sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1...

721
Network Security & Cryptography

Transcript of sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1...

Page 1: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 2: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

MODULE 1 

Page 3: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Introduction, Basics of Cryptography, Secret Key 

Page 4: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Cryptography 

Page 5: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Computer security is all about studying cyber attacks with a view to defending against them.  

Page 6: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

The attacks include pharming and phishing attacks together with assorted malware and de

Page 7: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of service attacks. 

Page 8: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Understanding what makes systems vulnerable to these attacks is an important first step in 

Page 9: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

avoiding or preventing them.  

Page 10: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

There are different classes of vulnerabilities including those caused by poorly written or 

Page 11: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

configured software.  

Page 12: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

There  are  diverse  defence  strategies  such  as  Access  control,  authentication,  and  data 

Page 13: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

protection techniques are introduced.  

Page 14: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.1 Cyber Attacks  

Page 15: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.1.1Motives 

Page 16: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

"What are the main goals of an attacker?"  

Page 17: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

The sheer thrill of mounting a successful cyber attack has been motivation enough for 

Page 18: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

hackers (Table 1.1).  

Page 19: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Most hackers were (and still are) young adults, often teens, who had dropped out of 

Page 20: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

school but were otherwise intelligent and focused.  

Page 21: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Many of the "traditional" hackers seem to be obsessive programmers.  

Page 22: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Often  hackers  use  scripts  and  attack  kits  designed  by  others  (these  can  be  freely 

Page 23: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

downloaded from the Internet). Their activities do not require any special programming 

Page 24: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

skills or advanced knowledge of computer systems.  

Page 25: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Other perpetrators of cyber attacks include company insiders, often employees who wish 

Page 26: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

to gain illegal acces and have extra privileges 

Page 27: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There is also a serious threat from cyber terrorists  

Page 28: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Cyber terrorism is one weapon which may include biological, chemical, and nuclear 

Page 29: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

weapons.  Their  goals  are to  cripple the  information/communication systems of the 

Page 30: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

financial and business institutions of their "enemies." 

Page 31: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The primary motivation for launching cyber attacks has shifted to financial gain. 

Page 32: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Table 1 . 1 Notable cyber attacks  

Page 33: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Year  Event  

1988  Robert Morrisa 23-year-old Cornell graduate student, released a worm that over an 

Page 1 

Page 34: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 35: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Arpanet, incapacitating almost 6000 computers, congesting government and university 

Page 36: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

systems. He was fined $10,000 and sentenced to 3 years probation. 

Page 37: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1991  31-year-old David L. Smith created the worm "Melissa," which infected thousands of 

Page 38: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

computers causing damage of approximately $1.5 billion. This virus sent copies of 

Page 39: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

itself to the first 50 names of the recipient's address book. He received a 20-month jail 

Page 40: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

term. 

Page 41: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2001  "Anna Kournikova" virus. Promising photos of the tennis star mailed itself to the every 

Page 42: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

person in the victim's address book. Investigators were apprehensive that the virus was 

Page 43: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

created with a toolkit enabling the rookies to create a virus. 

Page 44: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2008  The headquarters of the Obama and McCain presidential campaigns were hacked.  

Page 45: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Some of the main motives of launching cyber attacks are: 

Page 46: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Theft of sensitive information. 

Page 47: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Disruption of service. 

Page 48: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Illegal access to or use of resources. 

Page 49: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Theft of sensitive information. 

Page 50: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Many organizations store and communicate sensitive information. 

Page 51: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Information  on  new  products  being  designed  or  revenue  sources  can  be  hugely 

Page 52: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

advantageous to a company's competitors.  

Page 53: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Likewise, details of military installations or precise military plans can be of immense 

Page 54: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

value to a nation's adversaries. 

Page 55: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Political spying targeted at government ministries and national intelligence can HAVE 

Page 56: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

many sensitive operations planned for the future.  

Page 57: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Besides  corporations,  banks,  the  military,  intelligence,  etc.,  the  individual  too  has 

Page 58: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

increasingly been a target.  

Page 59: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Leakage of personal information such as credit card numbers, passwords, and even 

Page 60: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

personal spending habits are common and are collectively referred to as identity theft. 

Page 61: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Such information is advertised on certain websites and may be purchased for a small fee. 

Page 62: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Disruption of service. 

Page 63: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Interruption or disruption of service is launched against an organization's servers so they 

Page 64: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

are made  unavailable or inaccessible. 

Page 65: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 In recent times, there have been unconfirmed reports of such attacks being launched by 

Page 66: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

business rivals of e-commerce websites.  

Page 67: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 2 

Page 68: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                            Module 1 

Page 69: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

The goal here appears to be "my competitor's loss is my gain." In 2001, there were a 

Page 70: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

series of such attacks that targeted the websites of Yahoo, Microsoft, etc. in a short span 

Page 71: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of time.  

Page 72: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

They were meant to alert corporates and others of the dangers of this class of attacks. 

Page 73: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Illegal access to or use of resources. 

Page 74: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

The goal here is to obtain free access or service to paid services. 

Page 75: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Examples of this include free access to online digital products such as magazine or 

Page 76: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

journal articles, free talk time on someone else's account, free use of computing power on 

Page 77: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

a supercomputer, etc.  

Page 78: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

In each case, the attacker is able to circumvent controls that permit access to only paid 

Page 79: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

subscribers of such services.  

Page 80: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.1.2  Common Attacks  

Page 81: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Some of the common attacks are : 

Page 82: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Phishing 

Page 83: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Pharming 

Page 84: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Dictionary attacks 

Page 85: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.  Denial of Service (dos) 

Page 86: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

5.  Trojan 

Page 87: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

6.  Spyware 

Page 88: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Phishing:  

Page 89: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One set  of  attacks are  those that attempt to  retrieve personal  information from  an 

Page 90: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

individual. 

Page 91: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It provokes  the victims to a fake website — an on-line bank, for example. 

Page 92: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The fake site has the look and feel of the authentic bank with which the victim has an 

Page 93: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

account. 

Page 94: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The victim is then asked  to enter sensitive information such as his/her login name and 

Page 95: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

password, which are then passed on to the fake website.  

