0% found this document useful (0 votes)
8 views41 pages

Crypto

The document discusses security in information systems, emphasizing the importance of confidentiality, integrity, and availability. It covers various cryptographic techniques, including symmetric and asymmetric key ciphers, and details specific attacks on security goals such as snooping and denial of service. Additionally, it explains the RSA algorithm and its applications in securing internet and financial transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views41 pages

Crypto

The document discusses security in information systems, emphasizing the importance of confidentiality, integrity, and availability. It covers various cryptographic techniques, including symmetric and asymmetric key ciphers, and details specific attacks on security goals such as snooping and denial of service. Additionally, it explains the RSA algorithm and its applications in securing internet and financial transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 41

Unit - V

Security
Cryptography
Protection

1
Security

Information is an asset that has a value like


any other asset.
As an asset, information needs to be secured
from attacks.
To be secured, information needs to be hidden
from unauthorized access (confidentiality)
Protected from unauthorized change
(integrity)
Available to an authorized entity when it is
2
Security

User Authenticity.
Passwords.
Password Vulnerability.
Encrypted password.
One – Time Password.
Bio-metric.
Voice recognition.

3
System Threats

Worms
Viruses
Denial of Service

4
Unit - V

Cryptograp
hy

5
Topics Discussed in the Section
 Security Goals
 Attacks
 Services
 Techniques

6
Taxonomy of attacks with relation to security goals

7
Security Attacks - Confidentiality

Snooping - Snooping, in a security context, is


unauthorized access to another person's or
company's data.

Traffic Analysis - A type of attack against


Internet encryption. Traffic Analysis can be
used to determine what type of information is
being communicated. 8
Security Attacks - Integrity

A masquerade - attack is an attack that


uses a fake identity, such as a network
identity, to gain unauthorized access to
personal computer information through
legitimate access identification.

Replaying - Replay attacks are the network


attacks in which an attacker spies the
conversation between the sender and receiver
and takes the authenticated information e.g.
sharing key and then contact to the receiver
with that key. In Replay attack the attacker9
Security Attacks - Integrity

Repudiation- Repudiation attacks make data


or information appear to be invalid or
misleading (which can be even worse). For
example, someone might access your e-mail

10
Security Attacks - Availability

DOS – A Denial-of-Service (DoS ) attack is an


attack meant to shut down a machine or
network, making it inaccessible to its intended
users

11
TRADITIONAL CIPHERS

We now look at the first goal of security,


confidentiality. Confidentiality can be
achieved using ciphers. Traditional
ciphers are called symmetric-key ciphers
(or secret-key ciphers) because the same
key is used for encryption and
decryption and the key can be used for
bidirectional communication. 12
Topics Discussed in the Section

 Key
 Substitution Ciphers
 Transposition Ciphers

13
General idea of traditional cipher

14
Note

A substitution cipher replaces one


symbol with another.

15
Symmetric-key: locking and unlocking with the same key

16
Locking and unlocking in asymmetric-key cryptosystem

17
Note

A substitution cipher replaces one


symbol with another.

18
Representation of characters in modulo 26

19
Note

In additive cipher, the plaintext,


ciphertext, and key are integers in
modulo 26.

20
Example
Use the additive cipher with key = 15 to encrypt
the message “hello”.

Solution
We apply the encryption algorithm to the
plaintext, character by character. The result is
“WTAAD”. Note that the cipher is monoalphabetic
because two instances of the same plaintext
character (ls) are encrypted as the same
character (A).

21
Example
Use the additive cipher with key = 15 to decrypt
the message “WTAAD”.

Solution
We apply the decryption algorithm to the
plaintext character by character. The result is
“hello”. Note that the operation is in modulo 26,
which means that we need to add 26 to a
negative result (for example 15 becomes 11).

22
An example key for mono-alphabetic substitution cipher

23
Example
We can use the key in Figure 29.5 to encrypt the
message

The ciphertext is

24
Note

A transposition cipher reorders


symbols.

