Unit-1 1
Unit-1 1
Symmetric
Cipher
Model
Outline
Introduction
Security Objectives
OSI Security Architecture
Security Attacks
Security Services
Security Mechanism
Symmetric Cipher Model
Cryptography
Cryptanalysis and Attacks
Substitution and Transposition Techniques
Introduction to Information & N/W Security
Information & Network Security
What is Information ?
The processed form of data or meaningful data is
called information. Basically, information is the
message that is being conveyed.
Bob
Alice
Packet sniffing, illegal
copying
Attacker
Confidentiality
Privacy: Assure individuals can control what
information related to them is collected, stored,
distributed.
Privacy is the right of an individual to protect
personal or sensitive information.
Integrity
2. Integrity :
Data integrity: Assure information and programs
are changed only in a authorized manner.
Messa
ge
Bob
Alice Modifies the Messa
message, or ge
Inserts a new one.
How can Bob be sure
that message really
comes from Alice?
Attacker
Integrity
System integrity: Assure system performs intended
function.
Availability
3. Availability :
Assure that systems work promptly and service is
not denied to authorized users.
www.amazon.com
User
Browser working Server down
Authenticity
4. Authenticity:
The property of being genuine and being able to be
verified and trusted; confidence in the validity of a
transmission, a message, or message originator.
This means verifying that each input arriving at the
system came from a trusted source.
User C
Accountability
5. Accountability:
The security goal that generates the requirement
for actions of an entity to be traced uniquely to that
entity.
This supports nonrepudiation(assurance that
someone cannot deny something).
Transfer Rs.
1,00,000
User A to Bank
Bank
Impact of Security Breaches
Effectiveness of primary operations are
reduced
Example: Hackers compromised exam question
paper.
Financial loss
Example: The cost of repairing a company database
once it’s been compromised.
Damage to assets
Example: Hackers compromised Amazon Web
Services account and demanded a ransom. When
the company declined, the hacker started
destroying their resources.
Harm to individuals
Example: Hackers compromised patience database
OSI Security Architecture
Systematic approach to define requirements for
security and approaches to satisfying those
requirements
The OSI (Open Systems Interconnection) security
architecture focuses on Security Attacks,
Mechanisms, and Services.
Security Attack: Any action that compromises the
security of information owned by an organization.
Security Mechanism: A process that is designed to
detect, prevent, or recover from a security attack.
Security Service: A communication service that
enhances the security of the data processing systems
and the information transfers of an organization.
Security Attacks
Security Attacks
A passive attack attempts to learn or make use
of information from the system but does not
affect system resources.
1. Release of message contents
2. Traffic analysis
Relatively hard to detect, but easier to prevent
An active attack attempts to alter system
resources or affect their operation.
1. Masquerade
2. Replay
3. Modification of messages
4. Denial of service.
Relatively hard to prevent, but easier to detect
1. Release of message contents (Passive Attack)
Data
Authenticatio Access Non
Confidentialit Data Integrity
n Control Repudiation
y
Connection
Data Origin Connection Non
less
Authenticatio Integrity with Repudiation
Confidentialit
n out recovery Destination
y
Selective Selective
Repeat Field
Confidentialit Connection
y Integrity
Traffic Flow
Connection
Confidentialit
less Integrity
y
Selective
Field
Connection
Authentication
Authentication is the assurance that the
communicating entity is the one that it claims to
be.
1. Peer Entity Who you
Authentication: Used in are ?
association with a logical (biometrics)
connection (TCP) to provide
confidence in the identity Physical
of the entities connected. authenticatio
n
2. Data-Origin where you
Authentication: In aWhat
areyou
? know ?
connectionless (UDP)Password
transfer, providesOne-time Password(OT
assurance that the source
of received data is as
Security
Services
Data
Authenticatio Access
Confidentialit Data Integrity Non Repudiation
n Control
y
Connection
Data Origin Connection Non
less
Authenticatio Integrity with Repudiation
Confidentialit
n out recovery Destination
y
Selective Selective
Repeat Field
Confidentialit Connection
y Integrity
Traffic Flow
Connection
Confidentialit
less Integrity
y
Selective
Field
Connection
Access Control
Access control is the prevention of
unauthorized use of a resource
This service controls who can have access to a
resource, under what conditions access can
occur, and what those accessing the resource are
allowed to do.
User A
User B
Human resources Development
network network
Security
Services
Data
Authenticatio Access Non
Confidentialit Data Integrity
n Control Repudiation
y
Connection
Data Origin Connection Non
less
Authenticatio Integrity with Repudiation
Confidentialit
n out recovery Destination
y
Selective Selective
Repeat Field
Confidentialit Connection
y Integrity
Traffic Flow
Connection
Confidentialit
less Integrity
y
Selective
Field
Connection
Data Confidentiality
Data confidentiality is the protection of data
from unauthorized disclosure.