Page 96: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Personal information may also be leaked out from credit cards, smart cards, and ATM 

Page 97: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

cards through a variety of skimming attacks.  

Page 98: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Pharming:  

Page 99: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It attempts to deduce sensitive information from lost or stolen smart cards through 

Page 100: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

advanced power and timing measurements conducted on them. 

Page 101: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Finally,  leakage  of  information  may  also  take  place  through  eavesdropping  or 

Page 102: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

snooping on the link between two communicating parties. 

Page 103: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Dictionary attacks : 

Page 104: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One means of intruding into a computer system is through password-guessing attacks. 

Page 105: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The ultimate goal of the attacker is to impersonate his/her victim. 

Page 106: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The attacker can then perform unauthorized logins (break-ins), make on-line purchases, 

Page 107: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

initiate banking transactions, etc., all under the assumed identity of the victim.  

Page 108: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 3 

Page 109: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                       Module 1 

Page 110: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.  Denial of Service (DoS): 

Page 111: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Denial of Service (DoS) means the attacker performs a interruption or disruption of the 

Page 112: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

computing services on a system .  

Page 113: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These attacks exhaust the computing power, memory capacity, or communication 

Page 114: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

bandwidth of their targets so they are rendered unavailable.  

Page 115: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One version of this attack causes website defacement.  

Page 116: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  At various times, the websites of high-profile targets such as the American president or 

Page 117: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

various government ministries have been targeted.  

Page 118: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  To prevent such attacks  an alarm being raised,  

Page 119: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Dos attack on a web server slows down the web server so that its response time to 

Page 120: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

requests from the outside world is unacceptably high.  

Page 121: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

5.  Malware.  

Page 122: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Worms and viruses are malware that replicate themselves.  

Page 123: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A virus typically infects a file, so a virus spreads from one file to another. 

Page 124: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   A worm is usually a stand-alone program that infects a computer, so a worm spreads 

Page 125: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

from one computer to another.  

Page 126: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Worms and viruses use various spreading techniques and media — e-mail, Internet 

Page 127: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

messages, web pages, Bluetooth, and MMS are some of the propagation vectors.  

Page 128: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Trojan:A trojan is a kind of malware that masquerades as a utility but has other goals 

Page 129: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

such as the modification of files, data theft, etc.  

Page 130: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Spyware, installed on a machine, can be used to monitor user activity and as a key logger 

Page 131: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

to recover valuable information such as passwords from user keystrokes.  

Page 132: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 4 

Page 133: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                       Module 1 

Page 134: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Figure 1.1 common attacks and vulnerabilities 

Page 135: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.1.3  Vulnerabilities  

Page 136: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Behind every attack is a vulnerability of some type or the other.  

Page 137: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Definition:A vulnerability is a weakness in a procedure, protocol, hardware, or software 

Page 138: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

within an organization that has the potential to cause damage.  

Page 139: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There are at least four important vulnerability classes in the domain of security:  

Page 140: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Human Vulnerabilities:  

Page 141: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These are vulnerabilities caused  by human behaviour or action. 

Page 142: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   For example, the user clicks on a link in an e-mail message received from a 

Page 143: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

questionable source. By so doing, the user can be directed to a site controlled by the 

Page 144: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attacker as in a phishing attack or a cross-site scripting attack. 

Page 145: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Similarly clicking on an e-mail attachment may open up a document causing a macro 

Page 146: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

to be executed.  

Page 147: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The macro may be designed to infect other files on the system and/or spread the 

Page 148: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

infected e-mail to other e-mail addresses harvested from the victim's inbox.  

Page 149: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 5 

Page 150: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                           Module 1 

Page 151: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In both these cases, the human vulnerability consists of clicking on a link or 

Page 152: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attachment in an e-mail from a possibly unknown source.  

Page 153: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The  link  or  attachment  may  have  provoked    the  victim  by  a  flashy  message 

Page 154: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

suggesting quick money, etc., blinding him/her to the fact that the message came from 

Page 155: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

an unknown source. 

Page 156: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   It  is  actions  like  this  that  make  a  phishing  attack  or  an  e-mail  virus  so  very 

Page 157: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

successful.  

Page 158: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Protocol Vulnerabilities: 

Page 159: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A number of networking protocols including TCP, IP, ARP, ICMP, UDP, DNS, and 

Page 160: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

various protocols used in local area networks (LANs) have features that have been 

Page 161: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

used in unanticipated ways to craft assorted attacks. 

Page 162: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Pharming attacks and various hijacking attacks are some examples. 

Page 163: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   There are tools available on-line to facilitate some of these attacks.  

Page 164: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One such tool subverts the normal functioning of the ARP protocol to sniff passwords 

Page 165: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

from a LAN. 

Page 166: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   There are a number of vulnerabilities in the design of security protocols that lead to 

Page 167: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

replay or man-in-the-middle attacks.  

Page 168: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These attacks, in turn, lead to identity theft, compromise of secret keys, etc.  

Page 169: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Vulnerabilities in network protocols are often related to aspects of their design though 

Page 170: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

they may also be the result of poor implementation or improper deployment. 

Page 171: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Software Vulnerabilities:  

Page 172: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This family of vulnerabilities is caused by written system or application software. 

Page 173: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   In many cases, the  causes  of the problem seems to be the code that is all too trusting 

Page 174: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of user input. 

Page 175: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Ex A web server accepts input from a users browser.the web server must accept the 

Page 176: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

request after typing the complete username and password.the server software should 

Page 177: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

perform sufficient validation.  

Page 178: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.  Configuration Vulnerabilities: 

Page 179: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These relate to configuration settings on newly installed applications, files, etc.  

Page 180: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Read-write-execute permissions on files may be too generous and susceptible to 

Page 181: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

abuse. 

Page 182: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The privilege level assigned to a process may be higher than what it should be to 

Page 183: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

carry out a task. This privilege may be misused during some point in its execution 

Page 184: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

leading to what are commonly called "privilege escalation" attacks. 

Page 185: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Besides  misconfiguration  of  software  and  services,  security  appliances  such  as 

Page 186: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

firewalls may be incorrectly or incompletely configured with possibly devastating 

Page 187: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

effect. 

