0 ratings 0% found this document useful (0 votes) 17 views 11 pages Ns Unit 1
The document discusses various aspects of cryptography, including encryption, data security, and network security. It outlines different techniques and categories of security, such as access control, data backup, and hashing, while also addressing potential vulnerabilities and types of attacks. Additionally, it highlights the importance of public key cryptography and hash functions in ensuring data integrity and secure communication.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
MEENAKSHI COLLEGE OF ENGINEERING
J) Basis 9 duyptogeaphy :
* Guyptogsephyy B the praetor g eeu comonanieat
ard data 44om unautherxcd acces & modi freation.
“Pt fnvolues encoding Fnfarnetin so joer oY
Prtincect seckpienls can undeastand it.
ort Pnolucles encusption, ctecsupplion hashing ard
Af gi teak Afgnedtune 5
Basic Termirologie Pn gecuity +
=—— G pane
=
ca) exyptoguaphy +
Ceo ate ceanee! ;
trans fanfing an plain
cnoupid Ore and than “seatnane fam
back to onigiral dem.
(by plafntext; The Grigiretl mowage
The envy pad [Deansformd paessage
© Li. iphortext :
Igy ciphers An A aithmn Liarsfonirg pledntert
| info envry pel One. S
(> Key 2 Tyjormation uted by the cipher,
The potincipes and nuttods
teat message nto
9, th y) €
@ that morseMEENAKSHI COLLEGE OF ENGINEERING
@ Endpher Conodt) i “The prours @ conuntting plainte)t
fo cpprextext using ¢ ciple and a ky
gp Decipher Coleceele) the pstowess a tomtticg
back nto plafntedt using & Ephuc atid a Kay
J hashing; Conuarling data into a.fixed -length
d ,
vate 10 ensure Patepeity
Cipherte a
Categarien
Vartiou categories a Compulix eeunity ase
~ Cupptography « Data Secusity
4 Compdin Sounity * Nekoork Seuxly «
@ Cy ptogeaphy > cata eneypiion giouption.
Gi) Date Seuitg —> Ensucig Alaje date dior
modifieation and. coviuption.
cit) Connpullix Seesrnitty > Involuas tearing business
- Merooik cpwations and processes.
(iv) Gperational Seavly + Jevelue fPmoucts nettoelp
fom cyber thsuats Pe hacking and
pralvoaste, ~
MEENAKSHI COLLEGE OF ENGINEERING
Techniques :
commonly used -ascwtity techniques axe as Allows
19 Enotyption = Used! te prsotect fnteamation and daa,
2) Acs Contiol: Access dodata & Conmpatir B
Certioutd by Wing anu rachanizin
3) Data Backup Additional Copies g data dleréol in
: elepasrects Storage
peering and 6
and dacictes
Je) Fire voalt + Monitous
netooik tiadfits
alow 1 Hock.
©) Aniinas-SofBHang Ans ete heres
porograme da sual-tinu tHoud,MEENAKSHI COLLEGE OF ENGINEERING
MEENAKSHI COLLEGE OF ENGINEERING
Trocrcils and Vulnmabllity?
abo known
The fundamental potnips g drewtly
(Dtvudt : Potential sks -that can exploft vu
(i) Volrwra (res: plsaknesses Pr a Systm that
can exploPt.
as Cin txiod
lip Cconptolentialitg: Ensuring Pah only cutivon xk
Gncividuals can acess Thformation
Non-sepudiation wel h. Examplr
onsunus that a puso cannot
stendthg an
= Keeping’ on Infomation Secut
ubius a passed
‘ Non-stepuctfa tion
ony any porternting an ackon, Buch as
email making a enfine paynurt.
pu make an online Juansacton ,
~ Gy: A banking app wee
andl OTP 10 acess your account, ensusting
You can alse yourr © lyedenee and tansacton.
Maintaining “the acewtaty anc eee vohen yf!
Duustucer tAPrets of data Pr bank gerustlis a sucht witha ayia
, -Aignatusu. This pacus that you mode the
Pay wnt and peovurts you fon olenying the
transacdtEn later.
~ Ensusting Data AUsalyy
- &y YOhen you alird a mexssagewith yin
LWheteapp enewyption ensuxe that noone can
af a Guptegsaphy
Pocaiust:
modfly FH before Ft wuathes ta suconit. oie
_ [7 Explain: bust
Ensusting that clata and 2ty sens TT] / tA
cau J
Plaintect
(erage - [eoyplion f—
/
Altarke-
(it) Availability:
ee
ae acussible vohen necdid .
