lecture 6
lecture 6
Lecture 6
Cryptography and Watermarking Techniques
Presented By
Dr.Marwa SharF eldin
Department of Computer Science and Engineering
Faculty of Electronics Engineering
Menoufia University
11/20/2024 1
In Previous Lecture, we covered:
✓Objectives of Information Security.
✓Cryptology.
✓Cryptosystem Types.
11/20/2024 2
Agenda
Case Study 3: WannaCry Ransomware
Cryptosystem Attacks
Digital Watermarking
Summary
11/20/2024 3
Case Study 3: WannaCry Ransomware
11/20/2024 4
11/20/2024 5
WannaCry Ransomware
✓ Ransom malware, or ransomware, is a type of malware that
prevents users from accessing their system or personal files and
demands ransom payment in order to regain access.
11/20/2024 7
Cryptosystem Attacks
11/20/2024 8
Cryptosystem Attacks
✓ Attacks are typically categorized based on the action performed
by the attacker. An attack can be passive or active.
1.Passive Attacks
2.Active Attacks
11/20/2024 9
Passive Attack
✓ The main goal of a passive attack is to obtain unauthorized access
to the information.
✓ The actions such as intercepting on the communication channel
can be regarded as passive attack.
✓ A passive attack is often seen as stealing information.
✓ Stealing information is that theft of data still leaves the owner in
ownership of that data.
✓ Passive information attack is dangerous because information
theft may go unnoticed by the owner.
11/20/2024 10
Passive Attack Operation
11/20/2024 11
Active Attack
✓ An active attack involves changing the information by
conducting some process on the information.
11/20/2024 13
Classical Cryptographic Systems
11/20/2024 14
Classical Cryptographic Systems
✓ The Classical cryptographic systems are also known as Ciphers.
✓ The cipher is simply just a set of steps (an algorithm) for
performing both encryption and decryption.
✓ All Classical cryptographic systems are based on symmetric key
encryption scheme.
✓ The Classical cryptographic systems worked on alphabets as basic
element but modern systems which are digital and treat data as
binary numbers.
✓ The only security service these systems provide is confidentiality of
information.
11/20/2024 15
Modern Cryptographic Systems
11/20/2024 16
Modern Cryptographic Systems
✓ Digital data is represented in strings of binary digits (bits) unlike
alphabets.
✓ Modern cryptographic systems need to process this binary strings
to convert in to another binary string.
2. Stream Ciphers
11/20/2024 17
Block Ciphers
✓ In Block Ciphers, the plain binary text is processed in blocks
(groups) of bits at a time.
11/20/2024 18
Stream Ciphers
✓ In Stream Ciphers, the plain binary text is processed in one bit at
a time.
11/20/2024 19
Digital Watermarking
11/20/2024 20
Digital Watermarking
11/20/2024 21
Watermarking Life Cycle
11/20/2024 22
Watermarking Life Cycle (cont.)
The life cycle of digital watermarking consists of three steps:
1. Embedding: an algorithm accepts the host signal and the data to be embedded, and produces
a watermarked signal to be transmitted to another person or stored.
11/20/2024 24
Watermarking Requirements (cont.)
The ideal characteristics of digital watermarking are:
1. Imperceptibility: the watermarked signal should be invisible for human eye. In other
words, the original host signal should not be affected by the embedded data.
3. Capacity: the volume of data that can be embedded in the host signal should be large as
much as possible.
11/20/2024 25
Watermarking Applications
Digital watermarking can be used in many applications such as:
1. Military applications
2. Copyright Protection
3. Medical Applications
4. Broadcast Monitoring
11/20/2024 26
Summary
11/20/2024 27
Summary
In This presentation, we covered:
✓ Case Study 3: WannaCry Ransomware.
✓ Cryptosystem Attacks.
11/20/2024 28
11/20/2024 29
11/20/2024 30