Unit IV Computer System Security
Unit IV Computer System Security
We will see two aspects of the RSA cryptosystem, firstly generation of key
pair and secondly encryption-decryption algorithms .
Key Generation
Encryption/Decryption Function
RSA Public Key Cryptography
Public
1. Key Generation
3.Decryption
Alice generates her RSA keys by selecting two primes: p=11 and q=13. She
chooses e=7 for her public key. Compute her private key. Bob wants to send
Alice an encrypted message, M, so he obtains her RSA public key (n, e). His
plaintext message is just the number 9 and is encrypted into ciphertext, C, Find
Value of C.
Solution
Key generation
p=11 and q=13
n=pxq=11*13=143
ϕ(n)=(p−1)x(q−1)=10x12=120
e=7 public key(e,n)=(7,143)
exd=1 mod ϕ(n) or 7xd=1mod 120 or d=103
Encryption
Translation
Encryption
Compression
Application Layer
An application layer serves as a window for users and application
processes to access network service.
It handles issues such as network transparency, resource
allocation, etc.
An application layer is not an application, but it performs the
application layer functions.
This layer provides the network services to the end-users.
Functions of Application layer
File transfer, access, and management (FTAM)
Mail services
TCP Model
Application Layer
Application layer interacts with an application program, which is the highest level
of OSI model. The application layer is the OSI layer, which is closest to the end-
user. It means the OSI application layer allows users to interact with other
software application.
Application layer interacts with software applications to implement a
communicating component. The interpretation of data by the application
program is always outside the scope of the OSI model.
Example of the application layer is an application such as file transfer, email,
remote login, etc.
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP developed protocols then model. OSI developed model then protocol.
Real-World Protocols
2 SSL (Secure Socket Layer) is less secured as TLS (Transport Layer Security) provides high security.
compared to TLS(Transport Layer Security).
3 SSL (Secure Socket Layer) is the 3.0 version TLS (Transport Layer Security) is the 1.0 version..
4 In SSL( Secure Socket Layer), Message digest In TLS(Transport Layer Security), Pseudo-random function
is used to create master secret. is used to create master secret.
5 In SSL( Secure Socket Layer), Message In TLS(Transport Layer Security), Hashed Message
Authentication Code protocol is used. Authentication Code protocol is used.
6 SSL (Secure Socket Layer) is complex than TLS (Transport Layer Security) is simple.
TLS(Transport Layer Security).
IP security (IPSec)