Untitled Document
Untitled Document
• Hardware: Including computer systems and other data processing, data storage,
and data communications devices
• Software: Including the operating system, system utilities, and applications.
• Data: Including files and databases, as well as security-related data, such as
password files.
• Communication facilities and networks: Local and wide area network
communication links, bridges, routers, and so on.
Adversary (threat agent) : An entity that attacks, or is a threat to, a system.
Attack: an intelligent act that is a deliberate attempt to evade security services
and violate the security policy of a system.
Countermeasure An action, device, procedure, or technique that reduces a threat,
a vulnerability, or an attack by eliminating or preventing it.
Risk An expectation of loss expressed as the probability that a threat will exploit a
vulnerability with a harmful result.
Security Policy A set of rules and practices that specify or regulate how a system
or organization provides security services to protect sensitive and critical system
resources
OSI Security architecture
•Attack: An assault on system security that derives from an intelligent threat; that
is, an intelligent act that is a deliberate attempt (especially in the sense of a
method or technique) to evade security services and violate the security policy of
a system.
b.Replay involves the passive capture of a data unit and its subsequent
re-transmission to produce an unauthorized effect.
•On the other hand, it is quite difficult to prevent active attacks absolutely,
because of the wide variety of potential physical, software, and network
vulnerabilities.
•The goal is to detect active attacks and to recover from any disruption or
delays caused by them.
•Symmetric encryption is a form of cryptosystem in which encryption and
decryption are performed using the same key. It is also known as conventional
encryption.Symmetric encryption transforms plaintext into ciphertext using a
secret key and an encryption algorithm. Using the same key and a decryption
algorithm, the plaintext is recovered from the ciphertext.
1.Plaintext: the original message or data that is fed into the algorithm as input.
3.Secret key: The secret key is also input to the encryption algorithm. The key is
a value independent of the plaintext and of the algorithm.
2.Sender and receiver must have obtained copies of the secret key in a secure
fashion and must keep the key secure.
ØIf the sender and receiver use different keys, the system is referred to as
asymmetric, two-key, or public-key encryption.•The way in which the plaintext is
processed. ØA block cipher processes the input one block of elements at a time,
producing an output block for each input block. ØA stream cipher processes the
input elements continuously, producing output one element at a time.
That means it takes 128 bits as input and outputs 128 bits of encrypted cipher
text. AES relies on the substitution-permutation network principle, which is
performed using a series of linked operations that involve replacing and
shuffling the input data.
AES performs operations on bytes of data rather than in bits. Since the block size
is 128 bits, the cipher processes 128 bits (or 16 bytes) of the input data at a time.
A Key Schedule algorithm calculates all the round keys from the key. So the
initial key is used to create many different round keys which will be used in the
corresponding round of the encryption.
Each round comprises of 4 steps : SubBytes,ShiftRows,MixColumn, Add Round
Data storage: AES is used to encrypt sensitive data stored on hard drives, USB
drives, and other storage media, protecting it from unauthorized access in case
of loss or theft.
Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has
played a significant role in data security. Data encryption standard (DES) has been
found vulnerable to very powerful attacks therefore, the popularity of DES has
been found slightly on the decline. DES is a block cipher and encrypts data in
blocks of size of 64 bits each, which means 64 bits of plain text go as the input to
DES, which produces 64 bits of ciphertext. The same algorithm and key are used
for encryption and decryption, with minor differences. The key length is 56 bits.
Key Generation and Initial Setup: The original 64-bit key is reduced to a 56-bit key
by discarding every 8th bit (bits at positions 8, 16, 24, 32, 40, 48, 56, and 64).
DES works based on two cryptographic principles: substitution (confusion) and
transposition (diffusion), which are applied across 16 rounds of encryption.
Encryption Process:
2. Key Transformation:The 56-bit key is split into two 28-bit halves.Each half is
circularly shifted (1 or 2 positions per round) to generate a new 48-bit
subkey for each of the 16 rounds.A Compression Permutation selects 48
bits from the 56-bit key to form the subkey, making sure a unique subset of
key bits is used in each round.
Key Features of DES: Substitution (S-Boxes): Replaces input bits with different bits
based on a predefined table. Permutation: Transposes bits for diffusion, spreading
the information across the ciphertext.Key Transformation and Compression: Key
bits are reduced and shifted to create subkeys for each round.
DES's Strength:The use of substitution and permutation, along with shifting and
compressing the key, creates a highly complex encryption system, making it
resistant to simple attacks.Weaknesses:DES is vulnerable to brute-force attacks
due to the relatively small 56-bit key size (now considered insecure for modern
applications).