0% found this document useful (0 votes)
32 views33 pages

CSE Cryptography and Ntwork Security Unit-1

Cryptography is the science of encoding and decoding information to protect data during transmission over networks. It involves methods such as encryption and decryption to secure communication and prevent unauthorized access. Information security encompasses various strategies to safeguard data from threats, including passive and active attacks, ensuring confidentiality, integrity, and availability.

Uploaded by

123sai3210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
32 views33 pages

CSE Cryptography and Ntwork Security Unit-1

Cryptography is the science of encoding and decoding information to protect data during transmission over networks. It involves methods such as encryption and decryption to secure communication and prevent unauthorized access. Information security encompasses various strategies to safeguard data from threats, including passive and active attacks, ensuring confidentiality, integrity, and availability.

Uploaded by

123sai3210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 33
Cryploqraphy and Network security caypooganty: Coyplogyaphy ts the atience of enenygttng and decay vwitery — comenurication sy eae from ane gyeek word gaps means WddeO and Graphee means arfting ° 7 Cryptography method of stort and trans itn gota a foe pat ony those HS intend for an ead 000 puoress apformation by wy Th te octence of protecting into 4 unreadable formal encoding, w =z Cryptography wean effective of poresng gente wrformation 9% aw aed 7 media ov jranemitted Anrough actuork eoinrnunt cation path Comnputer secu: T wed to genette came | Y the callechion of, 10018 designs puolect ane cata oe ua hackers * Netw securlt: | H 6 used ‘16 during ane Lransmtssion of cor tnforrraton «9 between gender and weelver @ scanned with OKEN Scanner Yo prot Whe dala from unnithatixed User Overy a aatleeton of taterconnectedh nctwork’ * Inforenation secu’ ‘Information secuntty 4 designed fo proleet data oF Yoformation from = thwart hackers or tatwuders Need for security: ‘Infomation security to also called as Coyptoqraphy and Network Secuntty- = BW ts cbout | how fo Secure © our data From, thd pasty S Whenever we ane sending toferenation to a fiend) ov reertey we shovld- make = Ste that Information 1S — delivev— Safely apts iormnstion aoe L yy = tee 5 gonds for sender and RK stunds for yecelvet ” ~The communteation —behwten the semer and Yeceivey ill Sovioushy fakes place to sntermet - @ scanned with OKEN Scanner whenever ic ‘i ion | ae sending tnfermation “40 vecetvey ye SHOUIS emake sue that 90 third pay wl be aving — cccess to this Information 7 Hany Atind party i having access the oforaticn » hat’: Yous are — senateg jhe toforrnaticn ‘0 ahe Xee’ves Hen the data 7 comrupted ~ a ithe» corrupted data 15 nothing but the data et be change ou confidentatt'y of the data will pe ost 27 TE pu doat—mmatntatn ane security thee 15 4 chance that your dato wil) | ay, hack yo meet at fg Th you and you frend want woo PM at BITS college yu and yo yout Fricod to‘ meet at acopm 2 that a ql = It yu hat data betng ‘read ty he and », be, moctty the message Jo meet at OORT - 4 ineiad of a200 pth jerk enessaqe “thie person he made tt “yin pm and t iS = ree Tafeco munication, therm that “They cont meet: ‘ge Senda win fares Pl ¥ Wheneer We sefermaton 40 Sener aces They to reece HHO. POC 1 . encryption 3 + Decrantion @ scanned with OKEN Scanner Enenyptions Converting ine plain text to cipher yet: plain feat: Hello ! J crpher ett > H@=|D { ‘Decryption’ convertion he tphes reek’ to plato frkeths op Security Approaches: There are 3 “waye “4d apprach the security : Prevention |! ‘ 7 4. Protection ¥ B Resifeace: Prevention’ (TH wlll pet he 4 Hels 4 Tdentifying the underlying causes. oeforte “they occ: > TW ceaws | happers before, the, , cccumances oF | My ' fe. ciD! vo threats: oe a Protection: r “hanes pisces, »/ whe; ave anreats OE | Yeady fo, occur . Restltencc’ Here, the threat will” already, otcuy, whee we ate not TO poston XO’ contin!) treat theg we Nave : “opt a” “enecharisn, oF) methed Ga wovile a program “Ainough “which” the icat can be solve This ts about Secwibhy ppraches: @ scanned with OKEN Scanner lrotuctton Ths 1s the age of universal clectvonic a oonectivty, where the qetities ke hacktog, viruses, cKO Frau ek Bate very comrmpon- ness secu measures ake ott 6, & network — conversation OF dishtbuted Keation appce can be compromised easily * some Steagle examples ae’, 2 Onttne UT x purchases using 4 credit] debit ‘0 dealt with passive attacks «150 prevention rather yhan detection adive AAtacks Adie attacks — thvelve Some mosiication of the achive a faye Steam an dara — stecamn or creahion oF aytack agtempts te aller system yesources OF atfect Anelt operation © Four ayes ¥ augue here, a0 entity pretends fo be some other ent ay sual, nudes one jhe other Joreny oF active attack « of 4 deta H Wows Ane passive capture + Replay’ and 1H guosequent - produce an unit retransmission to unaut honed effect @ scanned with OKEN Scanner & Modification of mewoncss TN means What Some portion of a legitimate message 15 alleicd, — oy hap messages ave delayed to produce an unauthon red effec - ere \qobn's ace no 16 gous" ts — modihed 9 'yhn's act no tS | FRq8" 4% Denlal oF service” THs attack prevents OF tohibrts the normal Se oy management of commutation foaittes: €x. a2 Dinvption of entire network PY disabling 1 bs Suppression of all messages 4o a parbcular dettinatien by a third party: Security servicer’ H BB @ processing or communication abot 15 provided by @ sysiem to give 4 Semice gpectte Kits of producon fo aplen regourees: vectutty serveces —tenplement — Security policies and © are tinpleme ned by seeuntty mechanfims « FE _contidentionatity: Contidentionality ts the protection of. data from passive atacks: Tt 15 used to dratoswe of | fMfor maton to unauthoriced ~}ransmmtied prevent the a @ scanned with OKEN Scanner yr Menyurting gruel ov systems - hey heer detinad 03 antl antormation accessible 45 only to. these authorised pave acces she other alpecl of confidentiality sae prseecton of haFfie flow from analysis ey barat cord nUmTbET has to bes secured — duurtnd online yrantachon - ¥ spent cation sy Service asstaes theta communication — authentic “por a singe misstge rontmgssion, 5 function 5 jo assure 4H recipient’ thet the message iy fom anvended source For ah outgorng anieaction tO aspects ase tqvowed Two specific authenticator Services defines tq % R00 are ye peer entity authentication % Dota origin authentication - aay Inteq ah rmeans that Gat cannot be modified wnrthout — authorixalton ike contréeaherdl it» + can be ot Q singe message stream of mesages» Two types of snteqity appied too selected fields thin mesg: avarlable They ate onented — Inteqnty service service: Jervicet are HF Connection % comecton= les rented Tnleghit> @ scanned with OKEN Scanner A Non- veprdiation: Non repudiation — prevents either sender OF mess age This { recetver’ from — denying Yronsmitted 4 + 00 copativiry eructa). fo e-commerce» Without rndividual oT entity can deny qhat he, she oF + 8 Vesponstble for a transaction, Aperefore nol Frnonc ly \table Recess Conteol: his yefets to the ability to contn| fhe Tove) of acess that taivduals’ or enhes have © 8 