1. Connection
Confidentiality: The
protection of all user data on
a connection.
2. Connectionless
Confidentiality: The
protection of all user data in a
single data block.
3. Selective-Field
Confidentiality: The
confidentiality of selected
fields within the user data on
a connection or in a single
data block.
4. Traffic-Flow
Security
Services
Data
Authenticatio Access Non
Confidentialit Data Integrity
n Control Repudiation
y
Connection
Data Origin Connection Non
less
Authenticatio Integrity with Repudiation
Confidentialit
n out recovery Destination
y
Selective Selective
Repeat Field
Confidentialit Connection
y Integrity
Traffic Flow
Connection
Confidentialit
less Integrity
y
Selective
Field
Connection
Data Integrity
Data integrity is the assurance that data
received are exactly as sent by an authorized
entity (i.e., contain no modification, insertion,
deletion, or replay).
Channel
Alice Bob
Both are
same
Data Integrity (Cont…)
Connection Integrity with Recovery: Provides
integrity of all user data on a connection and
detects any modification, insertion, deletion, or
replay of any data with recovery attempted.
Connection Integrity without Recovery: As
above, but provides only detection without
recovery.
Selective-Field Connection Integrity: Provides
integrity of selected fields within the user data and
takes the form of determination of whether the
selected fields have been modified, inserted,
deleted, or replayed.
Data Integrity (Cont…)
Connectionless Integrity: Provides integrity of a
single connectionless data block and may take the
form of detection of data modification.
Additionally, a limited form of replay detection
may be provided.
Selective-Field Connectionless Integrity:
Provides integrity of selected fields within a single
connectionless data block; takes the form of
determination of whether the selected fields have
been modified.
Security
Services
Data
Authenticatio Access Non
Confidentialit Data Integrity
n Control Repudiation
y
Connection
Data Origin Connection Non
less
Authenticatio Integrity with Repudiation
Confidentialit
n out recovery Destination
y
Selective Selective
Repeat Field
Confidentialit Connection
y Integrity
Traffic Flow
Connection
Confidentialit
less Integrity
y
Selective
Field
Connection
Non Repudiation
Nonrepudiation is the assurance that someone
cannot deny something.
Typically, nonrepudiation refers to the ability to
ensure that a communication cannot deny the
authenticity of their signature on a document or
the sending of a message that they originated.
Transfer Rs. 1,00,000
to Bank
After few
User days I have never
A requested to transfer
Rs. 1,00,000
to Bank Bank
Non Repudiation (Cont…)
Nonrepudiation-Origin: Proof that the message
was sent by the specified party.
Nonrepudiation-Destination: Proof that the
message was received by the specified party.
Security Mechanisms
Security Mechanisms (X.800)
Techniques designed to prevent, detect or
recover from attacks
No single mechanism can provide all services
Common in most mechanisms: cryptographic
techniques
Specific security mechanisms: Integrated into
the appropriate protocol layer in order to provide
some of the OSI security services.
Pervasive security mechanisms: Not
integrated to any particular OSI security service
or protocol layer
Security Mechanism (Specific security)
Encipherment: Hiding or covering data using
mathematical algorithms.
Digital Signature: The sender can electronically
sign the data and the receiver can electronically
verify the signature.
Access Control: A variety of mechanisms that
enforce access rights to resources.
Data Integrity: A variety of mechanisms used
to assure the integrity of a data unit or stream of
data units.
Security Mechanism (Specific security)
Authentication Exchange: Two entities
exchange some messages to prove their identity
to each other.
Traffic Padding: The insertion of bits into gaps
in a data stream to frustrate traffic analysis
attempts.
Routing Control: Selecting and continuously
changing routes between sender and receiver to
prevent opponent(attacker) from eavesdropping.
Notarization: The use of a trusted third party to
assure and control the communication.
Model for Network Security
Trusted third party
(e.g., arbiter,
distributer
of secret
information)
Send Recipie
er Security - Info. Security - nt
Messag
Messag
Messag
Messag Chann
Secure
related
Secure
related
Transformation el Transformation
e
e
Secret Secret
Informati Oppone Informati
on nt on
(Attacke
r)
Encryption and Decryption
C = E(3, P) = (P + 3) mod 26
Plain: a b c d e f g h i j k l m n o p q r s t u v w
x y z
Cipher: d e f g h i j k l m n o p q r s t u v w x y z
Example:
a b c
Plaintext: THE QUICK BROWN FOX
Ciphertext: WKH TXLFN EURZQ IRA
Caesar Cipher (Cont…)
Generalised Caesar Cipher
Allow shift by k positions.
