A Seminar Report
A Seminar Report
CRYPTOGRAPHY TECHNOLOGY
ABSTRACT
The requirement of information security within an organization has under
gone two major changes in the last several decades. Before the widespread
use of data processing equipment, the security of information felt to be
valuable to an organization was provided primarily by physical and
administrative means. An example of the former is the use of rugged filing
cabinets with a combination lock for storing sensitive documents. An
example of the latter is personnel screening procedures used during the
hiring process.
With the introduction of computer, the need for automated tools for
protecting files and other information stored on the computer became
evident. This is especially the case for a shared system, such as a time-
sharing system, and the need is even more acute for system that can be
accessed over public telephone network, data network, or the Internet.
The generic name for the collection of the tools designed to protect data
and to thwart hackers is computer security.
There are no clear boundaries between these two forms of security. For
example, one of the most publicized types of attack on information
system is the computer virus. A virus may be introduced into a system
physically when it arrives on a diskette and is subsequently loaded onto
a computer. Viruses may also arrive over an internet. In either case,
once the virus is resident on a computer security tools are needed to
detect and recover from the virus
INTRODUCTION
Due to the rapid growth of digital communication and electronic data
exchange information security has become a crucial issue in industry,
business and administration. Assume a sender referred to here and in
what follows as Alice (is commonly used) wants to send a message m to
a receiver referred to as Bob. She uses an insecure communication
channel. For example, the channel could be a computer network or a
telephone line. There is a problem if the message contains confidential
information. The message could be intercepted and read by
eavesdropper. Or even worse, some might be able to modify the
message during transmission, so Bob does not detect the manipulation.
Definition of cryptography
Cryptography is the study of mathematical techniques related to aspects
of information security, such as confidentially or privacy, data integrity
and entity authentication. Cryptography is not the only means of
providing information security, but rather one set of techniques.
1: - Symmetric key
2: - Asymmetric key
Symmetric key
Sender and receiver share a key.
If a key is secret, then nobody other than the sender and receiver
can read the message.
If Alice and Bob each have a secret key then they may send each
other a private message.
Asymmetric key
Anyone can encrypt a message using public key but only the
owner of the public key is able to read it.
In this way the Alice may send private message to owner of a key
pair (Bob) by encrypting it using his public key. Only Bob can
decrypt it.
Related Terms
Goals of cryptography
The main goals of cryptography are
1: - Confidentially or privacy
2: - Data integrity
3: - Authentication
4: - Non-repudiation
1) Confidentially or Privacy: -
Keeping information secret from all, but those who are authorized
to see it. Confidentially is the protection of transmitted data from
passive attacks. With respect to the content of data transmission,
several levels of protection can be identified. The broadest service
protects all user data transmitted between two users over a period
of time.
The aspect of confidentially is the protection of traffic flow from
analysis. This requires that an attacker not be able to observe to
source and destination, frequency, length or any other
characteristics of the traffic on a communication facility.
2) Data Integrity: -
Ensuring the information has not been altered by unauthorized or
unknown means. One must have the ability to detect data
manipulation by unauthorized parties. Data manipulation includes
such things as insertion, deletion, and substitution
3) Authentication: -
Corroboration of the identity of an entity. Authentication is a
service related to identification. This function applies to both
entities and information.
4) Non-repudiation: -
Non-repudiation prevents either sender or receiver from denying a
message. Thus, when a message is sent, the receiver can prove
that the message was in fact send by the alleged sender.
Similarly, when a message is received, the sender can prove the
alleged receiver in fact received that message.
1: - Level of security
2: - Performance
3: - Ease of implementation
1) Level Of Security: -
2) Performance:-
Performance refers to the efficiency of an algorithm in a particular mode
of operation. For example, the number of bits/sec at which it can encrypt
may rate an encryption algorithm.
3) Ease Of Implementation:-
This refers to the difficulty of realizing the algorithm in a practical
instantiation, and might include the complexity of implementing in an
either software or a hardware environment.
Aspects of Security
1 Security attack
2 Security mechanism
3 Security service
1) Security Attack: -
Any action that compromises the security of information owned by an
organization.
2) Security Mechanism: -
3) Security Services: -
A service that enhances the security of the data processing system and
the information transfers of an organization. The services are intended
to counter security attacks, and they make use of one or more security
mechanism to provide the service.
