CNS - Unit-1
CNS - Unit-1
Pre-requisite
Dr.T.Venketbabu,
Assistant Professor, Slot : S2 & S10
6/25/2024 Dr.T.VenketBabu, AP/CSE, Vel Tech 1
Department of CSE.
Course Outcomes
Level of learning
CO
Course Outcomes domain (Based on
Nos.
revised Bloom’s)
Understand the encryption and decryption techniques using
CO1 K2
block ciphers.
PO PO PO PO PO PO PO PO
COs PO9 PO10 PO11 PO12 PSO 1 PSO 2 PSO 3
1 2 3 4 5 6 7 8
CO1 3 3 2
CO2 3 2 3 2 3
CO3 3 2 3 2 2
CO4 2 1 2 3
CO5 2 3 2 2
K
E
Y
Initial Criteria
security – effort to practically cryptanalyse
cost – computational
algorithm & implementation characteristics
Final criteria
general security
software & hardware implementation ease
implementation attacks
flexibility (in en/decrypt, keying, other factors)
To find out the XOR value of two numbers we can convert it into binary
representation
and then do the logical XOR operation on each bit and then convert it into a
decimal value .
XOR examples:
Input : A = 7 , B = 9
Output: 14
Explanation : A = 7 ( 0111 )2 , B = 9 ( 1001 )2
•1st bit of A = 1 and B = 1 so XOR value will be 0
•2nd bit of A = 1 and B = 0 so XOR Value will be 1
•3rd bit of A = 1 and B = 0 so XOR Value will be 1
•4th bit of A = 0 and B = 1 so XOR Value will be 1
XOR value has binary representation : (1110)2
Decimal value of XOR = 14
Covert Channel:
- Essentially, the dual of traffic analysis
- A means of communication in a fashion unintended by the
designers of the communication facility
- Usually intended to violate or defeat a security policy
Examples: Message length, Message content, Message presence