryption processes consist of multiple rounds. Each
round typically involves a permutation operation (often called a "round function") and a key
mixing operation.
4. **Substitution-Permutation Network (SPN):** The round function in Feistel ciphers often
follows the SPN structure. It comprises two main operations: substitution and permutation.
Substitution involves replacing parts of the input with other values, typically using S-boxes
(substitution boxes), while permutation rearranges the bits of the input.
5. **Key Mixing:** In each round, the round key is combined with a portion of the block
data using an operation such as XOR (exclusive OR). This introduces key-dependent
confusion into the cipher.
6. **Feistel Structure:** In each round of encryption, the block is divided into two halves.
One half is subjected to the round function, while the other half is combined with the output
of the round function through the key mixing operation. In decryption, the process is
reversed, with the round keys applied in reverse order.
7. **Multiple Rounds:** The number of rounds determines the security and performance of
the cipher. Feistel ciphers typically use a relatively large number of rounds to achieve
sufficient diffusion and confusion.
8. **Final Permutation:** After completing all rounds, a final permutation is applied to the
output to provide additional diffusion and ensure that the encryption process is invertible.
9. **Security Analysis:** The security of Feistel ciphers relies on the properties of the round
function, such as confusion and diffusion, as well as the complexity of the key schedule.
Cryptographers analyze these properties to assess the strength of the cipher against various
attacks, including differential and linear cryptanalysis.
Block Cipher Design Principles
Notes & pdf & https://www.geeksforgeeks.org/block-cipher-design-principles/
Des
Notes & pdf & https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption
**Advantages of DES:**
1. **Security:** DES provides a relatively strong level of security, especially when it was
first introduced in the 1970s. While it has been surpassed by more advanced encryption
algorithms, it still offers a reasonable level of protection for certain applications.
2. **Widespread Adoption:** DES has been widely adopted and implemented in various
systems and applications over the years. This means that it is often compatible with existing
infrastructure and technologies.
3. **Efficiency:** DES is relatively efficient in terms of computational resources required
for encryption and decryption processes. It can be implemented on a wide range of hardware
platforms without significant performance overhead
4. **Standardization:** DES was one of the first encryption standards adopted by the U.S.
government and later became an international standard. Its standardization helped promote
interoperability and widespread use across different systems and organizations.
**Disadvantages of DES:**
1. **Key Length:** One of the primary weaknesses of DES is its key length. With a key
length of only 56 bits, DES is vulnerable to brute-force attacks, especially with modern
computing power. This makes it less secure compared to more modern encryption algorithms
with longer key lengths.
2. **Vulnerabilities:** DES has been subject to various cryptanalytic attacks over the years,
some of which have demonstrated weaknesses in its security. While these attacks may not be
practical in all scenarios, they highlight potential vulnerabilities in the algorithm.
3. **Limited Key Space:** The small key space of DES (2^56 possible keys) makes it
susceptible to exhaustive search attacks. As computing power continues to advance, the
feasibility of such attacks increases, undermining the security of DES.
4. **Legacy Status:** While DES was once a widely accepted standard, its legacy status
means that it may not offer the same level of security as more modern encryption algorithms.
Organizations are encouraged to migrate to stronger encryption standards to enhance their
security posture.
Aes
Notes & pdf & https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption
**Advantages of AES:**
1. **Security:** AES is considered highly secure when implemented correctly. It has
withstood extensive analysis and scrutiny by cryptographers and has not been compromised
in practice. It uses strong encryption techniques and a sufficiently large key size to resist
brute-force attacks.
2. **Efficiency:** AES is designed to be computationally efficient, making it suitable for use
in a wide range of applications, including embedded systems and resource-constrained
environments. It can encrypt and decrypt data quickly without significant performance
overhead.
3. **Standardization:** AES has been adopted as a standard encryption algorithm by
governments, organizations, and industries worldwide. Its standardization promotes
interoperability and ensures compatibility across different systems and platforms.
4. **Scalability:** AES supports key sizes of 128, 192, and 256 bits, providing scalability to
meet different security requirements. Users can choose the appropriate key length based on
their specific security needs and risk tolerance.
5. **Resistance to Attacks:** AES has demonstrated resilience against various cryptanalytic
attacks, including differential and linear cryptanalysis. Its mathematical properties and the
structure of its S-boxes contribute to its resistance to known attacks.
