Cryptography & Network Security Btaioe604B: Examination Scheme
Cryptography & Network Security Btaioe604B: Examination Scheme
BTAIOE604B
Examination Scheme
Theory
CA MSE ESE Total
20 20 60 100
1.1What is computer security?
• Computer security basically is the protection of computer systems and
information from harm, theft, and unauthorized use. It is the process
of preventing and detecting unauthorized use of your computer
system.
OR
• Computer security can be defined as controls that are put in place to
provide confidentiality, integrity, and availability for all components of
computer systems.
• Data theft is act of stealing sensitive information such as bank account details,
credit card information, passwords, and documents which stored on computers,
servers, or other devices. The most common reasons of data breaches are as
follows:
• Malicious insiders
• Human Error
• So, prevent from data theft you have to ensure that your device is secured by
endpoint security, lock down your system, identify critical data and use
authentication.
1.3 Need of Computer Security: Continue….
4. To Prevent Viruses and Malware
• Computer security is also important to protect from computer viruses and
malware. A computer virus or malware can corrupt or delete your sensitive data,
damage your hard disk and it spreads from one computer to another using email
program and others. So, you have to protect your computer from viruses and
malware using following these tips:
• If hackers can get access your computer then they gain control your all sensitive
information. In modern times, hackers are very smart and they will try to get
access your computer system anyway without your acknowledgement.
• They can serious impact on your business or professions. So, security is important
for us in order to stop or prevent from unauthorized users.
1.4 Principles of Computer Security:
• It is important to understand Security principles in order to manage the
information security of any system.
• Security principles are the building blocks to identify the type of attack
and solution for that.
• These are the set of standards that are designed to minimize the
vulnerability of systems and services to attackers who may obtain
unauthorized access to sensitive data and misuse it.
• For example, suppose user X wants to send a message to user Y, and X does not
want some else to get access to this message, or if it gets access, he/she does not
come to know about the details. But if user Z somehow gets access to this secret
message, which is not desired, then the purpose of this confidentiality gets fail.
• This leads to the interception. i.e. if user Z access the secret message or email sent
by user X to Y without permission of X and Y, then it is called an interception.
Interception causes loss of message confidentiality.
1.4 Principles of Computer Security: Continue….
2. Authentication:
• The authentication principle of security establishes proof of identity, it ensures
that the origin of a document or electronic message is correctly identified. For
example suppose user Z sends a message to user Y, however, the trouble is that
user Z posed as user X while sending a message to user Y. How would user Y know
that message comes from Z, not X. This leads to the fabrication attack. For example
• The attacker can act as user X and sends fund transfer request( from X’ account to
attacker account) to a bank, and the bank will transfer the amount as requested
from X’s account to attacker, as banks think fund transfer request comes from user
X. Fabrication is possible in absence of proper authentication mechanism.
1.4 Principles of Computer Security: Continue….
3. Integrity:
• The integrity principle of security states that the message should not be
altered.
• In other words, we can say that, when the content of the message changes
after the sender sends it, but before it reaches the intended receiver, we
can say that integrity of the message is lost.
• User Y and User X does not have any knowledge that the content of the
message was changed after user X send it to Y. This leads to a
modification. Modification causes loss of message integrity.
1.4 Principles of Computer Security: Continue….
4. Non-repudiation:
• Non-repudiation principle of security does not allow the sender of a message to
refute(reject) the claim of not sending that message.
• There are some situations where the user sends a message and later on refuses
that he/she had sent that message.
• For example, user X sends requests to the bank for fund transfer over the internet.
After the bank performs fund transfer based on user X request, User X cannot
claim that he/she never sent the fund transfer request to the bank. This principle
of security defeats such possibilities of denying something after having done it.
1.4 Principles of Computer Security: Continue….
5. Access control
• Access control principles of security determine who should be able to access what.
i.e. we can specify that what users can access which functions,
• for example, we can specify that user X can view the database record but cannot
update them, but user Y can access both, can view record, and can update them.
This principle is broadly related to two areas – role management and rule
management where role management concentrates on the user side. i.e. which
user can do what and rule management concentrate on the resources side i.e.
which resource is available.
• Based on this matrix is prepared, which lists the user against q list of items they
can access. The access control list is a subset of the access control matrix.
1.4 Principles of Computer Security: Continue….
6. Availability:
• The availability principle of security states that resources should be available to the
authorized person at all times.