Encryption : C = E(K, P) = (P + K)
mod 26
Decryption : P = D(K, C) = (C - K)
mod 26
Ciphertext:
uzqsovuohxmopvgpozpevsgzwszopfpesxudbmetsxaizvuephzh
mdzshzowsfpappdtsvpquzwymxuzuhsxepyepopdzszufpombzwp
fupzhmdjudtmohmq
In our ciphertext, the most common digram is ZW,
which appears three times. So equate Z with t, W
with h and P with e.
Now notice that the sequence ZWP appears in the
ciphertext, and we can translate that sequence as
Attack on Monoalphabetic Cipher (Cont…)
If the cryptanalyst knows the nature of the
plaintext, then the analyst can exploit the
regularities of the language.
The relative frequency of the letters can be
determined and compared to a standard
frequency distribution for English.
If the message were long enough, this technique
alone might be sufficient, but because this is a
relatively short message, we cannot expect an
exact match.
Substitution Techniques
1. Caesar Cipher
2. Monoalphabetic Cipher
3. Playfair Cipher
4. Hill Cipher
5. Polyalphabetic Ciphers
6. One-Time Pad
3. Playfair Cipher
The Playfair algorithm is based on a 5 × 5 matrix
(key) of letters.
The matrix is constructed by filling in the letters
of the keyword (minus duplicates) from left to
right and from top to bottom, and then filling in
the remainder of the matrix with the remaining
O letters
letters in alphabetic order. The C U IRandE J
Example:
count as one letter. N A B D F
Keyword=
OCCURRENCE G H I/J K L
Plaintext= TALL M P Q S T
TREES
V W X Y Z
Playfair Cipher - Encrypt Plaintext
Operate on pair of letters (digram) at a time.
Special: if digram with same letters appears,
separate by special letter (e.g. x)
Plaintext= TALL
TREES
Plaintext= TA LX LT RE ES
If there is an odd number of letters, then add
uncommon letter to complete digram, a X/Z may
be added to the last letter.
Plaintext= NETWORK
Plaintext= NE TW OR KX
Playfair Cipher - Encrypt Plaintext
Map each pair in key matrix
O C U R E
Plaintext: TA LX LT RE
ES
Ciphertext: PF IZ TZ EO N A B D F
RT G H I/J K L
M P Q S T
V W X Y Z
If the
the letters
the lettersappear
letters are onon
appear ondifferent
the
thesame rows
same row, and
column, columns,
replacereplace
them
replace
with
themthe withthem thewith
letters the immediately
letters
to their letters on other
immediate right corner
below, of the
respectively,
wrapping
same
aroundrow.
wrapping to the
around
top if to
necessary.
the left side of the row if
The order is using
necessary.
For example, important - theabove,
the table first letter of the
the letter pairpair
LT
should
For
would beencoded
example,
be replaced
usingasfirst.
the
TZ.table above, the letter pair
For example,
RE would using the
be encoded as table
EO. above, the letter pair
TA would be encoded as PF.
Playfair Cipher - Is it Breakable?
Better than monoalphabetic: relative frequency
of digrams much less than of individual letters.
But relatively easy (digrams, trigrams, expected
words)
Playfair Cipher Examples
1. Key= “engineering ” Plaintext= “test this
process ”
2. Key= “keyword ” Plaintext= “come to
the window”
E N G I R Encrypted K E Y W Encrypted
3. Key=
A B C “moonmission
D F Message:” Plaintext=
O “greet ”
Message:
H K L M O pi tu pm gt ue R D A B Lc nk zk vf yo
P Q S T U lf gp xg C gq ce bw
V W X Y Z F G H I
M O N I S Encrypted L
A B C D E Message: M N P Q
F G H K L hq cz du S
P Q R T U T U V X
V W X Y Z Z
Playfair Cipher Examples
4. Key: EXAMPLE
Ciphertext: UA ARBED EXAPO PR QNX AXANR
E X A M P
L B C D F
G H I/J K N
O Q R S T
U V W Y Z
Pair: UA AR BE DE XA PO PR QN XA XA NR
Plaintext: we wi lx lm ex et at th ex ex it
Plaintext: we wilxl mexet at thex exit
Plaintext: we will meet at the exit
Substitution Techniques
1. Caesar Cipher
2. Monoalphabetic Cipher
3. Playfair Cipher
4. Hill Cipher
5. Polyalphabetic Ciphers
6. One-Time Pad
4. Hill Cipher
Hill cipher is based on linear algebra
Each letter is represented by numbers from 0 to
25 and calculations are done using modulo 26.
Encryption and decryption can be given by the
following formula:
C=PK mod
Encryption: 26
P=CK-1 mod
Decryption: 26
Hill Cipher Encryption
To encrypt a message using the Hill Cipher we
must first turn our keyword and plaintext into a
matrix (a 2 x 2 matrix or a 3 x 3 matrix, etc).