**Disadvantages of AES:**
1. **Key Management:** As with any encryption algorithm, the security of AES depends on
the strength and management of its encryption keys. Weaknesses in key management
practices, such as improper key storage or distribution, can compromise the security of AES-
encrypted data.
2. **Side-Channel Attacks:** AES implementations may be vulnerable to side-channel
attacks, where an attacker exploits unintended information leakage from the encryption
process, such as timing or power consumption. Secure implementation techniques, such as
constant-time algorithms, can mitigate these risks.
3. **Quantum Computing:** While AES is currently considered secure against classical
computing attacks, the emergence of quantum computing poses a potential threat to its
security. Quantum algorithms, such as Grover's algorithm, could theoretically reduce the
effective key length of AES, necessitating the use of larger keys or post-quantum encryption
algorithms for long-term security.
4. **Resource Consumption:** While AES is efficient compared to some other encryption
algorithms, it still requires computational resources, especially for operations with larger key
sizes or when processing large volumes of data. In resource-constrained environments, such
as IoT devices, this overhead may be a concern.
Block Cipher Modes of Operations
Notes & pdf & https://www.geeksforgeeks.org/block-cipher-modes-of-operation/
https://www.javatpoint.com/block-cipher-vs-stream-cipher
https://www.javatpoint.com/des-vs-aes & https://www.geeksforgeeks.org/difference-between-
aes-and-des-ciphers/
CNS UNIT-3
Principles of Public Key Cryptography Algorithms
https://www.tutorialspoint.com/what-are-the-principles-of-public-key-cryptosystem-in-
information-security and notes
RSA alg
https://www.javatpoint.com/rsa-encryption-algorithm and notes
Diffie Hellman Key Exchange
https://www.tutorialspoint.com/the-diffie-hellman-key-exchange & notes
Elgamal cryptosystem
https://www.geeksforgeeks.org/elgamal-encryption-algorithm/ & notes
https://www.educative.io/answers/what-is-elliptic-curve-cryptography ¬es,pdf
https://youtu.be/86EXqTPVMJU?si=iCshUW5UvPRG3cFb
A hash function is a mathematical function that converts a numerical input value into another
compressed numerical value. The input to the hash function is of arbitrary length but output is
always of fixed length.
CNS UNIT-4
Digital Signatures
https://www.tutorialspoint.com/cryptography/cryptography_digital_signatures.htm & notes
NIST Digital Signature Algorithm
https://www.geeksforgeeks.org/digital-signature-standard-dss/ & notes
X.509 Certificate
https://www.geeksforgeeks.org/x-509-authentication-service/ & pdf ,notes
Key management & distribution
https://www.geeksforgeeks.org/easy-key-management-in-cryptography/ & notes,pdf
Remote user authentication principles
Notes
Kerberos
Notes & pdf
CNS UNIT-5
Security issues in the web
Notes & https://www.geeksforgeeks.org/top-10-security-risks-in-web-applications/ &
https://www.geeksforgeeks.org/web-security-considerations/
Secure Sockets Layer
Notes & https://www.geeksforgeeks.org/secure-socket-layer-ssl/
Transport Layer Security
https://www.geeksforgeeks.org/transport-layer-security-tls/ & pdf &
https://youtu.be/LcdlBTYe6vo?si=OIxig3A7UNFH4hI_
Https
Notes & https://www.geeksforgeeks.org/explain-working-of-https/ &
https://youtu.be/vyv5f57kGu8?si=djOHmGrCjDiCmope
Secure shell
https://www.javatpoint.com/ssh-meaning & https://www.geeksforgeeks.org/introduction-to-
sshsecure-shell-keys/ & https://youtu.be/lghclCiyJlM?si=LBkUnL6Fm2MLDFfM
IP Security- Overview and its policies
Pdf & notes & https://www.geeksforgeeks.org/ip-security-ipsec/
Anthentication header
Notes & https://www.geeksforgeeks.org/internet-protocol-authentication-header/
Encapsulating security payload
Notes & https://www.geeksforgeeks.org/what-is-encapsulating-security-payload/ &
https://www.tutorialspoint.com/what-is-encapsulating-security-payload-esp
Internet key exchange and cryptographic suite
https://www.geeksforgeeks.org/internet-key-exchange-ike-in-network-security/
Introduction to firewalls
Notes & https://www.geeksforgeeks.org/firewall-design-principles/
types of firewalls