• Privacy: It deals with the individual’s right to access the personal information
• Accessibility: It deals with what information does an organization has the right to
collect.
1.5 Security Approaches:
• Information security is the set of procedures to protect information from
disruption, misuse, destruction, disclosure, modification, or unauthorized access.
1. Bottom-Up Approach
• The responsibility of the system administrator, cyber engineer, or network security
professional does not include top-level management positions.
• The main duty of such individuals is to secure the information system by using
their expertise, knowledge, education, and training to build a highly secure model.
2. Top-Up Approach:
• The approach is created, initiated, or implemented by top-level management. This
approach implements data security by instruction procedures, creating an
information security policy, and following procedures.
• The priority and liability of project activities are taken by top-level management.
• The top-level managers take help from other professionals in the InfoSec system.
1.5 Security Approaches: Continue…..
The existing team or individual is assigned instead of new hire which is a way to
save time, and money in a complex plan. It is a great way to use available valuable
resources.
2. Top-Up Approach:
• The approach is created, initiated, or implemented by top-level management. This
approach implements data security by instruction procedures, creating an
information security policy, and following procedures.
• The priority and liability of project activities are taken by top-level management.
• The top-level managers take help from other professionals in the InfoSec system.
1.5 Security Approaches: Continue…..
• Advantages of the Top-up Approach:
The top-up approach is more efficient than the bottom-up approach.
The company’s management level is more powerful for protecting data than an
individual or team considering company-wide priority.
• Types of Attacks:
• Attacks can be grouped into two types:
1. Active Attack
2. Passive Attack
1. Active Attack:
• An Active attack attempts to alter system resources or affect their operations.
• Active attacks involve some modification of the data stream or the creation of false
statements.
a. Masquerade
b. Modification of messages
c. Repudiation
d. Replay
e. Denial of Service
2. Passive Attack:
• A Passive attack attempts to learn or make use of information from the system but
does not affect system resources.
• Traffic analysis
1.6.1. Types of Active Attacks:
1. Masquerade /Interruption
• A masquerade attack takes place when one entity pretends to be a different entity.
• It basically means that unauthorized parties not only gain access to data but also
spoof the data by triggering denial-of-service attacks, such as altering transmitted
data packets or flooding the network with fake data.
• With this attack, the author’s information can be changed by actions of a malicious
user in order to save false data in log files, up to the general manipulation of data
on behalf of others, similar to the spoofing of e-mail messages.
4. Replay :
• It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect.
• In this attack, the basic aim of the attacker is to save a copy of the data originally
present on that particular network and later on use this data for personal uses.
Once the data is corrupted or leaked it is insecure and unsafe for the users.
5. Denial of Service Attack:
• Denial of Service (DoS) is a cyber-attack on an individual Computer or Website
with the intent to deny services to intended users.
• They can cause computers and routers to crash and links to slow down.
5. Denial of Service Attack: Continue……
• One common example involves triggering a rapid series of false login attempts that
lockout accounts from being able to log in.
2. Inaccessible services
4. Connection interference
5. Denial of Service Attack: Continue…..
• The most famous DoS technique is 1) Ping of Death.
2) Flooding.
1) Ping of Death:
• The Ping of Death attack works by generating and sending special network
messages (specifically, ICMP packets of non-standard sizes) that cause problems
for systems that receive them.
• In the early days of the Web, this attack could cause unprotected Internet servers
to crash quickly.
2) Flooding:
• Flooding a network with useless activity so that genuine traffic cannot get
through. The TCP/IP SYN and smurf attacks are two common examples.
• The opponent could determine the location and identity of communicating host
and could observe the frequency and length of messages being exchanged.
• This information might be useful in guessing the nature of the communication that
was taking place.
• These services are intended to counter security attacks, and they make use of one
or more security mechanisms to provide the service.
•
1.7 Security Services: Continue…….
1. Authentication: The assurance that the communicating entity is the one that it
claims to be.
4. Data Integrity: The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion, deletion, or replay).
1.7 Security Services: Continue…….
5. Non-repudiation: Protects against denial by one of the entities involved in a
communication of having participated in all or part of the communication.
a) Proof of Origin: Proof that the message was sent by the specified party.
b) Proof of Delivery: Proof that the message was received by the specified party.
1.8 Security Mechanisms:
• A process (or a device incorporating such a process) that is designed to detect,
prevent, or recover from a security attack.