Security Attacks
A useful means of classifying security attacks, used in x.800, is in term
of passive attacks and active attacks. A passive attack attempts to
learn or make use of information from the system but does not affect
system resources. An active attack attempts to alter system resources
or affect their operation.
Passive Attacks: -
Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is
being transmitted. Two types of passive attacks are release of message
contents and traffic analysis.
Passive attacks are very difficult to detect because they do not involve
any alteration of the data. However, it is feasible to prevent the success
of these attacks, usually by means of encryption. Thus, the emphasis in
dealing with passive attacks is on prevention rather than detection.
Active Attacks: -
Active attacks involve some modification of the data stream or the
creation of a false stream and can be subdivided into four categories:
masquerade, replay modification of messages, and denial of service .
Replay involves the passive capture of a data unit and it's subsequent
retransmission to produce an unauthorized effect.
Modelfo
r Network Security
This general model shows that there are four basic tasks in designing a
particular security service:
Viruses and worms are two examples of software attacks. Such attacks
can be introduced into a system by means of a disk that contain
unwanted logic concealed in otherwise useful software.
The security mechanism needed to coped with unwanted access fall into
two broad categories. The first categories might be termed a gatekeeper
function. It includes password-based login procedures that are designed
to deny access to all but authorized user and screening logic that is
designed to detect and reject worms, viruses, and other similar attacks.
Once is gained, by either an unwanted users or unwanted software, the
second line of defense consists of a variety of internal controls that
monitor activity and analyze stored information in an attempt to detect the
presence of unwanted intruders.
Classical Encryption Techniques
Substitution Techniques: -
A substitution technique is one in which the letters of plaintext are
replaced by other letters or by numbers or symbols. If the plaintext is
viewed as a sequence of bits, then substitution involves replacing
plaintext bit patterns with cipher text bit patterns
Caesar Cipher
The earliest known use of a substitution cipher, and the simplest, was by
Julius Caesar. The Caesar cipher involves replacing each letter of the
alphabet with the letter standing three places further down the
alphabet. For example
Note that the alphabet is wrapped around, so that the latter following Z
is
A. We can define the transformation by listing all possibilities, as follow:
Plain: a b c d e f g h I j k l m n o p q r s t u v w x y z
Cipher: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Transposition Techniques: -
All the techniques examined so far involve the substitution of a cipher
text symbol for a plaintext symbol. A very different kind of mapping is
achieved by performing some sort of permutation on the plaintext
letters. This technique is referred to as a transposition cipher.
The simplest such cipher is the rail fence technique, in which the
plaintext is written down as a sequence of diagonals and then read off
as a sequence of rows. For, example, to encipher the message " meet
me after the toga party " with a rail fence of depth 2, we write the
following.
Mematrhtgpry
Etefeteoaat
Key: 4312567
Modern Techniques
Virtually all-symmetric block encryption algorithm in current use is
based on a structure referred to as a Feistel block cipher. We begin with
a comparison of stream ciphers and block ciphers.
Stream ciphers: -
A stream cipher is one that encrypts a digital data stream one bit or one
byte at a time. Example of classical stream ciphers is auto keyed
Vigenere cipher and the Vernam cipher.
Block ciphers: -
A block cipher is one in which a block of plaintext is treated as a whole
and used to produced a cipher text block of equal length. Typically, a
block size of 64 or 128 bits is used. Using some of the modes of
operation explained later in this chapter, a block cipher can be used to
achieve the same effect as a stream cipher. Far more effort has gone
into analyzing block ciphers. In general, they seem applicable to a
broader range of applications than stream ciphers. The vast majority of
network-based symmetric cryptographic applications make use of block
ciphers.
Adding k successive letters to get a ciphertext letter Yn. One can show
that the statistical structure of the plaintext has been dissipated. Thus
the letter frequencies in the ciphertext will be more nearly equal than in
the plaintext; the Diagram frequencies will also be more nearly equal,
and so on. In a binary block cipher, diffusion can be achieved by
repeatedly performing some permutation of the sata followed by
applying a function to that permutation; the effect is that bits from
different positions in the original plaintext contribute to a single bit of
ciphertext.
DES enjoys widespread use. It has also been the subject of much
controversy concerning how secure the DES is,. To appreciate the nature
of the controversy, let us quickly review the history of the DES.