network) or sige and beto —mch information — They can reene- BH fs the abiity jo Unrit., and contnl the accets to hast systems and applications Ma communication KS” XAvottatility’ HW 6 dened to be te property of accessible and a — syle oF a system yetource being The. demand by an authored sistem entity significantly be affected by a vanety to automated §— counter usable Upon avaytabiltty can of attacks, Some amenable mented ie authentication ard encryption and others need gore sort ot phystcal action 40 prevent or Tecove?r from 09s oF avatlatitity ot elements of qiibabuted system: @ scanned with OKEN Scanner got] RUC Ace oviing fo F800, the secumty mechanisms ov arvided toto those amplemented 10 a speciic nro! ayer and those that ave not specific fo any paaeulent protocol ayer 0 sett gemice * TE 18 two ype’ x speaitic Secuaty mechanisms! into the a pproptioke proto! ‘Incorporated ost secunty ioe" an, order 40 provide some of the gente, enctpherment atqerithns tg ‘not tniehiiqible- wed and eneryption Kes” Digitol Signature “the appended data or 4 tragsfarmation — opplied io any date uct poree and rategitt} g¢ te ogatt “Forgery techniques of applyl nq into 4 agen thm qt orekrs to the procetl notre rnatien for converting data This depends on Pou that exyptograrb ¢ allowing to data uatt and protect Acces conten! A vanely of fo the sym prove she wed Tr 4 resource © access pereisions wea © of. entorerng = date Inteqery A auure the fategqnty of dota urfits * van chy of mechanisms a data unt or steam @ scanned with OKEN Scanner mechanism — (alendecd 10 4 fthvegtication Exchange A mean) of ensuite — the ‘Adentitty of | an entity by jnformation —etcha nge q" she invertion of bis toto. gaps =) Trathe Taddin Gr cause, fo, frsate raitlc ana ysis attempts of particular = Routing contin’ “enables Selection phigtaty gece voutes «for certato data and allows \ once a” breach . of Secunty i routing changes spun pected = Neterzation’ The ure of a Arun third gatry fo ature certain properties of a dala exchange + Xavi Pewastve, Secuathy Mechanitmss shete are not specific fo. any particular os! > setunty Service oT protocol layer - =) True Functianattty' “That which 18 perceived fo be correct with “respect ty some cntenia - = security keyel The > marking bound fo @ Fesdurce hat — names «ov — designates the sect atin bules of that — resource : “7 event detechion: Te 18 He procels of detecting all vee events. Teldked = fo. Network secunitY - ~ wed Se Teall: Data collected and potentially @ scanned with OKEN Scanner r yt secur] audtt, which ts an andc pendent and — etamimtion of syste records and ackivihies deals with qequests from mmanagenert yevield Securit} Recqeny’ w gnechanisits, such as event handing and puncte» and — takes Tecovery actions A Model Of Inter Network Security rushed Third porty (cq aries, disintaien of seca 4 formato”? “ sende’ vated naa ? Feciptert ‘cca yee es Sect “TCIO f UJ icansforenahe 7 chanoe re Yeanifonnaion Z| &: 5S 3 t gs 5% é = Pel | 1 z | et Secrel Vv L inferno" anfornation Opponent pata 15 Fransatt tea over” network between we who must cdoperale for the exchenge antoamation channe) 15 the internet from protocels communicating parties, fo take — place” A logical estabiished — bY deh ning a rouke through source 10 gextinahion by of communicttion by ihe tH porties whenever an oppone Area tO conhaentionality quthenticnty of secunty anpects come toto pla Two components are se nt prevents a Information, @ scanned with OKEN Scanner presen in atmos! atl the Security Pe technique ¥ A geeuetty- yerared —transformatyon On Ihe woformnatron yo be sent — making at unreadable by the opponent and the contenls oF semley