• The mechanisms are divided into those that are implemented in a specific protocol
layer, such as TCP or an application-layer protocol.
1.8 Security Mechanisms: Continue……
1. Encipherment: Encipherment is hiding or covering data and can provide
confidentiality.
• It makes use of mathematical algorithms to transform data into a form that is not
readily intelligible.
2. Data integrity: The data integrity mechanism appends a short check value to
the data which is created by a specific process from the data itself.
• The receiver receives the data and the check value. The receiver then creates a
new check value from the received data and compares the newly created check
• The sender uses a process in which the sender owns a private key related to the
• The receiver uses the sender's public key to prove the message is indeed signed by
• The two entities exchange some messages to prove their identity to each other.
• Cryptology, on the other hand, is the study of the conversion of plain text to
cipher text and vice versa. It is also called the study of encryption and
decryption.
Sr
No. Cryptography Cryptology
• Decryption is the process of converting meaningless message (Cipher text) into its
original form (Plain text).
1.9.7 Difference between Encryption and Decryption:
Sr.NO Encryption Decryption
Encryption is the process which take place Decryption is the process which take place
2.
at sender’s end. at receiver’s end.
Its major task is to convert the plain text Its main task is to convert the cipher text
3.
into cipher text. into plain text.
Any message can be encrypted with either The encrypted message can be decrypted
4.
secret key or public key. with either secret key or private key.
• Substitution Technique:
• Caesar Cipher
• Monoalphabetic Cipher
• Playfair Cipher
• Hill Cipher
• Polyalphabetic Cipher
• One-Time Pad
•
1.10.1 Caesar Cipher:
• This the simplest substitution cipher by Julius Caesar. In this substitution
technique, to encrypt the plain text, each alphabet of the plain text is replaced by
the alphabet three places further it. And to decrypt the cipher text each alphabet
of cipher text is replaced by the alphabet three places before it.
• Look at the example above, we have replaced, ‘m’ with ‘p’ which occur three
places after, ‘m’. Similarly, ‘e’ is replaced with ‘h’ which occurs in three places after
‘e’.
• If we have to replace the letter ‘z’ then the next three alphabets counted after ‘z’
will be ‘a’ ‘b’ ‘c’. So, while counting further three alphabets if ‘z’ occurs it circularly
follows ‘a’.
1.10.1 Caesar Cipher: Continue…..
• On receiving the cipher text, the receiver who also knows the secret shift,
positions his sliding ruler underneath the cipher text alphabet and slides it to
RIGHT by the agreed shift number, 3 in this case.
• He then replaces the cipher text letter by the plaintext letter on the sliding ruler
underneath. Hence the cipher text “phhw ph wrpruurz” is decrypted to “meet me
tomorrow”.
To decrypt
•Ciphe A B C aD message
E F G H encoded
I J with
K L aMShift
N of
O 3,P generate
Q R S the
T plain
U Vtext
W alphabet
X Y Z
r text
by using a shift of ‘-3’ as shown below:
Plain X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
text
1.10.1 Caesar Cipher: Continue…..
• The encryption can also be represented using modular arithmetic by first
transforming the letters into numbers, according to scheme, A=0, B=1, C=2,..,Z=25.
En(x) = (x + n) mod 26
Dn(x) = (x - n) mod 26
• If the hacker knows that the Caesar cipher is used then to perform brute force
cryptanalysis, he has only to try 26 possible keys to decrypt the plain text.
The hacker is also aware of the encryption and decryption algorithm.
•
1.10.2 Modified Caesar Cipher:
• In Modified Caesar Cipher the original plain text alphabets may not necessarily be
three places down the line, but instead can be any places down the line.
• It can be replaced by any valid alphabet i.e by E or F or by G and so on. Once the
replacement scheme is decided, it would be constant and will be used for all the
other alphabets in that message.
• An attack on cipher text message, wherein the attacker attempts to use all possible
permutations and combinations is known as a Brute-force attack.
1.10.3 Monoalphabetic Cipher:
• Monoalphabetic cipher is a type of encryption technique in cryptography where
each character of the plain text is mapped to another fixed character of the cipher
text.
• The relationship between the plain text character and the cipher text character is
one-to-one.
• For example: If the plain text has a character 'a' and the value of the key is 5, then
'a' will be substituted with 'f' because 'f' is 5 characters from 'a' as per the key used
for the additive monoalphabetic cipher process.