Whatever the merits of the case, DES has flourished and is widely used,
especially in financial applications. In 1994, NIST reaffirmed DES for
federal use for another five years; NIST recommended the use of DES for
applications other than the protection of classified information. In 1999,
NIST issued a new version of its standard that indicated that DES should
only be used for legacy systems and that triple DES (which in essence
involves repeating the DES algorithm three times on the on plaintext
using two or three different keys to produce the ciphertext) be used.
DES Encryption: -
The overall scheme for DES encryption is illustrated in figure. As with
any encryption scheme, there are two inputs to the encryption function:
the plaintext to be encrypted and the key. In this case, the plaintext
must be 64 bits in length and the key is 56 bits in length.
Looking at the left-hand side of the figure, we can see that the
processing of the plaintext proceeds in three phases. First, the 64-bit
plaintext passes through an initial permutation (IP) that rearranges the
bits to produce the permuted input. This is followed by a phase
consisting of 16 rounds of the same function, which involves both
permutation and substitution functions. The output of the last (16) round
consists of 64 bits that are a function of the input plaintext and the key.
Department Of Computer Science , SCET 19 | P a g e
Cryptography Technology
The left and right halves of the output are swapped to produce the
preoutput. Finally, the preoutput is passed through a permutation that
is the inverse of the initial permutation function, to produce the 64-bit
ciphertext. With the exception of the initial and final permutation, DES
has the exact structure of a Feistel cipher.
The right-hand portion of figure shown the way in which the 56-bit key is
used. Initially, the key is passed through a permutation function. Then,
for each of the 16 rounds, a subkey (Ki) is produced by the combination
of a left circular shift and a permutation. The permutation function is the
same for each round, but a different subkey is produced because of the
repeated iteration of the key bits.
Public-key cryptography
The second problem that Diffie pondered, and one that was
apparently unrelated to the first was that of " digital signatures ".
If the use of cryptography was to become widespread, not just in
military situations but for commercial and private purposes, then
electronic message and documents would need the equivalent of
signatures used in paper documents. That is, could a method be
devised that would stipulate, to the satisfaction of all parties that a
digital message had been sent by a particular person? This is a
somewhat broader requirement than that of authentication, and
its characteristics and ramifications are explored.
Public-key cryptosystems: -
The public-key algorithms rely on one key for encryption and a
different but related key for decryption. These algorithms have the
following important characteristics:
Either of the two related keys can be used for encryption , with
other used for decryption.
Public and private key: - This is a pair of keys that have been
selected so that if one is used for encryption, the other is used for
decryption. The exact transformations performed by the
encryption algorithm depend on the public or private key that is
provided as input.
Each user places one of the two keys in a public register or other
accessible file. This is the public key. The companion key is kept
private. As figure suggests, each user maintains a collection of
public keys obtained from others.
With this approach, all participants have access to public keys, and
private keys, are generated locally by each participant and therefore
need never be distributed. As long as a system controls its private key,
its incoming communication is secure. At any time, a system can change
its private key and publish the companion public key to replace its old
public key.
The RSA scheme is a block cipher in which the plaintext and ciphertext
are integers between 0 and n -1 for some n. A typical size for n is 1024
bits, or 309 decimal digits. We examine RSA in this section in some
detail, beginning with an explanation of the algorithm. Then we examine
some of the computational and cryptanalytical implications of RSA.
C = Me mod n
Both sender and receiver must know the value of n. The sender knows
the value of e, and only the receiver knows the value of d. Thus, this is a
public-key encryption algorithm with a public key of KU = {e,n} and a
private key of KR ={d,n}. For the algorithm to be satisfactory for public-
key encryption, the following requirements must be meet:
1 -> it is possible to find value of e, d, n such that Med = M mod n for all
M<n.
For now, we focus on the first requirement and consider the other
questions later. We need to find a relationship of the form
Med = M mod n
A corollary to Euler's theorem, fits the bill: Given two prime numbers, p
and q and two integers n and m, such that n = pq and 0 < m< n, and
arbitrary integer k, the following relationship holds:
Where (n) is the Euler totient function which is the number of positive
integers less then n and relatively prime to n. for p, q prime, (pq) = (p-
1)(q-
Ed = k(n) + 1
Ed = 1 mod (n)
That is e and d are multiplicative inverses mod (n). Note that according
to the rules of modular arithmetic, this is true only if d (and therefore e)
is relatively prime to (n), Equivalently, gcd ((n), d) = 1
We are now ready to state the RSA scheme. The ingredients are the
following:
n = pq (public, calculated)
The private key consists of {d, n} and the public key consists of {e, n}.