Page 188: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 6 

Page 189: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 190: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.2 DEFENCE STRATEGIES AND TECHNIQUES  

Page 191: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.2.1 Access Control—Authentication and Authorization  

Page 192: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The first defence strategy to prevent intrusions is access control.  

Page 193: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This implies the existence of a trusted third party that mediates access to a protected 

Page 194: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

system.  

Page 195: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The trusted third party is typically implemented in software and may be a part of the 

Page 196: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

operating system and/or the application. 

Page 197: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The first step in access control is to permit or deny entry into the system. 

Page 198: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   This involves some form of authentication — a process whereby the subject or principal 

Page 199: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(the party attempting to login) establishes that it is indeed the entity it claims to be. 

Page 200: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   One form of authentication is the humble password.  

Page 201: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Example:The principal first enters his/her login name. By prompting him/her to enter 

Page 202: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

his/her password, the system implicitly challenges the principal to prove his/her identity. 

Page 203: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   In this simple case, knowledge of the secret password constitutes "proof of identity." 

Page 204: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  After successful authentication, a subject is logged into the system. The subject may need 

Page 205: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

to access several resources such as files.  

Page 206: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.2.2 Data Protection  

Page 207: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The data in transit or in storage needs to be protected.   

Page 208: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It implies data confidentiality – the data should not be readable by an intruder.  

Page 209: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Another dimension to data protection is the preservation of data integrity.  

Page 210: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This implies that the data while transmitting  should not be tampered or modified  

Page 211: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Cryptographic  techniques  are  among  the  best  known  ways  to  protect  both,  the 

Page 212: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

confidentiality and integrity of data. 

Page 213: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Cryptography is the science of disguising data and is the subject of the part of this book.  

Page 214: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The encryption operation is performed by the sender which converts the plain text to 

Page 215: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

ciphertext.  

Page 216: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  decryption  operation  is  performed    by  the  receiver  which  converts  the  ciphertext  to 

Page 217: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

plaintext. 

Page 218: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The encryption and decryption operations both use the same secret key known only to the 

Page 219: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

sender and receiver.  

Page 220: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This prevents an eavesdropper from decrypting the encrypted message.  

Page 221: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  the computation of the cryptographic checksum uses a secret shared by the sender and 

Page 222: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

receiver.  

Page 223: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The sender computes the checksum as a "one-way function" of the message and secret. It 

Page 224: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

transmits the message and checksum.  

Page 225: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The  receiver  also  computes  the  checksum.  If  the  computed  checksum  matches  that 

Page 226: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

received, the receiver concludes that there is no error in the received message.  

Page 227: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 7 

Page 228: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 229: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.2.3 Prevention and Detection  

Page 230: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Access control and message encryption are preventive strategies. 

Page 231: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Authentication keeps intruders out, while authorization limits what can be done by those 

Page 232: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

who have been allowed in. 

Page 233: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Encryption prevents intruders from eavesdropping on messages. 

Page 234: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The cryptographic checksum, on the other hand, detects tampering of messages. 

Page 235: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   In  the  important  domain  of  software  security,  code  testing  is  used  to  detect 

Page 236: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

vulnerabilities. 

Page 237: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Blackbox testing is employed when the source code of a program is not available. The 

Page 238: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

goal here is to determine whether the software has been carefully designed to handle 

Page 239: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

unexpected or malicious input. 

Page 240: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   For greater assurance of secure software, whitebox testing should be employed. Here, the 

Page 241: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

security engineer has access to source code and can perform more elaborate testing by 

Page 242: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

exercising different control paths in the source code.  

Page 243: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  intrusion preventive techniques  can be used to detect anomalous behavior, Continuous 

Page 244: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

monitoring of network logs and operating system logs 

Page 245: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Intrusion detection systems also look for certain patterns of behaviour.  

Page 246: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For example, multiple instances of a given worm often exhibit a characteristic bit pattern 

Page 247: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

called a worm signature.  

Page 248: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.2.4 Response, Recovery, and Forensics  

Page 249: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Once an attack or infection has been detected, response measures should be taken .  

Page 250: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These include shutting down all or part of the system.  

Page 251: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Many intrusion attempts leave information   

Page 252: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Cyber forensics is an emerging discipline with a set of tools that help trace back the 

Page 253: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

perpetrators of cyber crime.  

Page 254: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Table 1.2 defines some of the most 

Page 255: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 8 

Page 256: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 257: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.3GUIDING PRINCIPLES  

Page 258: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  Security is as much (or more) a human problem than a technological problem and must be 

Page 259: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

addressed at different levels.  

Page 260: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  At the highest level, security should be addressed by top-level management in 

Page 261: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

large organizations. 

Page 262: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Robust  security  policies  should  be  formulated  and  a   comprehensive 

Page 263: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

implementation  strategy  outlined  by  a  dedicated  team  of  security  specialists, 

Page 264: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

possibly headed by a Chief Information Security Officer (CISO). 

Page 265: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Some of the mechanisms used to implement high-level policies are in the realm 

Page 266: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of technology.  

Page 267: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Security engineers have a key role to play in designing techniques and products to 

Page 268: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

protect organizations from the various cyber attacks.  

Page 269: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  System administrators handle day-to-day operations.  

Page 270: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  They should be proactive in crucial security practices such as patch application. 

Page 271: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   One of the key tasks of a system administrator is to configure systems and 

Page 272: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

applications. Their job also involves setting user/group permissions to various system resources such as files, configuring firewalls, sifting through system logs 

Page 273: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

for signs of an intrusion, and processing alerts. 

Page 274: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The final link in the security chain is the rank and file within an organization. 

Page 275: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The employees within an organization should be educated on various do's and 

Page 276: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

don'ts through periodically updated security awareness programs. 

Page 277: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   In  summary,  a  healthy  combination  of  enlightened  security  policy  and 

Page 278: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

procedures, backed by enforcement, aided by technology, coupled with diligent 

Page 279: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 9 

Page 280: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 281: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

participation  of   administrators  and  employees,  and  presided  over  by  an 

Page 282: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

empowered CISO is the surest insurance against cyber attacks.  

Page 283: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  Security should be factored in at inception, not as an afterthought.  

