0% found this document useful (0 votes)
4 views

lecture 6

The lecture presented by Dr. Marwa SharF eldin at Menoufia University covers various aspects of cryptography and watermarking techniques, including a case study on WannaCry ransomware. It discusses the types of cryptosystem attacks, classical and modern cryptographic systems, and the principles of digital watermarking. Key topics include the operations of passive and active attacks, the characteristics of digital watermarking, and its applications.

Uploaded by

Ebraam Nabil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

lecture 6

The lecture presented by Dr. Marwa SharF eldin at Menoufia University covers various aspects of cryptography and watermarking techniques, including a case study on WannaCry ransomware. It discusses the types of cryptosystem attacks, classical and modern cryptographic systems, and the principles of digital watermarking. Key topics include the operations of passive and active attacks, the characteristics of digital watermarking, and its applications.

Uploaded by

Ebraam Nabil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Menoufia University

Faculty of Electronic Engineering


Department of Computer Science and Engineering
Computer and Information Security ()

Lecture 6
Cryptography and Watermarking Techniques
Presented By
Dr.Marwa SharF eldin
Department of Computer Science and Engineering
Faculty of Electronics Engineering
Menoufia University

11/20/2024 1
In Previous Lecture, we covered:
✓Objectives of Information Security.

✓Cryptology.

✓Cryptosystem Block Diagram.

✓Cryptosystem Types.

11/20/2024 2
Agenda
Case Study 3: WannaCry Ransomware

Cryptosystem Attacks

Classical Cryptographic Systems


Agenda

Modern Cryptographic Systems

Digital Watermarking

Summary

11/20/2024 3
Case Study 3: WannaCry Ransomware

11/20/2024 4
11/20/2024 5
WannaCry Ransomware
✓ Ransom malware, or ransomware, is a type of malware that
prevents users from accessing their system or personal files and
demands ransom payment in order to regain access.

✓ WannaCry is a ransomware that spread rapidly through across


a number of computer networks in May of 2017.

✓ It was infecting a Windows computers, it encrypts files on the


PC's hard drive, making them impossible for users to access, then
demands a ransom payment in Bitcoin/Credit Card in order to
decrypt them.
11/20/2024 6
How Ransomware Works

11/20/2024 7
Cryptosystem Attacks

11/20/2024 8
Cryptosystem Attacks
✓ Attacks are typically categorized based on the action performed
by the attacker. An attack can be passive or active.

1.Passive Attacks

2.Active Attacks

11/20/2024 9
Passive Attack
✓ The main goal of a passive attack is to obtain unauthorized access
to the information.
✓ The actions such as intercepting on the communication channel
can be regarded as passive attack.
✓ A passive attack is often seen as stealing information.
✓ Stealing information is that theft of data still leaves the owner in
ownership of that data.
✓ Passive information attack is dangerous because information
theft may go unnoticed by the owner.
11/20/2024 10
Passive Attack Operation

11/20/2024 11
Active Attack
✓ An active attack involves changing the information by
conducting some process on the information.

❑ Modifying the information in an unauthorized manner.


❑ Initiating unauthorized transmission of information.
❑ Alteration of authentication data such as originator name or
timestamp associated with information.
❑ Unauthorized deletion of data.
❑ Denial of access to information for legitimate users.
11/20/2024 12
Active Attack Operation

11/20/2024 13
Classical Cryptographic Systems

11/20/2024 14
Classical Cryptographic Systems
✓ The Classical cryptographic systems are also known as Ciphers.
✓ The cipher is simply just a set of steps (an algorithm) for
performing both encryption and decryption.
✓ All Classical cryptographic systems are based on symmetric key
encryption scheme.
✓ The Classical cryptographic systems worked on alphabets as basic
element but modern systems which are digital and treat data as
binary numbers.
✓ The only security service these systems provide is confidentiality of
information.
11/20/2024 15
Modern Cryptographic Systems

11/20/2024 16
Modern Cryptographic Systems
✓ Digital data is represented in strings of binary digits (bits) unlike
alphabets.
✓ Modern cryptographic systems need to process this binary strings
to convert in to another binary string.

✓ Based on how these binary strings are processed, encryption


schemes can be classified into:
1. Block Ciphers

2. Stream Ciphers

11/20/2024 17
Block Ciphers
✓ In Block Ciphers, the plain binary text is processed in blocks
(groups) of bits at a time.

✓ A block of plaintext bits is selected, a series of operations is


performed on this block to generate a block of ciphertext bits.

✓ The number of bits in a block is fixed. For example, the schemes


DES and AES have block sizes of 64 and 128, respectively.

11/20/2024 18
Stream Ciphers
✓ In Stream Ciphers, the plain binary text is processed in one bit at
a time.

✓ A one bit of plaintext bits is selected, a series of operations is


performed on this bit to generate a bit of ciphertext.

✓ The number of bits in a block is one bit. For example, the


schemes RC4 and RC5.

11/20/2024 19
Digital Watermarking

11/20/2024 20
Digital Watermarking

✓ Digital watermarking is the process of embedding


information into a signal (e.g. audio, video or pictures) in a
way that is difficult to remove.

✓ The question now is that, what is a watermark and how to


embed the watermark into a host signal?

11/20/2024 21
Watermarking Life Cycle

11/20/2024 22
Watermarking Life Cycle (cont.)
The life cycle of digital watermarking consists of three steps:

1. Embedding: an algorithm accepts the host signal and the data to be embedded, and produces
a watermarked signal to be transmitted to another person or stored.

2. Attack: unauthorized person try to attack or make modifications on the transmitted


watermarked signal.

3. Extraction: an algorithm applies on the received watermarked signal to extract the


embedded watermark from it. If the signal was unmodified during transmission, then the
watermark is still present and it may be extracted.
11/20/2024 23
Watermarking Requirements

11/20/2024 24
Watermarking Requirements (cont.)
The ideal characteristics of digital watermarking are:

1. Imperceptibility: the watermarked signal should be invisible for human eye. In other
words, the original host signal should not be affected by the embedded data.

2. Robustness: the watermarked signal should resist modifications (remove or eliminate


embedded data) by attacks (unauthorized person).

3. Capacity: the volume of data that can be embedded in the host signal should be large as
much as possible.

4. Security: the watermark should be detected only by the authorized person.

11/20/2024 25
Watermarking Applications
Digital watermarking can be used in many applications such as:

1. Military applications

2. Copyright Protection

3. Medical Applications

4. Broadcast Monitoring

11/20/2024 26
Summary

11/20/2024 27
Summary
In This presentation, we covered:
✓ Case Study 3: WannaCry Ransomware.

✓ Cryptosystem Attacks.

✓ Classical Cryptographic Systems.

✓ Modern Cryptographic Systems

✓Basics of Digital Watermarking.

11/20/2024 28
11/20/2024 29
11/20/2024 30

You might also like