- Ensusting Data & Accessible
- 9: Cle Storage afnigy? She Greize Drive ns wey
Hak you files tee Caveilably Fine , Cuan dai denen
pain yananchMEENAKSHI COLLEGE OF ENGINEERING
3( Nekoak Security Hedut
MEENAKSHI COLLEGE OF ENGINEERING
2 kequeuments for Auuthon ticcation:
1D Disclaswe > Release Emoeszge loiluts 10 any purse Touste thd
YT panty:
2) Traficanalysis—> Decony of ™ pallan a traffic t
anyorrntton | v
blw portion
O—> [| antemarea >
3+) Masguotads —> Thserton ef message Into thy pee Mal
eal netiook pom a awa aap “4 4 2) | (Channa f (4
, f |
geout | opponent
fr) Sequence Mocktficatian— > Any wedliticatten blur
port fies
IS) Content mecifieation —? Changes Jo Hur contin
Of yrs msgs
= I
¢
é-) Timing Moot fication > Delay or suplay oy Explain Seps bere Heed 77
Woon
messages.
¢) Source supucltation > Denial o) THansmeser of
mnesage by Aownte
2) Mestinaton Apudlation ~> Dental oy suceipt of
mussigs by alstinatien,MEENAKSHI COLLEGE OF ENGINEERING
oe ABsupting 9B normed opuration.
pessiue atack % to gat Prfemation
MEENAKSHI COLLEGE OF ENGINEERING
4) | Secustity Attacks: | (any changes
e An attempt 10 gain unauthorxed aces to Indrmatiby, [Pkt]
pK & an assyrunetutc exyptographic sgaten that
use +00 Rays:
we fee
o Public kay > Wed
ter encryption showed! with
ewunyone
o/ Pe Avo Kay — Used ba aeceypto” , Raph
becrek by the OUND
data with tu _sucipients public. Ke
only te poiivecte kay con Aouype-
PKC ensues cfocevte communteation Ly J enouypting
‘ocipient uy, lobsch
puain advantages g Pke w
ee secu Rays Oui
chau
ts volclrly week im SC fres Aa ecu wash commun]
sto Explain PRC!
Bob Gua Rays ;
sent a atent mag to AUFee (Gussioby f
esge bo Alice
2) Bob wants fe
age Cprrivedl ey to cLeowypt)
‘cotMEENAKSHI COLLEGE OF ENGINEERING
« Enoupton = Ciphottext = (plainter?Ae ) mod n
MEENAKSHI COLLEGE OF ENGINEERING
Public Ry
coe igh ge
sal ae “ates potivelt | °
Uren be ||, aovypton: Plaintert = (eiprertoct4d) mod n
Applications:
> Dara Eneyptfon —
r Deira SnalouT
y SSLITLS Protocole
:
eee, (— g]—>
pectic kay
lan
fy Enciyption a 4
Eg ‘op Ry
LER Peo v Bons pure
Advountages :
Socwu Commundaxtion-
© Key Managenunt-
& Stalobility -
Challenges
x Computational Ow head
» key Paotection _
> Quantum Consputting Toaat
Fo] g) monies
1 Encuyption
Algoirn.
Example:
© Gunwat
® comput
Conclusion:
PKCls ability fo ensue congeten tality,
authentfeat'e? , anck Prtagerityy rrabus I ap
Prelfapensable part of abil Communication q commute,
4 and ged (©, b(n) =4
ompule d CfoPreik Key) cones +d) med Gln) =|69] Hash Function:
cA hosh
maps date
[eessege anlttiany Leng He
w
val] Fixed tong th.
Tt Rs pefmasily sect fa:
altered »
Y passtood Storage : 7
data buses.
hoetking Qf & Hash Function.
' Takes an
Function % a mathematical algorithm (het
g any Stie to a fixed -Sixe output ,
"The data tobe encocted & often called ths “meszags
cine Tha hosh value B called au “nussage
+ Data Tretageuity * Ensues that data hes not been
7 Degitor Sgnaluoe : Used Aa veorilying authenrclbige
possroods alecuncly in
Pnpet neessage of any Gnghh .
MEENAKSHI COLLEGE OF ENGINEERING
aigest" 1
Sirapty Voligest”,
a= Hos) |
M > vasiable aleng ih N
Ha)? teed" heal
ing a
ae) Reduce a tireg.
hashing alge
ee Gagte bash vauee Coldgest)
‘. un a
r @ Sma Change Qn Input suselts In a
completly olfbfenmt bash ( satanche fect)
5) Hashing Is Oneewoay Coroursibte Feta cunvot
bo selrieuccl from the hash
Exanipus Hesh ing Alger thin
CMDS Cize-bit, Weak dur ty vulnevabiliHt).
° SHA -286 C o56-bt
Strong decumity) -
SHA-BI2 (BI2~bit , Strongen Seausity),
CD MDS Chensage Digert Atgorithoa J
> Fe ts a family g eyptoguaphic hash feunction:
ry 2 ficedt-Uingth, hash vatuc eom Fp
us that
pomewtily used By dart patty checks ard
_ Signehuse —
c
How HD Oaks
1D Thee Yp on % paddled © onsue # Fb a
“pede block FieLLEGE OF ENGINEERING
MEE
NAKSHI COLLEGE OF ENGINEERING
MEENAKSHI CO!