Page 284: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  No one then had thought  that those protocols would be abused by attackers in so 

Page 285: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

many creative ways! 

Page 286: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   application software (web software, for example) developed today continues to be 

Page 287: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

often vulnerable to numerous attacks such as cross-site scripting and SQL injection 

Page 288: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attacks.  

Page 289: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The solution lies, at least in part, in integrating secure coding practices into the 

Page 290: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

software curriculum in our colleges and universities. 

Page 291: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   In general, security should be factored in early on during the design phase of a new 

Page 292: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

product and then carried forward right through implementation and testing.  

Page 293: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The product could be a networking protocol, a new version of an operating system, a 

Page 294: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

piece of application software, or the architectural layout of computing infrastructure 

Page 295: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

for an enterprise.  

Page 296: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  Security by obscurity (or by complexity) is often bogus. 

Page 297: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There have been a number of cryptographic algorithms proposed which was made 

Page 298: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

mandatory  in newly standardized protocols, but their details were not made public. 

Page 299: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The flaws are exposed over time after the protocols have been widely deployed, 

Page 300: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attracting closer attention from the hacker community.  

Page 301: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There are ethical hackers whose goal is to break software/ protocols/algorithms so that 

Page 302: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

they can be fixed before things get out of hand.  

Page 303: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It is the ethical hacker community at least, if not the public at large, who should be 

Page 304: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

able to study new protocols and algorithms prior to widespread adoption.  

Page 305: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One such example was the procedure followed for selecting an algorithm in the late 

Page 306: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1990s for the new secret key cryptography standard — AES was finally chosen after 

Page 307: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

much public scrutiny and debate. As another example, open source software is usually 

Page 308: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

freely available. Public review of its security features can make or break its reputation.  

Page 309: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.  Always consider the "Default Deny" policy for adoption in access control.  

Page 310: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The subjects in an access control policy could be people, network packets, operating 

Page 311: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

system processes or even user input.  

Page 312: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  One policy is the "Default Permit," i.e., grant the subject's request unless the subject is 

Page 313: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

on a blacklist or it has certain blacklisted attributes.  

Page 314: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The dual of this policy is the "Default Deny" policy. In this case, the subject's request 

Page 315: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

is denied unless it is on a whitelist. 

Page 316: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Clearly, whitelisting is the more conservative approach.  

Page 317: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 10 

Page 318: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 319: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  With whitelisting, the access controller may reject a legitimate subject whose name 

Page 320: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

has been mistakenly excluded from the whitelist but that is the price to be paid for 

Page 321: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

greater security.  

Page 322: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Blacklisting, on the other hand, may accept a bad guy because his name or attributes 

Page 323: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

were mistakenly excluded from the blacklist.  

Page 324: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The tradeoffs between blacklisting and whitelisting should be carefully examined (see 

Page 325: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Principle 8). However, in general, prudent security design should seriously consider 

Page 326: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

adoption of the "Default Deny" policy. 

Page 327: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

5.  An  entity  should  be  given  the  least  amount/level  of  permissions/privileges  to 

Page 328: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

accomplish a given task. 

Page 329: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Role-based access control (RBAC) has influenced a variety of software platforms ranging 

Page 330: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

from operating systems to database management systems.  

Page 331: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The  principal  idea  in  RBAC  is  that  the  mapping  between  roles  and  permissions  is 

Page 332: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

paramount. 

Page 333: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The role played by an individual at a given point in time determines the rights or 

Page 334: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

privileges the individual has.  

Page 335: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Conferring higher privilege on an individual than what is warranted by his/her current 

Page 336: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

role could compromise the system.  

Page 337: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Privilege escalation in its different manifestations has caused many security breaches in 

Page 338: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

computer systems.  

Page 339: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The problem often lies in sloppy or incomplete configuration management.  

Page 340: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In publicly accessible servers within an organization such as the web and e-mail servers, 

Page 341: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

unnecessary  services  hosted  by  them  can  open  the  door  to  malware,  which  can 

Page 342: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

compromise those servers. The latter are then used as a springboard to spread to the 

Page 343: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

internal machines in that organization.  

Page 344: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

6.  Use 'Defence in depth' to enhance security of an architectural design.  

Page 345: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This  principle  is  used  in  many  high-security  installations  and  has  been  recently 

Page 346: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

introduced in some airports. A passenger's ticket is checked before entering the airport 

Page 347: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

terminal building. This is followed by verification of travel documents and inspection of 

Page 348: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

check-in baggage at the airline counter. Next comes a security check (physical) and a 

Page 349: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

further  check  of  the  boarding  pass,  travel  documents,  and  check-in  baggage  before 

Page 350: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

entering the boarding area (main concourse). 

Page 351: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Defence in depth is applicable to cyber security as well.  

Page 352: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Consider designing the firewall architecture for a mid-to-large size enterprise.  

Page 353: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Every packet from the outside (Internet) should be intercepted by at least two firewalls.  

Page 354: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The firewalls may be from two different vendors and would, preferably, have been 

Page 355: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

configured by two different system administrators.  

Page 356: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 11 

Page 357: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 358: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  They may, and typically do, have some overlapping functionality. Because of differences 

Page 359: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

in the hardware/software design and in configuration, what escapes Firewall 1 may be 

Page 360: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

caught by Firewall 2 and vice versa.  

Page 361: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

7.  Identify vulnerabilities and respond appropriately.  

Page 362: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  We have already seen a large number of vulnerability types.  

Page 363: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Vulnerabilities in software or protocols are well researched. 

Page 364: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  But equally important are weakness/shortcomings in policy, procedures, and operations.  

Page 365: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  How many organizations are geared to implement policies regarding the entry of visitors' 

Page 366: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

laptops and PDAs?  

Page 367: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Or do they even have such policies in place? Such mobile devices and Bluetooth-enabled 

Page 368: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

gadgets may transmit malware to unsuspecting stations within the organization.  

Page 369: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Likewise, USB-enabled PCs may be victims of viruses residing on USB flash drives.  

Page 370: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Often, these organizations have elaborate security infrastructure in the form of firewalls 

Page 371: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

and intrusion detection systems. They securely guard the high-profile main entrance but 

Page 372: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

blissfully ignore the security requirements of the less conspicuous side and rear doors. 