25
Transposition cipher

Plaintext Plaintext
e n emy a t t a c k s t o n i g h t z e n emy a t t a c k s t o n i g h t z

Write row by row Read row by row

e n e m y e n e m y
a t t a c a t t a c
k s t o n k s t o n
i g h t z i g h t z

E E M Y N E E M Y N
T A A C T T A A C T
T K O N S T K O N S
H I T Z G H I T Z G
Read column by column Write column by column

E T T H E AK I MAO T Y C N Z N T S G E T T H E AK I MAO T Y C N Z N T S G
Ciphertext Ciphertext
Transmission
26
ASYMMETRIC-KEY CIPHERS

In previous sections we discussed


symmetric-key ciphers. In this chapter,
we start the discussion of asymmetric-
key ciphers. Symmetric-key and
asymmetric-key ciphers will exist in
parallel and continue to serve the
community. We actually believe that
they are complements of each other; the
advantages of one can compensate for
the disadvantages of the other.

27
Topics Discussed in the Section
 Keys
 General Idea
 RSA Cryptosystem
 Applications

28
Note

Symmetric-key cryptography is based


on sharing secrecy;
asymmetric-key cryptography is based
on personal secrecy.

29
Note

In symmetric-key cryptography,
symbols are permuted or substituted;
in asymmetric-key cryptography,
numbers are manipulated.

30
Note

Asymmetric-key ciphers are sometimes


called public-key ciphers.

31
Figure 29.14 General idea of asymmetric-key cryptosystem

To public
Key-generation
Public-key distribution procedure
channel

Public key Private key

Encryption Decryption
Plaintext Ciphertext Insecure channel Ciphertext Plaintext

32
Figure 29.15 Encryption, decryption, and key Generation in RSA

Key calculation
(e, n) Select p, q
To public n=p×q
Select e and d

Private (d)

(e, n)
C: Ciphertext
P C = P e mod n P = C d mod n P
Plaintext Encryption Decryption Plaintext

33
Steps in RSA algorithm

Step1: Choose 2 large prime numbers p & q

Step2: Compute n= p X q and z = (p-1) (q-1)

Step3: Choose a number relatively prime to ‘z’ and call


it ‘d’

Step4: Find ‘e’ such that (e X d) mod z = 1

Note: Choose e or d randomly any prime number less


than n

Encryption Algorithm  C = Pe mod n


34
Example 29.6
For the sake of demonstration, let Bob choose 7
and 11 as p and q and calculate n = 7 × 11 = 77.
The value of φ(n) =
(7 − 1)(11 − 1), or 60. If he chooses e to be 13,
then d is 37. Note that e × d mod 60 = 1. Now
imagine that Alice wants to send the plaintext 5
to Bob. She uses the public exponent 13 to
encrypt 5. This system is not safe because p and
q are small.

35
Example
Here is a more realistic example calculated with a
computer. We choose a 512-bit p and q, calculate
n and φ(n), We then choose e and calculate d.
Finally, we show the results of encryption and
decryption. The integer p is a 159-digit number.

The integer q is a 160-digit number.

TCP/IP Protocol Suite 36


Example Continued
The modulus n = p × q. It has 309 digits.

φ(n) = (p − 1)(q − 1) has 309 digits.

TCP/IP Protocol Suite 37


Example 29.7 Continued
Bob chooses e = 35535 (the ideal is 65537). He
then finds d.

Alice wants to send the message “THIS IS A


TEST”, which can be changed to a numeric value
using the 00−26 encoding scheme (26 is the
space character).

TCP/IP Protocol Suite 38


Example 29.7 Continued
The ciphertext calculated by Alice is C = Pe, which
is

Bob can recover the plaintext from the ciphertext


using P = Cd, which is

The recovered plaintext is “THIS IS A TEST” after


decoding.

TCP/IP Protocol Suite 39


Application of RSA algorithm

The RSA algorithm is used worldwide to


secure

Internet
Banking
Credit card transactions..

40
Advantage of RSA algorithm

RSA is an algorithm for public key


cryptography that is based on the presumed
difficulty of factoring large integers, the
factoring problem

41

You might also like