2) The neessaye 93 clivieleot inp fred SIX blocks, =
3) Each beck uncles ces nucltiple stained Gf Marhiamr TYret Gf SHA Atgouthim
opexations: Sa facee’.
b&b poroduced « o-b¥): Obsolete due to wedrerabilitics.
je) The Porat howsh value
porst
fons of SHA:
=
Algerithts)
GD Sha (secure Hash
Example Applicatt
SHA ie a family of ouppto raphe hash functtont
clis[gnet Fa Ae niitattions, spatnly by NIST
@ eunity apphations wehly Ty - > BleckChain “Technolo
and NSA - Tt ensurel, 5 ay
; — = = me cae i iter and ceonbifica les
+ Data mragetly se Passtoerd Grorog® «
+ Degital Ligreilins
+ password hashing « (ad dmunc, GHasn- based aeserge patrenticatien cll)
vas gmac =
@ sua: BS ps a cuyptogaaplic techn! yee that_enhonas
pusage Frage ard autrarOty singe acon”
Rew . fi 7 oe enswtc&:
locking
ahosh ncn’
fication > VeuPhes the sender
1 Enswe data & not tanepurcch voit.
Pocotcts against suplay attacks.
1D The hp mag te divided into -Hmed~ size blocks
2) Each biock uncurgecs ruuttipr sounds Y
matthematital ansfernaten .
3) the Prot susut & a dixed-tength hash ofp,
Haine _mppttcations:
AD -
Eusna smat Change m t/p Causes a drastfe
txanup
> APL auftunttes Hor
Change ir Oulpet.
FY rstsse Secunia -
JMEENAKSHI COLLEGE OF ENGINEERING
Hooiking 9) HMBC:
1 The onda hos a Se
2) TheeRy & combined wlth the mouage Ina
Specific voy (using padd 1).
i hrashecl using a
EI
MEENAKSHI COLLEGE OF ENGINEERING
Haw Digital $tqnaiow oaks:
out ky ord nusmage.
eke
ee ie
| 19 Dowd — 95 Asviorallid -
2) The combined raessage
crepplegeraph hogh Punction « Stops: Key Cuentration;
® tut along tolh
oA User geninalis a public-
using 0 Clyptogeaphie alge
wel to ceedlet ie Sey
uerdicaton,
4) The Gere “HURC code
he rewssage: crsavie).
5) Tha seceiue, who aso has the Seoset kery,
}
fot the Sone prowrs-
pe Baiese) fem
the public Rey Ue used dx
65. Tp ths contd nunc raatches Me _seceivel. Stepd + Signing Prowss:
3
The Sender hash the docimeg useg 2 reek
dunctten (sun-256)
HHAc, tee mecge 1s aubtentte-
Chluthentication Hethed,
+ the Sondin enoypt fe hash
podivelt Rey , genecatiog the digital Si
© The original neeuage and Spgnatioy ave
+ fo the _sucipients
Digital _Fgnaluve
+A aligitel ssignalivw b 2 cecephogeeaphhe ut
Wsel to unify “ths _auttenttedly , Intealy , aro
onigin of a digital meuagt 01 dowment. |
RL Palely h
gl pan usel In ecw Commun cations,
jocu
oh merly are blockchin Pansactrons
Sep: Vertidicaton Reroceis:
swecetued nuisage
© the steceduen
ae
using the uve
Jce) Bonifitss
feng erat
MEENAKSHI COLLEGE OF ENGINEERING
«oth i poupy fhe aylr ra lioer
The secceien le HYP 1 oe ihg He | 9
a He vaendes ips
e4rg red hash»
ooee both hashes smatch ,
veuted , onsie
Y Authenteation
A IntigouTy
4 Mon-sepudia tien
— as
{= re eae Enouypt ee renee
—- tt > NL Pp. pe
original cloc Hashing oe ¥ ca ao r
fso called Ceceut Ke Abt
Auge | Hash poivate fee ee coy | Also cattel Publre ey.
ey: Key reust be Kept Sevat lone gf the 2 keys Talat
y bo kept Secut
. — + wwe nik poe
&| : hrathing ale” BEN ryan @) | The Sonetir @ seecriver FEIGG IARI oem Iae
Sind —> tak an ish Share Hee alge 2 bay | push each haus Ov gf
aint ? P DS gear Font | - OS the matche polit of Begs
: puntioky MG grees “4 | sxe gh energpted sr} Isanne| more tha das ong
ees Hash ae [ass whan tm e6Rfad | ction #0rb Siz.
de Clear te - 7 ! a -
connet- fe used Ror Can bo usect An |
Aearat “Srqrettion « Be teh he elie
autenttity and ile
tHe -dignat@e Pe
Bealaldedd Example
7 Ema) Signeilises
VY Digitally Synod Pots
VU Blockchetin Transaction
MEENAKSHI COLLEGE OF ENGINEERING
pittewnce Blo Yrrmetuie aa egy c
otypreguaphy-
= Aagmnmibric Hy)
One key & envuyption
& ohan Hey for deoryslior
yrmoeliu'e key
Same Key wed Ay
enviyption & deouptton
Mery) atl Towser
Hoy Bchange is 61g
Key exchange is nota