Page 373: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Vulnerability detection and response brings to mind fast-spreading Internet scanning 

Page 374: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

worms.  

Page 375: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

8.   Carefully study the tradeoffs involving security before making any.  

Page 376: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Engineering  design  often  involves  making  tradeoffs  —  cost  versus  performance, 

Page 377: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

functionality versus chip area, etc.  

Page 378: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The previous principle highlighted an important tradeoff — security versus cost.  

Page 379: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Consider, for example, the area of electronic payment involving small purchases (say Rs. 

Page 380: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

10 or less). Such payments, called micropayments, may be made for digital goods such as 

Page 381: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

on-line news-paper articles.  

Page 382: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Payment schemes use some form of cryptography. The cryptographic overheads of these 

Page 383: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

schemes,  in  terms  of  computation  cost,  can  be  high.  Can  we  use  cheaper  (lower 

Page 384: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

overhead)  cryptography  for  micropayments?  The  downside  here  is  that  such 

Page 385: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

cryptography is not as secure. But given the transaction amount, the risk of fraud is 

Page 386: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

probably acceptable.  

Page 387: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In this case, we may be justified in trading off increased security for lower cost. Besides 

Page 388: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

security versus cost, security versus performance is a tradeoff often encountered.  

Page 389: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 12 

Page 390: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 391: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Basics of Cryptography  

Page 392: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

PRELIMINARIES  

Page 393: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Cryptography is the science of disguising messages so that only the intended recipient can 

Page 394: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

decipher the received message.  

Page 395: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Cryptography  is  the  lynchpin  of  data  security   —  besides  providing  for  message 

Page 396: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

confidentiality,  it  also  helps  in  providing  message  integrity,  authentication,  and  digital 

Page 397: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

signatures.  

Page 398: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The original message or document to be transferred is called plaintext  

Page 399: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The plaintext which is encrypted  is called ciphertext.  

Page 400: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The process of  converting  the original plaintext  to ciphertext is called encryption  

Page 401: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The process of recovering the original plaintext from the ciphertext is called decryption. 

Page 402: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Encryption involves the use of an encryption function or algorithm, denoted by E, and an 

Page 403: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

encryption key, e.  

Page 404: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Decryption involves the use of a decryption function denoted by D, and a decryption key, d.  

Page 405: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These operations are summarized below. 

Page 406: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  c = E (p)  

Page 407: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

p = D (c)  

Page 408: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Here, p denotes a block of plaintext. It is encrypted by the sender to produce ciphertext 

Page 409: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

denoted by c.  

Page 410: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Decryption operation is performed by the receiver on the ciphertext to recover the plaintext.  

Page 411: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Kerckhoff's Principle: The secrecy should be in the key used for decryption, not in the 

Page 412: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

decryption or encryption algorithms. 

Page 413: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.1.1  Secret versus "Public" Key Cryptography  

Page 414: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There are two types of cryptography in widespread use – 

1. Secret key cryptography 2. Public key cryptography.

In secret key cryptography, both sender and receiver share a common secret - the same secret key is used for encryption as well as decryption. So e = d , this form of cryptography is also referred to as symmetric key cryptography.

In public key cryptography, two distinct keys forming a key pair are used – I. the encryption key or public key and II. the decryption key or private key. The public key of a user(receiver) is used to encrypt messages to that user. It is the private key of the recipient that is used to decrypt the message. Because the public and private keys are distinct, this form of cryptography is also referred to as asymmetric key cryptography.

Assuming that Brijesh has a public key-private

then she encrypts the message using the common secret. The encrypted message received by Brijesh is decrypted using the same secret. The secret key operations are summarized below. Operation performed by Alka c = Ek(p) Operation performed by Brijesh: p = Dk(c)

key pair, she would encrypt her message using his public key , B.pu. Brijesh then decrypts the message using the corresponding private key, B.pr. Assuming that Brijesh keeps his private key securely, he and only he can decrypt the message received from Alka. The public key-private key operations are summarized below. Operation performed by Alka: c = E B.pu(p) Operation performed by Brijesh: p=D B.pr(c)

EX:Data Encryption Standard, Advanced Encryption Standard (AES)

RSA, Elliptic Curve Cryptography (ECC).

If Alka and Brijesh share a secret key, kk,

Page 415: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.1.2 Types of Attacks 

Page 416: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 At a very high level, a cryptographic algorithm is secure if a cryptanalyst (a person with 

Page 417: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

expertise in breaking ciphers) is unable to 

Page 418: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   (a) obtain the corresponding plaintext from a given ciphertext.  

Page 419: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(b) deduce the secret key or the private key  

Page 420: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  How would the attacker proceed to realize the above objectives? He could accumulate 

Page 421: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

copious amounts of ciphertext.  

Page 422: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key
Page 423: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  He would then look for patterns in the ciphertext in an attempt to reconstruct some 

Page 424: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

plaintext and/or deduce the key. Such an attack which exclusively uses ciphertext is 

Page 425: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

referred to as a "known ciphertext" attack.  

Page 426: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Occasionally, all or part of some plaintext blocks are predictable or may be guessed. 

Page 427: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   A cryptanalyst may then build a list of corresponding plaintext, ciphertext pairs with the 

Page 428: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

intention of deducing the key. Such an attack is referred to as a "known plaintext" 

Page 429: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attack. 

Page 430: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   It may even be possible for a shrewd attacker to carefully choose pieces of plaintext and 

Page 431: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

then induce the sender to encrypt such text.  

Page 432: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  An attack on a cryptographic scheme which makes use of pairs of attacker-chosen 

Page 433: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

plaintext and the corresponding ciphertext is referred to as a "chosen plaintext" attack.  

Page 434: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The most obvious, though compute-intensive, attack with known plaintext is a brute 

Page 435: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

force attempt at obtaining the key by trying all possible key values.  

Page 436: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Let  (p ,c ) , (p ,c ) , (p ,c )  be plaintext—ciphertext pairs.  

