JEOPARDY! Ch. 28/29 – Progressive Era Ch. 27 – Imperialism Ch. 30 - World War I.
Ch 29
-
Upload
soumya-ranjan-mohanty -
Category
Technology
-
view
2.539 -
download
1
description
Transcript of Ch 29
![Page 1: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/1.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
SecuritySecurity
PART PART VIIVII
![Page 2: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/2.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Security Topics
![Page 3: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/3.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Chapters
Chapter 29 Cryptography
Chapter 30 Message Authentication, User Authentication, and Key Management
Chapter 31 Security Protocols in The Internet
![Page 4: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/4.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Chapter 29
Cryptography
![Page 5: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/5.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
29.1 Introduction29.1 Introduction
Introduction Introduction to to
CryptographyCryptography
![Page 6: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/6.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.1 Cryptography components
![Page 7: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/7.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.2 Encryption and decryption
![Page 8: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/8.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
In cryptography, the encryption/decryption algorithms
are public; the keys are secret.
NoteNote::
![Page 9: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/9.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
29.2 Symmetric-Key Cryptography29.2 Symmetric-Key Cryptography
Traditional Cipher
Block Cipher
Operation Modes
![Page 10: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/10.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.3 Symmetric-key cryptography
![Page 11: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/11.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.
NoteNote::
![Page 12: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/12.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
In symmetric-key cryptography, the same key is used in both directions.
NoteNote::
![Page 13: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/13.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Symmetric-key cryptography is often used for long messages.
NoteNote::
![Page 14: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/14.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.4 Caesar cipher
![Page 15: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/15.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.5 Example of monoalphabetic substitution
![Page 16: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/16.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
In monoalphabetic substitution, the relationship between a character in the
plaintext to the character in the ciphertext is always one-to-one.
NoteNote::
![Page 17: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/17.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.6 Vigenere cipher
![Page 18: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/18.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
In polyalphabetic substitution, the relationship between a character in the
plaintext and a character in the ciphertext is one-to-many.
NoteNote::
![Page 19: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/19.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.7 Transpositional cipher
![Page 20: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/20.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.8 Block cipher
![Page 21: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/21.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.9 P-box
![Page 22: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/22.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.10 S-box
![Page 23: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/23.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.11 Product block
![Page 24: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/24.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.12 DES
![Page 25: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/25.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.13 General scheme of DES
![Page 26: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/26.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.14 Iteration block
![Page 27: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/27.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.15 Triple DES
![Page 28: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/28.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
The DES cipher uses the same concept as the Caesar cipher, but the
encryption/decryption algorithm is much more complex due to the sixteen 48-bit keys derived from a 56-bit key.
NoteNote::
![Page 29: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/29.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.16 ECB mode
![Page 30: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/30.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.17 CBC mode
![Page 31: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/31.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.18 CFM
![Page 32: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/32.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.19 CSM
![Page 33: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/33.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
29.3 Public-Key Cryptography29.3 Public-Key Cryptography
RSA
Choosing Public and Private Keys
![Page 34: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/34.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.20 Public-key cryptography
![Page 35: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/35.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Public-key algorithms are more efficient for short messages.
NoteNote::
![Page 36: Ch 29](https://reader037.fdocuments.us/reader037/viewer/2022103109/545c83edb1af9f3c0a8b479d/html5/thumbnails/36.jpg)
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2004
Figure 29.21 RSA