Unit I
Unit I
CRYPTOGRAPHY AND
CYBER SECURITY
UNIT I INTRODUCTION TO SECURITY
• Computer Security Concepts – The OSI Security
Architecture – Security Attacks – Security
Services and Mechanisms – A Model for Network
Security – Classical encryption techniques:
Substitution techniques, Transposition
techniques, Steganography – Foundations of
modern cryptography: Perfect security –
Information Theory – Product Cryptosystem –
Cryptanalysis.
Cryptography
• Cryptography is the process of hiding or coding
information so that only the person a message
was intended for can read it.
• Individuals and organizations use cryptography on
a daily basis to protect their privacy and keep
their conversations and data confidential.
Cryptography ensures confidentiality by
encrypting sent messages using an algorithm with
a key only known to the sender and recipient.
History of Cryptography
• inscription carved around 1900 BC, in the main chamber of the tomb Egypt.
• In 1500 BC, a Mesopotamian scribe used cryptography to conceal a formula for
pottery glaze.
• around 100 BC, Julius Caesar was known to use a form of encryption to convey
secret messages to his army generals posted in the war front.(Substitution
cipher)
• During the 16th century, Vigenere designed a, the encryption key was repeated
multiple times spanning the entire message. the Vigènere cipher was broken in
1863 by Friedrich Kasiski.
• Cryptography played a huge role in both World War I and World War II. In 1918,
the Enigma Machine was created by German engineer Arthur Scheribus. By
World War II, it was used regularly by Nazi German military.
• The Enigma Machine was ultimately cracked by Poland, which led the British to
create the Bombe, a device that helped to identify the wheel order of the
Enigma machine and the rotors’ initial settings.
• that changed when businesses saw cryptography’s commercial potential to
secure data from competitors.
History of Cryptography
• 1970s, IBM created a cipher called Lucifer, a block cipher –
Symmetric key Algms
• The Data Encryption Standard(DES) uses a symmetric-key
algorithm and has a key-length of 56 bits To protect
sensitive electronic government data and a modified
version was accepted in 1976.
• In 1999, it was deciphered in 22 hours and 15 minutes by
Brute-force attack method.
• In 2001, the National Institute of Standards and Technology
(NIST), selected the Advanced Encryption Standard (AES)
• uses larger key lengths of 128, 192 and 256 bits, with a
block size of 128 bits.
Cyber Crime
• A cyber attack is any malicious attempt to gain
unauthorized access to a computer, computing
system or computer network with the intent to
cause damage.
Common types of cyber attacks
• Malware is a term used to describe malicious software,
including spyware, ransomware, viruses, and worms. when
a user clicks a dangerous link or email attachment that then
installs risky software.
• Phishing is the practice of sending fraudulent
communications that appear to come from a reputable
source, usually through email. The goal is to steal sensitive
data like credit card and login information or to install
malware on the victim’s machine.
• Man-in-the-middle (MitM) attacks, also known as
eavesdropping attacks.
• On unsecure public Wi-Fi
• Once malware has breached a device, an attacker can install
software to process all of the victim’s information.
• A Structured Query Language (SQL) injection occurs
when an attacker inserts malicious code into a server
that uses SQL and forces the server to reveal
information
• A zero-day exploit hits after a network vulnerability is
announced but before a patch or solution is
implemented. Attackers target the disclosed
vulnerability during this window of time.
• Social engineering attacks Social engineering is a
technique where attackers use psychological tactics to
manipulate people into taking a desired action.
Sources of cybersecurity threats
• Cybercriminals
• Hackers
• Nation-state actors
• Insider threats
Computer Security
Fabricate message
Modify message
RFC 2828:
“a processing or communication service provided by a
system to give a specific kind of protection to system
resources”
Nonrepudiation, Destination
Proof that the message was received by the
specified party.
Transposition Techniques
here letters of plaintext are replaced by other letters
or by numbers or symbols
Plain: abcdefghijklmnopqrstuvwxyz
Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
21/10/2024 Classical Encryption 61
Encrypting and
Decrypting
plaintext is encrypted two letters at a time
if a pair is a repeated letter, insert filler like 'X’
if both letters fall in the same row, replace each with letter to
right (wrapping back to start from end)
if both letters fall in the same column, replace each with the
letter below it (wrapping to top from bottom)
otherwise each letter is replaced by the letter in the same row
and in the column of the other letter of the pair
• Where, c1 = (k11p1+k12p2+k13p3)mod 26
c2 = (k21p1+k22p2+k23p3)mod 26
c3 = (k31p1+k32p2+k23p3)mod 26
• Example:
• Plaintext :paymoremoney
• Key:
17 17 5
21 18 21
2 2 19
• Cipher Text : rrlmwbkaspdh