• Encryption process: The formula for encryption of plain text to cipher text in
additive monoalphabetic cipher is: C=(P+k) mod 26,
• Here, P is the character in plain text, k is the key being used for defining the
encryption process, and C is the required cipher text.
• Decryption process: The formula for the decryption process of cipher text to
plain text in additive cipher is: P=(C−k) mod 26
• Here, P is the plain text, C is the cipher text from which we need to convert to
plain text and k is the key.
• For example, if the plain text is: 'this is encryption.' with the key being 4, then
the cipher text becomes: 'xlmw mw irgvctxmsr'.
1.10.3 Monoalphabetic Cipher: Continue……..
2. Multiplicative cipher:
• Multiplicative cipher is a type of monoalphabetic cipher where a character in the
plain text is multiplied by the key after which the modulus function is applied.
• For example, if the plain text has a character 'h' and if the key is set to 4, then the
value of the cipher text is ‘c'.
• Encryption process:
• The formula for encryption of plain text to cipher text in multiplicative cipher
is C=(P k) mod 26.
• Decryption process:
• The formula for decryption of cipher text to plain text in multiplicative cipher
is P=(C multiplicative inverse of k) mod 26.
• For example, if the plain text has 'hello world' as the plain text with the key
being 5, then the cipher text becomes: 'judds gshdp'.
1.10.4 Playfair Cipher:
• What is Playfair Cipher?
• An initial 5×5 matrix key table is created. The plaintext encryption key is made out
of the matrix’s alphabetic characters.
• Be mindful that you shouldn’t repeat the letters. There are 26 alphabets however,
there are only 25 spaces in which we can place a letter.
• The matrix will delete the extra letter because there is an excess of one letter
(typically J). Despite this, J is there in the plaintext before being changed to I.
1.10.4 Playfair Cipher: Continue…….
• Encryption rules: Playfair Cipher
• Split the plaintext first into digraphs (pairs of two letters). If the plaintext has an odd
number of letters, append the letter Z at the end.
• Even the text in the basic form of The MANGO plaintext, for instance, consists of five
letters. Consequently, it is not possible to make a digraph. As a result, we will change
the plaintext to MANGOZ by adding the letter Z at the end.
• Divide the plaintext into digraphs after that (pair of two letters). For any letter that
appears twice, place an X there (side by side). Think about the scenario where the
digraph is CO MX MU NI CA TE and the plaintext is COMMUNICATE.
• For plaintext GREET, the digraph will be GR EX ET, but for plaintext JAZZ, the digraph will
be JA ZX ZX.
• To identify the cipher (encryption) text, create a 5*5 key-matrix or key-table and fill it
with alphabetic letters as follows:
1.10.4 Playfair Cipher: Continue…….
• The first row, from left to right, should include the letters for the supplied keyword
(ATHENS). If there are any duplicate letters in a keyword, avoid using them. This
means a letter will only be taken into account once. Fill in the remaining letters
alphabetically after that. Let’s create a 5*5 key-matrix for the keyword ATHENS.
•
1.10.4 Playfair Cipher: Continue…….
• The following three scenarios :
i) If two letters occur together in a row as a digraph, Each letter in the digraph,
in this case, should be replaced with the letter that is immediate to its right. If there is
no letter to the right, the first letter in the same row is considered to be the right
letter. Assuming Z is a letter for which the appropriate letter is required, T will be the
appropriate letter in this situation.
1.10.4 Playfair Cipher: Continue…….
ii) If a pair of letters (digraph) appears in the same column:
• In this case, replace each letter of the digraph with the letters immediately below
them. If there is no letter below, wrap around to the top of the same column.
Suppose, W is a letter whose below letter is required, in such case, V will be below
W.
1.10.4 Playfair Cipher: Continue…….
iii) In the event that a digraph (a pair of letters) is present in both its
corresponding row and column:
• To generate a cipher for a pair of letters within a 3X3 matrix, a 3X3 subset is
selected from a larger 5*5 matrix. Specifically, two square corners within the
matrix are chosen, which are positioned on opposite sides of a square. The
remaining corner serves as the substitution for the given digraph.
1.10.4 Playfair Cipher: Continue…….
• In simpler terms, the cipher for the first letter will be the intersection of the letters
H and Y.
• Let’s consider the scenario where we need to create a cipher for the digraph HY. As
observed, both H and Y are situated in different rows and columns.
