CNS Unit 1 FS
CNS Unit 1 FS
Unit - 1
Introduction
FutureScopie
Topics
Introduction to Security attacks, services and mechanism
Classical encryption techniques-Substitution ciphers and Transposition
ciphers
Cryptanalysis
Steganography
Stream and Block Ciphers
Modern Block Ciphers: Block ciphers principles
Shannon’s theory of confusion and diffusion
Feistel structure
Data Encryption Standard (DES)
Strength of DES
Triple DES
Idea of Differential Cryptanalysis
Block cipher modes of operations
Cryptography:
Cryptography is the science and art of creating secret code.
Cryptography is like a secret code that keep your messages safe when
you send them online or store them on a computer.
Type of Cryptography:
There are two main types of Cryptography:-
Symmetric Key Cryptography: This method involves using the same key for both
encryption and decryption. The sender and receiver both possess this secret key
to encrypt and decrypt messages. Examples are AES (Advance Encryption
Standard) and DES (Data Encryption Standard).
Asymmetric Key Cryptography: This method uses a pair of keys (i.e. a public key
and a private key) for encryption and decryption. The public key is freely
distributed while the private key remains secret. Message encrypted with the
public key can be decrypted using the corresponding private key. Examples can
be RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography)
Security Services:
Confidentiality: The principle of confidentiality specifies that only the
sender and the intended recipient should be able to access the content of
the message. It protects the transmitted data from passive attack.
Non-repudiation: It is a condition when a user sends message and later
refuses that he had not sent the message. The principle of non-repudiation
doesn‘t allow the sender of message to deny that he had not send the
message
Access Control: The principle of access control determines who should be
able to access data or system via communication link. It provides the
prevention of unauthorized use of resources.
Authentication: Authentication is concerned with assuring that a
communication is authentic. In authentication, there is an assurance that
the communication entity is the one that it claims to be.
Threat to Confidentiality
Snooping: Unauthorized access of data.
Traffic Analysis: Analyzing encoded messages to come up with likely
patterns.
Threat to Availability
Denial of Services (DoS): Slow down or totally interrupt the services of
a system.
Threat to Integrity
Modification: Modification in information to make it beneficial to
himself.
Masquerading: aka spoofing, it happens when one entity pretends to be
a different entity.
Replaying: Attacker obtains a copy of the message sent by a user and
later retransmits it to produce an unauthorized effect.
Repudiation: The sender of the message may deny that he has sent the
message or the receiver might later deny that he has received the
message.
Security Mechanisms
Data Integrity: Designed to protect data from modification, insertion,
deletion and replaying by any entity.
Encipherment: Hiding or covering data can provide confidentiality.
Digital Signature: Sender can digitally sign the data and receiver can
digitally verify the signature.
Access Control: Determines who should be able to access data or
system via communication link.
Traffic Padding: Way of inserting of bits into gaps in a data stream to
confuse traffic analysis attempts.
Notarization: Selecting a third party to control the communication
between two entities.
Cryptanalysis
Cryptanalysis means the decryption and analysis of codes, ciphers or
encrypted text.
Types of Cryptanalysis
Confusion:
The property of confusion hides the relationship between the ciphertext
and the key.
This property makes it difficult to find the key from the ciphertext.
If a single bit in key is changed, then most or all the bits in the ciphertext
will be changed.
Increases ambiguity of ciphertext.
Achieved through substitution algorithm.
Used by stream cipher and block cipher.
Shannon’s Theory
Diffusion:
Hides the relationship between the ciphertext and the plaintext.
This will frustrate the attacker who tries to find out the plaintext from
the statistical analysis of ciphertext.
If a single symbol in the plaintext is changed, then several or all symbols
in the ciphertext will also be changed.
Increases the redundancy of the plaintext by spreading it across rows
and columns.
Achieved through transpositional algorithm.
Used by block cipher only.
Feistel Structure
The Feistel Structure is cryptographic construction.
Used in design of block ciphers.
Introduced by Horst Feistel in early 1970s.
Feistel Structure is adopted widely in various encryption algorithm due
to its simplicity and effectiveness.
It is commonly known as Feistel Network.
Advantages of feistel structure is that encryption and decryption
operations are very similar, and even identical is some cases.
A Feistel network is an iterated cipher with an internal function called a
round function.
Data Encryption Standard(DES)
The Data Encryption Standard (DES) is a symmetric-key block cipher.
Published by National Institute of Standards and Technology (NIST).
DES is an implementation of Feistel Cipher.
It uses 16 round Feistel structure.
The block size is 64 bit.
Key length is 64 bit, DES has effective key length of 56 bits.
8 of the 64 bits are not used in encryption algorithm.
These 8 bits act as check bits only.
DES is a symmetric cryptosystem, specifically a 16 round Feistel cipher.
These are required to specify DES:
Round Function Key Schedule Initial and Final Permutation
Data Encryption Standard(DES)