the adattion ot a code — based on Vhe message, used 10 venty the raeanly of Some sectel — intormatioo shared by th shaped, uninown to the opponent conjunction the two paocipals, and, An example 8 an encryphen ey used with the transformation te scramble the 0 message petore — Hransmiuion and" unscramble TF 0n reception - A trusted Ahtd party may be needed 1° teanernission > The general mode) shows achieve Secure hat there are Four pasic tasks 10 derigai a particaiat secuity service 1 Daigo an algonthrn tou, perforiming the se curTty- should be such pansformnation = The algonthm related yhat an opponent cannot defeat. «HS. PUTPOE q- Generate the secret taforrmalyo0 jo be used with, athe algon th J for the dutnbution and shaving of B Develop method the seutet tnformation : to be med by the two ye Spenhy 8 protocol of the secunty atgonthm awnnnals — that makes WE © scanned with OKEN Scanner qhe ee and nel infor mation ip achieve a par sect} service + p cuyar Voviows other’ threats 40 information sisie id an warted acces Stil exist - the existance ot hackers atreenphi og to penctiake systems accesible over? actwsth rencird concer: penthet’ Unread 18 ploeement of some ap pircalions ne. nage 10 -compurer ssn ae vanons and unity program sins tert jos nd _ phreats Intormation acces tiveats qy — Sewiee yhreats ‘Information sigte oppane* human (eq crack) ¢_) Y computing, #OUCS Cyncensor, MEME 3) — soft ware ypncenson, MEM Aces channel Gorenecpee pata Ceg- vines wre Fanchoo Paotesses Software carts nerna\ secur @ scanned with OKEN Scanner Basics of perwork security Terminologies . = plagntert — oxiginal mess0ger readable format * unreadable Formal - a text - converted — message — — ciphe rer Heit U — — encryphon ~ converting of Pett vent to PERS argos — decryption " er to PT - yey - sn of Weaing fhe cata 3 careqorfes 1. Based on Type of operation : types gion Yectgues su Transpo V rearranged + q- Based on Ae of Keys! y public Key pratt Key sryanmetic keys asymmedie key % = Based processing aipher tet \ Block cipher, stsearn cipher - @ scanned with OKEN Scanner r / gutstib leon Techn éques Reproceme at rior i eneryp i) Tectiniques . converting prto CT SN “pransp Fearrangernent =) we cag TET st tton sechni wS range A ete the letters, sats > he tat of tetlers ets Free 7 XYRB ex. FREE Feek J. esa caphet Keer a Nonoatphavelic + Rail Fence -anspesttion 3 Players ciphet a columnat sransposton ye, A eight a improved colwrnat 5 one Hime pad y- Book cipher G+ poryalphabelic Monoaiphabetic cipher’. a yn 8s 4 one- one = i enonoatpraden’ cipher singe cipht tel fot each plain tert ex anwavs 7 PT cra VeA CK: = we can WE game cipher te%4 lio the T tat ett cipher” tie, AAV): @ scanned with OKEN Scanner r \ us Yen} cast} to decrypl ” = fs very tough to Uhind —persoo Porryatpabetc cipher. VW ts Many one = many for a PT 1s AKWANS koyTTP Caesar cipher c= ECB = CPEs) 70d AE P= D3, = (cS) mod ae lo na 3 Wb e 1B 1 ae o1as un GtR4 men BED eFERTTHIMNOP OR SS ma eG ATG KEM e PATS yu vw % at WW AB ay ay vw KRY GD yx ao be For KA (0X3) Mod ae = Bmodrwe= a- Ex; TROUBLE FREE w =) (19-3) 002° = \amoaat “= gett \ Coevypton 7 wuyxeoh Tuhh : : It try Decryption“ FROVBLEFREE a @ scanned with OKEN Scanner rr query cipher 4 patiple Netley enenyplion etpher msg & Keyword are given - CT a \ Construct HAH matt =p cell a. Fill the mariy . \e a a Ca wis, ena eee 5 aright wee PP TUES © encrygt een qr arate 0000 ex, PT e tpstuumentse Key= oon rch» =y iene 4noye stl wm me? ch nt 714 ge 7 bX 7 gatieac tight ei clphes > cz XK mod ae © Fe xy Ut =z sqate manne ~T Re numbers wr Ey asstqn nl a eee eT BT rc @ scanned with OKEN Scanner Wg go MM aay ah yoy ww MB w x YY? oP @ KF § TU Y 2 ptrAck: Cx; keys viel and messages A Rey manit = ie cinent matnees= (1): (in ii) wR Aastgo umber it il (%) SI (; at im gw paag= C- ee JaTatK) mse $F modac fagroetd mae nm ( te [*\ sani {aoys00)"™ | fh “fr [*\ 38 3G goaaes FADD Female] 9 svat : ea-tet Lao itt) [34] a8 5 ¥. THAME 6) fay a (a. xy] Sree (soe cubis wo Laedle apisod =)o. 93 li 6 Tek tol Encrypted messager ATTACK 7 FKMFTO @ scanned with OKEN Scanner pe tian [p=k'emoa j q Lpetemon at] ety att) Ik} onetime pad | Wernen cipher rey Ueng= denglly of tT pre Security and keys net 11 yaw ® oan 0 4 8 a ene © 88G- 6 ;) \8 \q -Sub =a et, pra secuRITY =I wee ey 4 REMTKY WV 7 crneey lp 6 HB aes gone G87 Transposition Techegnes Ratlfence Trans posttion's Rearcangement - Rearrange whe existing words =3 — Plafntext, depth , 7 | we fave 70 oA. pat tet cogent et TROVBIE FRE VARA crt dobere Tule @ scanned with OKEN Scanner Pa atagont Cl = Row Cotumnay — Transpastfon pidtotext =) matin. Ext INFORMATION SECURITY than Amber» showld be lets Yr23y ke ccottrmns THN WE | 0 [Rk winch Wo keys 3050 NI{s le fe. ‘ame y | at Peeknastroutmnreicy Siymmetic Key cryptography sender and Sd H uses only one key for P99 OL YO-O-G Secret ey secret key enc Dec: @ scanned with OKEN Scanner gender wants fo senda cssage to tH ro fc this qhe ue generate a message - ater generat} aye message us enerypied: any re of secvet Rely © So the sendet he will applying 0" Anns message” wt goto a unreadable format Lei) THD ness0ge jhen We convert FO the Tees should tl not understand the eT 9 OF : decrypt the mesonge Ane qormal enessnge” gece” cs00g? secatt KY peewse oes ad will © convert ante gp the veceivet covert CT FO PTs In order will get the into a network use secret key javantage: eaiily piscdvantage> Ty ho oat party % eatty queried ~ Asymnetrtc Key exyplogeaph for sender i implemented * third 1 gecree FY ® ‘he, 3H wes two Keys and ENE” GHB}O-O4 Xe i key apt priate RY 7 Y ene dec @ scanned with OKEN Scanner os” The — sender sends a mse gw the message std be enenypled = Wve i be using recetver's pote key for ervenyption« then ener ped inessage generated » Atiey generating the message Ato encrypted message tll be transoftted fo Teetver gee Trough @ network: On, reaching receiver's side the enqrypled enessnge be 4s done will be converked into normal message” RW ob by Aeeayption: we are —_ustng pavate Key of * decays the eqenypled message 4nto normal message wt 4n readable — fosmat Advantage: H % more secure than syrinctne eryprography Steganography: =] Hla he Toformation cating’ another - message (mags, les, MOS ed: ag message = Aber sending gronsterting oF 4 4 iS extraded From sendet to _Teceiver, ky We from —ernpedded devices by Recewwer * LSB, ayato] Video steganography» character marking {least syificant ot) ete wot 0 enerystion scheme ° transforming — the onigtnal = ™ cryptography, we are @ scanned with OKEN Scanner nese? but hee hi iting ‘he oviginal | acta! gata ~ anc from Greek words; word steqanographty comes steqands. = cover| conceal qnaphetn = to ute we 8 SeqeeogeN’ ret qe 4 tr ca ve apd ay the argital wnakeUP format such POF, atgitel watermark antormation prding 4 ¥® cone citticult rearee tHe jnkormatio? hiding based 0" tert” I it cress: = vsing image fhes 0% posts fot segonoger ressages FOE aavortag’ the Kientted atstb of Ne human visual sysitm =y Some of the mene commen mettiod for emoeddiog messages an THAI Hes at be categoreed into joo moto qrour® x mae domat metnods a transfou domain methods * G s it canned with OKEN Scani ner Ss Anaio Seqanngyaph =] Rrmbeding secre messes ‘no aril und r raphy say ee acto siege?) aa 0p =7 — Nadlo steganography methods ca wut, AO and