1.10.4 Playfair Cipher: Continue…….
• In simpler terms, the cipher for the first letter will be the intersection of the letters
H and Y.
• Let’s consider the scenario where we need to create a cipher for the digraph HY. As
observed, both H and Y are situated in different rows and columns.
1.10.4 Playfair Cipher: Continue…….
• Decryption rules: Playfair Cipher
• Decryption procedures are used in reverse order as encryption procedures.
• When decrypting, the cipher is symmetric (move left along rows and up along
columns).
• The same key and key table that are used to decode the message are accessible to
the recipient of plain text.
2. Make a key matrix that is 5 by 5. (by rule 3). The significant element in our
circumstances is the computer.3. We will now look through each key-matrix pair
individually to find the corresponding encipher.
•
1.10.4 Playfair Cipher: Continue…….
• The fourth digraph is NI. The pair is visible in several rows and columns. NI is
encrypted into SG using Rule 4(iii).
• The sixth digraph is CA. The pair is visible in several rows and columns. Rule 4(iii)
states are used by CA to encrypt data.
• To decrypt the message, each block is multiplied by the inverse of the matrix used
for encryption.
• The matrix used for encryption is the cipher key, and it should be chosen randomly
from the set of invertible n × n matrices (modulo 26).
• Decryption
• To decrypt the message, we turn the cipher text back into a vector, then simply
multiply by the inverse matrix of the key matrix.
1.10.5 Hill Cipher: Continue…….
• Encryption:
• We have to encrypt the message ‘ACT’ (n=3).The key is ‘GYBNQKURP’ which can be
written as the nxn matrix:
➢ For performing the encryption and decryption, a matrix known as the Vigenère
tableau is constructed
1.10.6 Polyalphabetic Cipher: Continue…….
• Vigenere Table:
1.10.6 Polyalphabetic Cipher: Continue…….
• How this Cipher Works
• Write your keyword across the top of the text you want to encipher, repeating it as
many times as necessary.
• For each letter, look at the letter of the keyword above it (if it was 'M', then you
would go to the row that starts with an 'M'), and find that row in the Vigenere
table.
• Then find the column of your plaintext letter (for example, 'w', so the twenty-third
column).
• Finally, trace down that column until you reach the row you found before and
write down the letter in the cell where they intersect (in this case, you find an 'I'
there).
1.10.6 Polyalphabetic Cipher: Continue…….
• Example:Given Key – MEC
• Key:M E C M E C M E C M E C M E C M E C M E C M
• Plaintext:w e n e e d m o r e s u p p l i e s f a s t
• Ciphertext:I I P Q I F Y S T Q W W B T N U I U R E U F
1.10.7 Vernam Cipher in Cryptography
• Vernam Cipher is a method of encrypting alphabetic text. It is one of the
Substitution techniques for converting plain text into cipher text.
• Method to take key: In the Vernam cipher algorithm, we take a key to encrypt the
plain text whose length should be equal to the length of the plain text.
• Encryption Algorithm
Step1: Assign a number to each character of the plain text and the key according to
alphabetical order.
Step2: Bitwise XOR both the number (Corresponding plain-text character number and
Step3: Subtract the number from 26 if the resulting number is greater than or equal to
The key should be randomly generated as long as the size of the message.
The key is to be used to encrypt and decrypt a single message, and then it is
discarded.
• So encrypting every new message requires a new key of the same length as the
new message in one-time pad.
• The cipher text generated by the One-Time pad is random, so it does not have any
statistical relation with the plain text.
•
1.10.8 One Time Pad Cipher: Continue………..
• Examples:
• Input: Message = HELLO, Key = MONEY
• Output: Cipher – TSYPM,
Explanation: Plain text — H E L L O Key — M O N E Y
7 4 11 11 14 12 14 13 4 24
• Calculate Plain text + key = 19 18 24 15 38
19 18 24 15 12 (= 38 – 26)
• Cipher Text = T S Y P M
1.11 Transposition Techniques:
• The transposition technique is a cryptographic technique that converts the plain
text to cipher text by performing permutations on the plain text, i.e., changing
each character of plain text for each round.
• On the one hand, the substitution technique substitutes a plain text symbol with a
cipher text symbol. On the other hand, the transposition technique executes
permutation on the plain text to obtain the cipher text.