Page 437: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

for (each potential key value, k in the key space)  

Page 438: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 439: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

proceed = true; 

Page 440: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 i= 1; 

Page 441: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

while (proceed = = true && i < m)  

Page 442: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 443: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

if (c , ≠ Ek( p ))  

Page 444: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 445: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

proceed = false; 

Page 446: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 i ++ ;  

Page 447: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 448: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

if (i = m+1) 

Page 449: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 print (" Key Value is k"); 

Page 450: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 451: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.2 ELEMENTARY SUBSTITUTION CIPHERS  

Page 452: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.2.1  Monoalphabetic  Ciphers  

Page 453: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The most basic cipher is a substitution cipher.  

Page 454: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For ease of understanding, we consider English text in all the examples in this chapter.  

Page 455: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Let E denote the set of alphabets, (A, B, . . . Z).  

Page 456: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A monoalphabetic substitution cipher defines a permutation of the elements in ∑.  

Page 457: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There are 26! permutations; so, there are 26! possible monoalphabetic substitution ciphers. 

Page 458: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The simplest substitution cipher is one that replaces each alphabet in a text by the alphabet k 

Page 459: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

positions away (in the modulo 26 sense).  

Page 460: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For k = 3, the substitutions are  

Page 461: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

D for A,  

Page 462: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 15 

Page 463: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2,  k 

 

3,  k 

 

4… 

  

 k m 

Network Security & Cryptography                                                                                                                                

Page 464: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

E for B,  

Page 465: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

A for  X,  

Page 466: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

B for Y, etc.  

Page 467: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Such a scheme is referred to as a Caesar cipher.  

Page 468: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A sample plaintext and the corresponding ciphertext for k= 3 is  

Page 469: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Plaintext:       WHAT   IS  THE  POPULATION  OF  MARS  

Page 470: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Ciphertext:     ZKDW  LV   WKH  SRSXODWLRQ   RI  PDUV 

Page 471: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In substitution ciphers, like the Caesar cipher, each letter is always substituted for another 

Page 472: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

unique letter. Such ciphers are said to be monoalphabetic.  

Page 473: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.2.2  Polyalphabetic Ciphers  

Page 474: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In a polyalphabetic cipher, the ciphertext corresponding to a particular character in the 

Page 475: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

plaintext is not fixed. It may depend on, for example, its position in the block.  

Page 476: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  We next study two examples of such ciphers.  

Page 477: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

a.  The Vigenere Cipher  

Page 478: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The Vigenere cipher is a polyalphabetic cipher that uses a multi-digit key   ,  k1  k   are each integers.  

Page 479: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The plaintext is split into non-overlapping blocks, each containing   m   consecutive 

Page 480: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

characters.  

Page 481: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Then the first letter of each block is replaced by the letter k  positions to its right  the 

Page 482: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

second letter of each block is replaced by the letter k  positions to its right, and soon.  

Page 483: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Plain   W  I  S  H  I  N  G     Y  O  U     S  U   C   C   E  S  S 

Page 484: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

text 

Page 485: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Key:    04   19    03     22     07    12    05    11     04   19    03   22   07  12  05  11  4  

Page 486: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Ciphertext:  A B V D P Y L   J S N   P Q J T  X F G V H O Z 

Page 487: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The first letter in the above text is W. The corresponding key value  is 04.  

Page 488: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This means that the ciphertext is the letter 4 positions ahead (in the modulo 26 sense).  

Page 489: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The key length = 8, i.e., the keystring repeats after every 8 characters.  

Page 490: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  There are four occurrences of the letter "s" in the above text  

Page 491: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  However, each occurrence of "s" is encrypted as a different character in the ciphertext - " 

Page 492: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

V", "X", "O," and "Z".  

Page 493: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

b.  The Hill Cipher 

Page 494: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The Hill cipher is another polyalphabetic cipher proposed by Lester Hill.  

Page 495: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  As in the Vigenere cipher, the plaintext is broken into blocks of size m. However, the key in 

Page 496: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the Hill cipher is an in m x m matrix of integers between 0 and 25.  

Page 497: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 16 

Page 498: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

-1 

Network Security & Cryptography                                                                                                                                

Page 499: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Unlike the Caesar and Vigenere ciphers, each character in the ciphertext is a function of all 

Page 500: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the characters in that block. 

Page 501: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Let p1,, p2, . . . pm„, be the numeric representation of the characters in the plaintext and 

Page 502: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   let c1,c2,c3,…cm represent the corresponding characters in the ciphertext.  

Page 503: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  To compute the ciphertext, we map each alphabet to an integer.   

Page 504: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

A  0 

Page 505: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

B  1 C  2 

Page 506: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

D  3 

Page 507: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

E  4 

Page 508: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

F  5 

Page 509: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The relationship between a block of plaintext and its ciphertext is expressed by 

Page 510: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This can be conveniently written as  

Page 511: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  C= p K  

Page 512: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Here, C and p are row vectors corresponding to the plaintext and ciphertext, respectively, and 

Page 513: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

K is the m x m in matrix comprising the key.  

Page 514: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  At the receiver end, the plaintext can be recovered from the ciphertext by using 

Page 515: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   p = cK 

Page 516: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(refer problem solved in class) 

Page 517: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

c.One—time Pad  

Page 518: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  To perform theone time pad  cipher encryption operation, the pad values are added to 

Page 519: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

numeric values that represent the plaintext that needs to be encrypted. 

Page 520: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each character of the plaintext is turned into a number and a pad value for that position is 

Page 521: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

added to it. 

Page 522: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The  resulting  sum  for  that  character  is  then  converted  back  to  a  ciphertext  letter  for 

Page 523: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

transmission. 

Page 524: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   

Page 525: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 17 

Page 526: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 527: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.3  ELEMENTARY TRANSPOSITION CIPHERS  

Page 528: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A transposition cipher shuffles, rearranges, or permutes the bits in a block of plaintext.  

Page 529: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Unlike a substitution cipher, the number of 0's and 1’s in a block does not change after the 

Page 530: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

shuffling.  

Page 531: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For simplicity, we work with characters (letters) rather than bits. 

Page 532: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Imagine a block of plaintext arranged in a matrix row by row  as below. 

Page 533: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Plaintext: Begin Operation at Noon (any case) 

Page 534: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  rearrange the rows as follows 

Page 535: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  ROW 1 to row 3  

Page 536: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Row 2  to row 5 

Page 537: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  ROW 3 to row 2, 

Page 538: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Row 4 to row 1 

Page 539: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Row 5  row 4.  

