Key U1
Key U1
2. Convert the Given Text CRYPTOGRAPHY into cipher text using Rail
fence Technique.
Rail 1: C P R Y
Rail 2: R Y O G A P H
Rail 3: T T Y
Ciphertext: CPRYRYOGAPHTTH
OR
Rail 1: C Y T R P Y
Rail 2: R P O G A H
Ciphertext: CYTRPYRPOGAH
3. Interpret masquerade.
Part –B
Threat
A threat is a possible security violation that might exploit the vulnerability
of a system or asset. The origin of the threat may be accidental,
environmental (natural disaster), human negligence, or human failure.
Different types of security threats are interruption, interception,
fabrication, and modification.
Types of Threats
Unstructured Threats: Unstructured threats are typically executed by
inexperienced individuals using easily accessible hacking tools like shell
scripts and password crackers. If executed solely to test a hacker’s
skills, they can cause significant damage to a company.
Structured Threat: A structured threat involves an organized attempt
to breach a specific network or organization. These threats come from
highly motivated and technically proficient hackers.
External Threats: External threats might come from individuals or
organizations working outside the company. They have unauthorized
access to the computer systems and network. They typically enter a
network via the Internet or dial-up access servers.
Internal Threat: Internal dangers occur due to authorized network
access, whether through a server account or physical access.
ATTACKS
The security attacks can be classified into two types passive attacks and
active attacks.
A passive attack attempts to learn or make use of information from the
system but does not affect system resources.
Passive Attack
Passive attacks are very difficult to detect, because they do not involve
any alteration of the data. Typically, the message traffic is not sent and
received in an apparently normal fashion and the sender nor receiver is
aware that a third party has read the messages or observed the traffic
pattern.
Active Attacks
Active attacks involve some modification of the data stream or the creation
of a false stream and can be subdivided into four categories: masquerade,
replay, modification of messages, and denial of service.
Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect
This definition introduces three key objectives that are at the heart of
computer security:
Availability: Assures that systems work promptly and service is not denied
to authorized users
These three concepts form what is often referred to as the CIA triad
Authenticity: The property of being genuine and being able to be verified
and trusted; confidence in the validity of a transmission, a message, or
message originator. This means verifying that users are who they say they
are and that each input arriving at the system came from a trusted source
AES Parameters
■ No. of Rounds is 10
1. AES instead processes the entire data block as a single matrix during each
round using substitutions and permutation.
4. The structure is quite simple. For both encryption and decryption, the
cipher begins with an AddRoundKey stage, followed by nine rounds that each
includes all four stages, followed by a tenth round of three stages.
5. Only the AddRoundKey stage makes use of the key. For this reason, the
cipher begins and ends with an AddRoundKey stage. Any other stage,
applied at the beginning or end, is reversible without knowledge of the key
and so would add no security.
6. The AddRoundKey stage is, in effect, a form of Vernam cipher and by itself
would not be formidable. The other three stages together provide confusion,
diffusion, and nonlinearity, but by themselves would provide no security
because they do not use the key. We can view the cipher as alternating
operations of XOR encryption (AddRoundKey) of a block, followed by
scrambling of the block (the other three stages), followed by XOR encryption,
and so on.This scheme is both efficient and highly secure.
7. Each stage is easily reversible. For the Substitute Byte, ShiftRows, and
MixColumns stages, an inverse function is used in the decryption algorithm.
For the AddRoundKey stage, the inverse is achieved by XORing the same
round key to the block.
8. The decryption algorithm makes use of the expanded key in reverse order.
The decryption algorithm is not identical to the encryption algorithm.
9. The final round of both encryption and decryption consists of only three
Stages. This is a consequence of the particular structure of aes and is
required to make the cipher reversible.
b) Describe DES algorithm with neat diagram and explain the steps.
64-bit key is used as input to the algorithm. The bits of the key are
numbered from 1 through 64. The key is first subjected to a permutation
governed by a table labeled Permuted Choice One. The resulting 56-bit key
is then treated as
two 28-bit quantities, labeled C0 and D0. At each round, Ci-1 and Di-1 are
separately subjected to a circular left shift or (rotation) of 1 or 2 bits.
These shifted values serve as input to the next round. They also serve as
input to the part labeled Permuted Choice Two, which produces a 48-bit
output that serves as input to the function F(Ri-1, Ki).
DES Decryption
The Avalanche Effect That a small change in either the plaintext or the key
should produce a significant change in the cipher text. a change in one bit of
the plaintext or one bit of the key should produce a change in many bits of
the cipher text. This is referred to as the avalanche effect.