eves tg sae files Applications 7 Confidential —_cormmnrication and secret ‘dala storing = Protection of date aticration © =] Media Database systems = Usage fy modern printers Key, range and Key stee: =| W cryptography, "Fey gic’ refers 10 ane length oF a exyptograptic ey, “esi expressed sq BS = te lanqet the key sie, the more Secure and decrystion prowess is ne —_eneryption she ost comanonlt bit and ape-bit> = aed Rey SHE 1ag- bit, WW @ scanned with OKEN Scanner yr key range: * erg sqqgotttom » and yh encrygtion a qrracker to ques +he mess0ge “ Buyic- Fence tant tae bi ont ° aie ggyrnenetic 4 Astnuetic ene tC key Skee ag tS nett SKE gy bits ettia rey ag rouel® bits yaa yous a0 bits yen sie key range? a , | wey Tome eles Ay exyp toners 4 we range ag determined by the Key sie and ettects the secuntly grat cad be used A terger Rey range qiows for 9 ge pussie kets, syneasitg conect Kel and sey get of ll’ posible the arnault \ tyes. al posto keys encryption . psynmet key ste gous DiS pert Stee = 108 pits CXR re, - 2OUBt pay 2042 : gona wan Wot key range= tt ke sie @ scanned with OKEN Scanner Possible typs of AEM? G iyplanat StS \ \ +t} qT Vv Cipher “| ve pe aan plato choosen - cipher | omy tat gett | teat Cayptanatysis” of the isthe study ot thot Coypianatyss which and the preatking cryptogenic alge sear Coats © o , Cipher Tent=0 ai = The attacker Knows only SME and paint caer Hett he by to Find corresponding Ret using various — methods ® EL Baule- Fore attack 4 Qa OO Keown - ploiotert Rech attack, atacker rows some cipher teut = In WS yhat were Sent preetolsly by and pet tert pats jo Recefve” bo CT 08 pr, to use them secret message” gender atianyer tas Hert jo break nett @ scanned with OKEN Scanner chesen™ elect Hitech aH & seta ts raout- pend Abe but det a NN been choosen by the attacker ins * ens) wien attacker hos ates to gendet compute * ge 8 Hee sender can cinase sore fn tet neuf cipher teu choosen - cigher Attack. 3S 1S Safer vo ennssea_peeen Fe attack eruept we, ctnnse sane dipneriet ana cearypt t tom & igher) ylain Ht pov ais ware? when ete. has qeress to veeetter computer” Plain tert and Cope reat Plain tent a 3 plain text 1S the message °F daa 1% legible, qatara —Formot xy tt as Deghly angecure and cast qecesstble by hema” ay =) Moto yet 550 cared lett tet. that =) Cipher ett 8% piatoiett communeatvon has been changed make uniltigi be evertjone @ scanned with OKEN Scanner = eve megs tooutd be Aten to nea the alti =) Wemans are unable 10 understand aypicd plain ter AN eneryption —alquaithm accepts athe messages 9 qorntert @ any and outputs > eretukes the augonttin on & ether ted: Yen =) The encryption process anges oe algon noe a ‘glatnteTt ° =z key BS a valle independent of the pain = once the cipher ed 1S groaned cot ee aqot revert jo the — plaintent” Ehenygtion ayd Decrypt Enenyption sy Creryton 15 the prowss_ of comer plo tert nto cipher dent = HR taxes plate at the genatrs «04 =z Bente KY or‘ pustic ty peed 10 ener ype the message : = Agler encryption fhe gender deltvers data fo fhe ecient @ scanned with OKEN Scanner ce cine encrypted tet tan none readable al Foren and appears as aq tong sting of random orebetd and lebters 4 encryption 1 used foxy Secure transerission storage ot sensitive deta - Decryption. Decryption te procs ot converting chpres yett 10 plat text” uw we pie at the receiver's Od gece Fey ow gate FY 1s wed ceo the message” a We rect pent atter receiving the energie weasage sett by eendet, fender te UM private key gg The Geet HED ag reaeble Fone ” = Wt std only quttoneed person can access te genstive gato by wsing private key, or posta @ scanned with OKEN Scanner

You might also like