Ch 29

36
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004 Security Security PART PART VII VII

description

tmh slides

Transcript of Ch 29

Page 1: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

SecuritySecurity

PART PART VIIVII

Page 2: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Security Topics

Page 3: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Chapters

Chapter 29 Cryptography

Chapter 30 Message Authentication, User Authentication, and Key Management

Chapter 31 Security Protocols in The Internet

Page 4: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Chapter 29

Cryptography

Page 5: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.1 Introduction29.1 Introduction

Introduction Introduction to to

CryptographyCryptography

Page 6: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.1 Cryptography components

Page 7: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.2 Encryption and decryption

Page 8: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In cryptography, the encryption/decryption algorithms

are public; the keys are secret.

NoteNote::

Page 9: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.2 Symmetric-Key Cryptography29.2 Symmetric-Key Cryptography

Traditional Cipher

Block Cipher

Operation Modes

Page 10: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.3 Symmetric-key cryptography

Page 11: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

NoteNote::

Page 12: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In symmetric-key cryptography, the same key is used in both directions.

NoteNote::

Page 13: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Symmetric-key cryptography is often used for long messages.

NoteNote::

Page 14: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.4 Caesar cipher

Page 15: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.5 Example of monoalphabetic substitution

Page 16: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In monoalphabetic substitution, the relationship between a character in the

plaintext to the character in the ciphertext is always one-to-one.

NoteNote::

Page 17: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.6 Vigenere cipher

Page 18: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

In polyalphabetic substitution, the relationship between a character in the

plaintext and a character in the ciphertext is one-to-many.

NoteNote::

Page 19: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.7 Transpositional cipher

Page 20: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.8 Block cipher

Page 21: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.9 P-box

Page 22: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.10 S-box

Page 23: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.11 Product block

Page 24: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.12 DES

Page 25: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.13 General scheme of DES

Page 26: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.14 Iteration block

Page 27: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.15 Triple DES

Page 28: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

The DES cipher uses the same concept as the Caesar cipher, but the

encryption/decryption algorithm is much more complex due to the sixteen 48-bit keys derived from a 56-bit key.

NoteNote::

Page 29: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.16 ECB mode

Page 30: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.17 CBC mode

Page 31: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.18 CFM

Page 32: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.19 CSM

Page 33: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

29.3 Public-Key Cryptography29.3 Public-Key Cryptography

RSA

Choosing Public and Private Keys

Page 34: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.20 Public-key cryptography

Page 35: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Public-key algorithms are more efficient for short messages.

NoteNote::

Page 36: Ch 29

McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004

Figure 29.21 RSA