Page 540: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The resulting matrix is  

Page 541: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 

Page 542: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  now rearrange the columns as follows  

Page 543: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Column 1 to column 4 ,  

Page 544: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Column 2 to column  3,   Column 3 to column 1,    Column 4 to column 2.  

Page 545: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The resulting matrix is  

Page 546: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 18 

Page 547: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

k1  k2  k3  ki 

Network Security & Cryptography                                                                                                                                

Page 548: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 

Page 549: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The ciphertext thus generated is  

Page 550: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   A T N O T I A R G I E B O N O N P E O N 

Page 551: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  To decrypt the message, the recipient would have to cast the cipher text in a 5 x 4 matrix, 

Page 552: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

reverse the column shuffles, and then reverse the row shuffles. 

Page 553: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For example, with a combination of guesswork, luck, and limited prior information, a spy 

Page 554: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

might be able to deduce that the planned start time of an attack is 11:15 pm upon receiving 

Page 555: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the following ciphertext. 

Page 556: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   1 1 K C  T A  T A M M O  C P M 5 1 C E N E 

Page 557: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This is the ciphertext using the row and column shuffling as in the example above.  

Page 558: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The corresponding plaintext is  

Page 559: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Commence Attack 11 15 pm 

Page 560: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.4 OTHER CIPHER PROPERTIES  

Page 561: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.4.1 Confusion and Diffusion  

Page 562: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  In 1949, Claude Shannon first proposed the ideas of confusion and diffusion in the operation 

Page 563: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of  a cipher.  

Page 564: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Confusion is the property of a cipher whereby it provides no clue regarding  the relationship 

Page 565: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

between the ciphertext and the key.  

Page 566: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Given plaintext p, a sequence of keys k1, k2, . . . ki and the corresponding ciphertexts are 

Page 567: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

obtained using this encryption E  (p), E  (p), E  (p),………. E  (p), 

Page 568: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   It is nearly impossible to deduce the value of a new, arbitrarily chosen key kj  used to create 

Page 569: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the ciphertext,Ekj(p).  

Page 570: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Confusion reigns supreme with a cipher if , for any plaintext,p if even a single bit in a key k 

Page 571: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

is changed to produce k’, then roughly half the bits in the ciphertexts Ek(p) and Ek’(p) are 

Page 572: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

different. 

Page 573: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  While confusion is concerned with the relationship between the key and the ciphertext, 

Page 574: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Diffusion is concerned with the relationship between the plaintext and the corresponding 

Page 575: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

ciphertext.  

Page 576: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 19 

Page 577: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 578: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.4.2 Block Ciphers and Stream Ciphers  

Page 579: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Block Ciphers 

Page 580: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  With block ciphers, the plaintext is split into fixed size chunks called blocks, and each 

Page 581: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

block is encrypted separately. 

Page 582: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Typically all blocks in the plaintext are encrypted using the same key. 

Page 583: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Block ciphers include DES, AES, RSA, and ECC.  

Page 584: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Block sizes used in secret key cryptography are usually smaller — 64 bits in DES and 

Page 585: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

128 bits in AES.  

Page 586: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The block size in RSA is much larger — 768 or more bits, while the block size in ECC is 

Page 587: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

about 200 bits.  

Page 588: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  If two blocks of plaintext within a message are identical, their corresponding ciphertexts 

Page 589: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

are identical. This statement, however, is only partially true.  

Page 590: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Stream cipher 

Page 591: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Stream ciphers typically operate on bits.  

Page 592: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The one-time pad is an example of a stream cipher. 

Page 593: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Practical  stream  ciphers  typically  generate  a  pseudo-random  keystream  which  is  a 

Page 594: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

function of a fixed length key and a per-message bit string.  

Page 595: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The key is known to both the sender and the receiver.  

Page 596: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The per-message string could be a message sequence number. 

Page 597: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Alternatively, it could be a random number generated by the sender and transmitted to 

Page 598: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the receiver along with the encrypted message.  

Page 599: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The ciphertext is itself obtained by performing an ⊕ operation between the plaintext and 

Page 600: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the keystream.  

Page 601: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  An example of a stream cipher is RC4 used in the wireless LAN protocol, IEEE 802.11.  

Page 602: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Stream ciphers are usually faster than block ciphers and use less complicated circuits. 

Page 603: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

However, RC4 and some other stream ciphers have been shown to be vulnerable to 

Page 604: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

attack.  

Page 605: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 20 

Page 606: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 607: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Secret key cryptography 

Page 608: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 PRODUCT CIPHERS  Modern day secret-key ciphers are typically synthesized using the Substitution Box (S-Box) 

Page 609: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

and the Permutation Box (P-Box). 

Page 610: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Substitution Box (S-Box) 

Page 611: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  An S-box is a device that takes as input a (binary) string of length m and returns a 

Page 612: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(binary) string 1 of length n. While it is often the case that m = n, this need not 

Page 613: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

always be so.  

Page 614: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  rows  with  each  row 

  An  S-box  is  implemented  using  a  table  (or  array)  of  2 

Page 615: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

containing an  n-bit value.  

Page 616: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The input to the S-box is used to index the table which returns the n-bit output of the 

Page 617: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

S-Box. 

Page 618: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Permutation Box (P-Box). 

Page 619: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A P-Box performs a permutation or re-arrangement of the bits in the input. 

Page 620: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A permutation is more restrictive than a substitution.  

Page 621: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  For example, the number of zeros in the output of the P-Box is equal to the number of 

Page 622: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

zeros in its input while an S-box imposes no such restriction. 

Page 623: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A P-Box or S-box by itself is not sufficiently powerful to create a secure cipher. 

Page 624: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

However, cascading P-Boxes and S-Boxes alternately, the strength of a cipher can be 

Page 625: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

greatly increased. Such a cipher is referred to as a product cipher.  

Page 626: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The three operations that take place in sequence as shown in Fig. 5.1:  

Page 627: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(1) An Operation Involving A Function Of The Encryption Key  

Page 628: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(2) A Substitution 

Page 629: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

(3) A Permutation 

Page 630: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 21 

Page 631: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

b/s 

  with the "round" key.  

bits. 