• Various Transposition techniques are:
1. The Rail Fence technique.
2. Simple columnar transposition technique.
3. Simple columnar transposition technique with multiple rounds.
4. Vernam cipher.
5. Book Cipher.
1.11.1 The Rail Fence technique:
• Rail-Fence is the simple Transposition technique that involves writing plain text as
a sequence of diagonals and then reading it row by row to produce the cipher text.
• Algorithm:
Step 1: Write down all the characters of plain text message in a sequence of
diagnosis.
Example: Suppose plain text corporate bridge, and we want to create the cipher text
of the given.
First, we arrange the plain text in a sequence of diagnosis, as shown below.
• Now read the plain text by row-wise, i.e. croaerdeoprtbig.
• So, here the plain text is a “corporate bridge” and cipher text is “croaerdeoprtbig”.
• Algorithm:
Step 1: Write all the characters of plain text message row by row in a rectangle of
predefined size.
Step 2: Read the message in a columnar manner, i.e. column by column.
Note: For reading the message, it needs not to be in the order of columns. It can
happen in any random sequence.
Step 3: The resultant message is cipher text.
1. Simples columnar transposition technique – basic technique:
Example: Let’s assume that Plain text is a corporate bridge, and we need to calculate
the cipher text using a simple columnar transposition technique.
• Let’s take 6 columns and arrange the plain text in a row-wise manner.
c o r p o r
a t e b r i
d g e
• Decide the column order for reading the message – let’s assume 1,3,5,2,4,6 is an
order.
• Now read the message in a columnar manner using the decided order. –
cadreeorotgpbri, this is a cipher text.
1.12 Steganography:
• Steganography is the art and science of writing hidden message in such a way that
no one, apart from the sender and intended recipient, suspects the existence of
the message.
computer files (such as graphics, sound, text, html or even floppy disks) with bits
• This hidden information can be plain text, cipher text or even images.
• In modern steganography, data is first encrypted by the usual means and then
inserted, using a special algorithm, into redundant data that is part of a particular
• Cover media is the file in which we will hide the hidden data, which may also be
encrypted using stego-key. Cover-media can be image or audio file.
• Since the computer description of an image contains multiple bits, images are
frequently used as a cover source in digital steganography.
b. Message - Real data that you can mask within pictures. The message may be in
the form of standard text or an image.
1.12.2 Different Types of Steganography Continue……..
c. Stego-Image − A stego image is an image with a hidden message.
• Steganography can be used in the case of secret channels, which occur in the OSI
layer network model.
1.13 A Model For Network Security:
• For a message to be sent or receive there must be a sender and a receiver. Both
the sender and receiver must also be mutually agreeing to the sharing of the
message.
• A logical route is defined through the network (Internet), from sender to the
receiver and using the communication protocols both the sender and the receiver
established communication.
• We are concerned about the security of the message over the network when the
message has some confidential or authentic information which has a threat from
an opponent present at the information channel.
• Any security service would have the three components discussed below:
1.13 A Model For Network Security: Continue……..
1. Transformation of the information which has to be sent to the receiver. So, that any
opponent present at the information channel is unable to read the message. This
indicates the encryption of the message.
• It also includes the addition of code during the transformation of the information
which will be used in verifying the identity of the authentic receiver.
2. Sharing of the secret information between sender and receiver of which the
opponent must not have any clue. i.e. encryption key which is used during the
encryption of the message at the sender’s end and also during the decryption of
message at receiver’s end.
3. There must be a trusted third party which should take the responsibility
of distributing the secret information (key) to both the communicating parties and
also prevent it from any opponent.
1.13 A Model For Network Security: Continue……..
• Following figure shows General Network Security Model:
• considering this general model of network security, one must consider the
following four tasks while designing the security model.
1.13 A Model For Network Security: Continue……..
4. Specify a protocol to be used by the two parties that make use of the
security algorithm and the secret information to achieve a particular
security service.
• It is also taken care that the communication protocols that are used by the
communicating parties should be supporting the security algorithm and the secret
key in order to achieve the security service.
1.14 Key Size and Key Range:
• In cryptography, "key size" refers to the length of a cryptographic key, usually
expressed in bits. The larger the key size, the more secure the encryption and
decryption process is. The most commonly used key sizes are 128-bit, 192-bit, and
256-bit.
• "Key range" refers to the set of all possible keys that can be used in cryptography.
The range is determined by the key size and the underlying algorithm, and it
affects the security of the encryption. A larger key range allows for a greater
number of possible keys, increasing the difficulty for an attacker to guess the
correct key and decrypt the message.
•