Suppose that user A has published its public key and that user B wishes
to send the message M to A. then B calculates C = Me (mod m) and
Therefore,
ed = 1 mod (n)
0 < M < m:
Now C = Me mod n
ClassicSys as a standard...
Besides ClassicSys ciphering at high speed, two more advantages make
Classic Sys uses only 1 secret key to meet ALL the cryptographic needs
of an end
user such as :
To authenticate himself
The chip contains the SED algorithm and all the other features of
ClassicSys. One system covers all cryptographic needs, for all
applications.
The length of the blocks of key and data are identical and equal to
128 bits (16 bytes).
To authenticate himself
The length of the blocks (key and data) is small (128 bits against more
than 512 bits) but long enough to disable every exhaustive
cryptanalysis. On average. It is possible to compute at 1/3 of the clock
frequency (8 to 10 Mbytes/sec).
Application: -
Cryptography is extremely useful; there is a multitude of applications,
many of which are currently in use. A typical application of cryptography
is a system built out of the basic techniques. Such systems can be of
various levels of complexity. Some of the more simple applications are
secure communication, identification, authentication, and secret
sharing. More complicated applications include systems for electronic
Generally, the less complex the application, the more quickly it becomes
a reality. Identification and authentication schemes exist widely, while
electronic commerce systems are just beginning to be established.
However, there are exceptions to this rule; namely, the adoption rate
may depend on the level of demand. For example, SSL-encapsulated
HTTP (see Question 5.1.2) gained a lot more usage much more quickly
than simpler link-layer encryption has ever achieved. The adoption rate
may depend on the level of demand.
Secure Communication
Secure communication is the most straightforward use of cryptography.
Two people may communicate securely by encrypting the messages
sent between them. This can be done in such a way that a third party
eavesdropping may never be able to decipher the messages. While
secure communication has existed for centuries, the key management
problem has prevented it from becoming commonplace. Thanks to the
development of public-key cryptography, the tools exist to create a
large-scale network of people who can communicate securely with one
another even if they had never communicated before.
Secret Sharing
Another application of cryptography, called secret sharing, allows the
trust of a secret to be distributed among a group of people. For
example, in a (k, n)-threshold scheme, information about a secret is
distributed in such a way that any k out of the n people (k £ n) have
enough information to determine the secret, but any set of k-1 people
do not. In any secret sharing scheme, there are designated sets of
people whose cumulative information suffices to determine the secret.
In some implementations of secret sharing schemes, each participant
receives the secret after it has been generate
Bibliography:-
This document's some topics are just picked up by some of reference
book and some excellent web site which give me good explore such
references are following.
www.google.co.in.
Cryptography And Network Security (William Stallings).
Conclusion:-
By Analysis of this report and their subtopics which are mentioned
above, which are inherently guides us about various cryptographic
techniques used in data security. By using of encryption techniques a
fair unit of confidentiality, authentication, integrity, access control and
availability of data is maintained. Using cryptography Electronic Mail
Security, Mail Security, IP Security, Web security can be achieved.
BRUNNER, JOHN (1975). The Shockwave Rider. New York, NY: Ballantine Books.
PR6052.R855 74-23861; ISBN 0-345-24853-8-150. CASTANO, SILVANA; FUGINI,
MARIAGRAZIA; MARTELLA, GIANCARLO; & SAMARATI, PIERANGELA (1995).
Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-
Wesley Publishing Company. TK5105.875.I57C44 1994; 005.8--dc20; 94-10747;
ISBN 0-201-63357-4. $23.16 COHEN, FREDERICK B. (1995). Protection and Security
on the Information Superhighway. New York: John Wiley & Sons, Inc.
QA76.9.A25C59 1995; 005.8--dc20; 94-40488; ISBN 0 471-11389-1. CURRY, DAVID
A. (1992).
UNIX System Security: A Guide for Users and System Administrators. Reading, MA:
Addison-Wesley Publishing Company, Inc. QA76.9.A25C87 1992; 005.4'3--dc20; 91-
43652; ISBN 0-201-56327-4 (hardcover). DAVIES, D.W., & PRICE, W.L. (1984).