Network Security & Cryptography                                                                                                                                 

Page 632: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Figure: Three-round SPN network 

Page 633: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  These operations are repeated over many rounds or iterations.  

Page 634: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Of the three operations, the first is the only one that involves the encryption key.  

Page 635: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It is usually an  ⊕(ex or)  of the input 

Page 636: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each round key is a function of the bits in the encryption key. 

Page 637: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  the S-box is usually implemented as a table.  

Page 638: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  If the block size of the cipher is b, the size of the table that implements a b x b   

Page 639: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   S-box is b x 2  bits.  

Page 640: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Thus, the table size increases exponentially with the number of inputs.  

Page 641: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  As an example, for b = 64, the size of the table is 270 bits which is a thousand billion billion 

Page 642: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

bits!  

Page 643: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  To save table space, a single S-box is broken into multiple S-boxes as shown in each round 

Page 644: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

of Fig. 5.1. 

Page 645: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   If s is the number of S-boxes,

Page 646: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each S-box is now implemented using a tabl e of size (b/s)2 bits.

Page 647: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Thus, the total size of all the S-boxes is b x 2 

Page 648: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 22 

Page 649: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                                

Page 650: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   For a block size of 64, the use of eight S-boxes (each with 8 inputs) would bring down the 

Page 651: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

storage requirements to about 16,000 bits.  

Page 652: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Usage of s box injects non-linearity into the design of the cipher.  

Page 653: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Non-linearity implies the absence of a linear relationship between any subset of bits in the 

Page 654: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

plaintext, cipher text, and key. 

Page 655: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Finally, the third step in each round or iteration is a permutation.  

Page 656: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A P-Box re-orders the inputs that it receives. it diffuses or spreads contiguous bits of the 

Page 657: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

input across the entire block.  

Page 658: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Without the P-Box, the first b/s bits of the output would be a function of the first b/s bits  of 

Page 659: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

the input, the second b/s bits of the output would be a function of the second b/s bits of the 

Page 660: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

input and so on.  

Page 661: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 DES CONSTRUCTION  

Page 662: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  DES is the successor to a cipher called Lucifer designed by cryptographers at IBM in the 

Page 663: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1960's.  

Page 664: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  It was first published in March 1975 and was chosen by the U.S. National Bureau of 

Page 665: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Standards or NBS (later re-named National Institute of Standards and Technology or NIST) 

Page 666: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

as the standard cipher for secret key cryptography in January 1977.  

Page 667: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Fiestel Structure  

Page 668: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Figure:DES encryption 

Page 669: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 23 

Page 670: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

i-1 

i-1  = 

i-1   be the left and right halves of the input to round i. 

i-1      

Li 

.  

Network Security & 

Page 671: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The DES data block size is 64 bits.  

Page 672: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  DES uses either 56 or 128 bit keys.  

Page 673: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A single block of plaintext is transformed into ciphertext after passing through the following 

Page 674: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

stages as shown in above figure:  

Page 675: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1.  An initial permutation  

Page 676: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2.  16 rounds of a given function  

Page 677: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3.  a 32-bit left-right swap and  

Page 678: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4.  a final permutation 

Page 679: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Each of the 16 rounds is functionally identical.   The structure of each DES round is explained below.  

Page 680: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Let   L  and R 

Page 681: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 As shown in above figure: 

Page 682: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   Li  =R 

Page 683: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  R  = Li-1 ⊕   f(Ri-1, Ki)     

Page 684: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The function f is applied at each round and is referred to as the "round" function. 

Page 685: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each round uses a round key, which is one of the inputs to f.  

Page 686: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each round key is derived from the DES key.  

Page 687: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The process of decryption involves obtaining Li-1 and Ri-1 from Li and Ri.Execution 

Page 688: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

proceeds from bottom to top and is summarized by the following equations derived from  

Page 689: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

above eq.:  

Page 690: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 R 

Page 691: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Li-1=Ri ⊕   f(Li, Ki)     

Page 692: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The structure of such a cipher is attributed to Horst Feistel (one of the key designers of DES). 

Page 693: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

A cipher that has such a structure is referred to as a Feistel cipher. 

Page 694: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Round Function  

Page 695: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  A round function [above figure  (b)] involves four operations: 

Page 696: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

1)  Expansion  

Page 697: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

2)  ⊕ with the round key  

Page 698: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

3)  Substitution 

Page 699: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

4)  Permutation  

Page 700: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 by repeating some bits and interchanging their positions.  . (which is different for each round).  

  The input to the round function is Ri-1, a 32-bit quantity [Fig.(b )].    

Page 701: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  This is first expanded into 48 bits 

Page 702: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   The 48-bit quantity is then ⊕ed with the round key, Ki 

Page 703: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The bits in a round key are a function of the bits in the origin al 56-bit key.  

Page 704: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The result of the ⊕ operation is divided into eight 6-bit chunks. 

Page 705: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each chunk is substituted by a 4-bit chunk 

Page 706: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

   A total of 8 different S-boxes provide the eight substitutions.  

Page 707: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  An S-box is implemented using a 4 x 16 array 

Page 708: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Each row of the array is a permutation of the numbers 0 through 15.  

Page 709: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 24 

Page 710: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Network Security & Cryptography                                                                                                                          

Page 711: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  Two bits of the i-th chunk serve as a row index (i5,i0)into the i-th table (Fig. 5.3) and the 

Page 712: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

remaining four bits serve as a column index(i4,i3,i2,i1).  

Page 713: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

  The output of the S-box is simply the 4-bit string pointed to by the row and column indices. 

Page 714: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

             i5  i4  i3   i2   i1   i0 

Page 715: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

S BOX 

Page 716: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

                  o3  o2     o1    o0 

Page 717: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

                  column 0 to  column 15 

Page 718: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Row 0 

Row 1 

Row 2 

Page 719: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Row 3  

Page 720: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

 Figure s box implementation using array size 4X16 

Page 721: sumangalabiradar.files.wordpress.com€¦  · Web viewNetwork Security & Cryptography MODULE 1 Introduction, Basics of Cryptography, Secret Key

Page 25