Example: Key = “HILL”,
Plaintext
a b c= “EXAM”
d e f g
h i j k l m
0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y z
13 14 15 16 17 18 19 20 21 22 23 24 25
Hill Cipher Encryption (Cont…)
C=PK mod
26
Ciphertext =
“ELSC”
Hill Cipher Decryption
P=CK-1 mod
26
Step 1: Find Inverse of key matrix
Step 2: Multiply the Multiplicative Inverse of the
Determinant by the Adjoin Matrix
Step 3: Multiply inverse key matrix with ciphertext
matrix to obtain plaintext matrix
Step 1: Inverse of key matrix
2 X 2 inverse of
matrix
3 X 3 inverse of
matrix
Step 1: Inverse of key matrix
-11 mod 26 = 15
Because, modulo for
negative number is = N-
(B%N)
= 26 – (11%26)
Step 2: Modular (Multiplicative)
inverse
The inverse of a number A is 1/A since A * 1/A = 1
e.g. the inverse of 5 is 1/5
In modular arithmetic we do not have a division
operation.
The modular inverse of A (mod C) is A -1
(A * A-1) ≡ 1 (mod C)
Example:
The modular inverse of A mod C is the B value that
makes
A * A-1 mod C = 1
A = 3, C = 11
Since (3*4) mod 11 1= 1, 4 is modulo inverse of 3
A = 10, C = 17 , A-12
=?
Step 2: Modular (Multiplicative) inverse
Inverse Modulo 2 1 1 2 1 1 2
1 9 3 7 5
26 1 5 9 3 1 7 5
Step 2: Multiply with adjoin of
matrix
X%Y = X-(X/Y)*Y
77%26 = 77-
(77/26)*26
= 77-(2)*26
= 77-52
= 25
Hill Cipher Encryption (Cont…)
P=CK-1 mod
26
Plaintext =
“EXAM”
Hill Cipher Examples
1. Key: Hill Plaintext: short example
Ciphertext: APADJ TFTWLFJ
2. Key: ACBA Plaintext: DR GREER ROCKS
(A=1, B=2, … )
Ciphertext: FZIFTOTBXGPO
3. Key:DACB Ciphertext: SAKNOXAOJ
(A=1,B=2,…)
Plaintext: WELOVEMATH
Substitution Techniques
1. Caesar Cipher
2. Monoalphabetic Cipher
3. Playfair Cipher
4. Hill Cipher
5. Polyalphabetic Ciphers
6. One-Time Pad
5. Polyalphabetic Cipher
Monoalphabetic cipher encoded using only one
fixed alphabet
Polyalphabetic cipher is a substitution cipher
in which the cipher alphabet for the plain
alphabet may be different at different places
during the encryption process.
1. Vigenere cipher
2. Vernam cipher
Plaintext
K
e
y
PT =
HELLO
KEY =
GMGMG
CT =
NQRXU
Vigenere Cipher
Keyword : DECEPTIVE Key must be
Key : DECEPTIVEDECEPTIVEDECEPTIVE as long as
plaintext else
Plaintext : WEAREDISCOVEREDSAVEYOURSELF repeat a
Ciphertext : ZICVTWQNGRZGVTWAVZHCQYGLMGJ keyword
Key: 4 3 1 2 5 6 7
Plaintext: A T T A C K P
O S T P O N E
D U N T I L T
W O A M X Y Z
Ciphertext:TTNAAPTMTSUOAODWCOIXKNLYPETZ
Easy to break using letter frequency (try different
column orders)
Rows/Columns Transposition
Transposition ciphers can be made stronger by
using multiple stages of transposition
Plaintext: securityandcryptography
Key: 315624
Ciphertext:
EYYARDOYSTRRICGCAPPUNTH
Transpose again using same key:
Ciphertext:
YYCURRAHEOIPDRPYSGNATCT
Cryptographic Algorithms
Cryptographic algorithms and protocols can be
grouped into four main areas
Cryptographi
c algorithms
and protocols
Data integrity
Authentication
Symmetric
Asymmetric algorithms
Protocols
encryption
encryption used used
are
used to conceal
to secure
to protect
schemes blocks
thebased on
contents
small
of
thedata,
blocks
blockssuch
useof of
or as
data, messages,
cryptographic
streams
such of from
as data ofalteration.
algorithms
encryptionany keysdesigned
size, and to
including
hash
authenticate
messages,
function thewhich
values,
files, identity
areofused
encryption entities.
keys,inand
digital
passwords
signatures.
Threat and Attack
Threat: A potential for violation of security,
which exists when there is a circumstance,
capability, action, or event that could crack
security and cause harm. That is, a threat is a
possible danger that might exploit a vulnerability.
Attack: An violation on system security that
derives from an intelligent threat; that is, an
intelligent act that is a calculated attempt to
avoid security services and violate the security
policy of a system.