0 ratings 0% found this document useful (0 votes) 11 views 15 pages Cryptography
The document discusses various encryption techniques and security measures to protect data during transmission over networks. It covers concepts such as symmetric encryption, confidentiality, authentication, and non-repudiation, as well as potential security threats and attacks. Additionally, it outlines a model for network security and the importance of cryptography in ensuring data integrity and confidentiality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Cryptography For Later CHA PIERS
® Trkao duction
® Classical encyy orfon echot que,
* Block CRphes ard data encyypt{on Kondowd
*
Comficlerdfaty uusteg Symenestic encryplon
Chertes
Tntto duction
Topteps
* Securtty ~eserds,
% the car Security oxchieecture
Becuntt.
attack
F Secunte
Sesvice
mechan p, mp
A © model for network
® Secunit
Seve
Take duction ;
Es oa
for
* &y uses Foterrety Cormpates, clattor fore
©R —ravell feo one compusen 40 nother
kthen ous dota ip coating eudside, HET, oot
Py 2)
of fond, people with bad Yntention could modtfy’o
Delete put data
a ve
By slog Cayptographyy » adding Seely |
a
ous data 4, eamp foreration -ftom one Computer ros
to Wwe are using Sacrek Cay,
In ory georhy » i 9
Mathematical —formalux to protect data in many Loy, |
aGenputer seuntty t
| ceteatfor, of “dy cestyrrd fo protect dater and
hacneey
Meteora Sere. 2
Meopuse 0 protect data ching thefy trons miSion
Tntewet Secon? ty 2
Measuves to protect data during -crans'son
OVER a coltecttoy of Inter connected Net OOM.
Coyptogerhy &
Coyptogmrby qh a-technique of securty [securing
Frrformectfon and comm umnfantfon Using Coden to
Ersuve corfldentialtty , Integy and authenitation
Geecersiay rmechantpen)
A cthat th pre Venting tUnauthorteed 9112s {0
Fofororant ny
nthe wow “caype” mean tziden
we The tard eysaphy creams 7 corlttog
©)
Cy pio grey Tp the process of ifding Fotormatton
Anat only authowsed pewoo a enessage [dala Core
mead tt
whos TTepita 3) s
BU, 2 Fore |
ter) Epp Ors
Nerang, Oxcuntly ob the se % MoKn -
ob any orgpent 2action.
ees In to protect ~thefe cht
to access “the}
Fenty s the ora
Tae we one Hoving 3_aspects “that i
securtly reeds of on jeatin ate
tarts that owe ponstbility
A the 3 ogpets ave
4) secustty atlas |
b) Secuntiy mechani
SD seanity Services
Se attacks ‘>
Poy action “that compentorntiges “the
Frfowmation owned by an crgemization
Senitley crechoripnn 3!
| A Mechantunrthat fp detysed to detect, prevent
(OD ReCOVED fore a Secarstty attack
Seurly seven
A Senice that enhances the Saunly ]
Hing Sqstermps amd the fnforvmation eomp-femp |
0% Srmanfaation |
1 coffdentalty 41. Access conteot
2 Authentteaifon 5 Non Repudfatton
3 Integration
of
secarty
oh the dada,
1 : 5 : sho
Cone dentality — Bofermatton Af ancner date the ok |
Ang tmforrmation fn computer System accessable
ABS austhowt aed by authoriocd pewter
< a el
2 Aether teas To chee valid (rot
DN fy the. methantgm 0 fdentify the st
Fthet {uses pame omdnpasienrds mesiy Usecl
Authentication1 tlegaty . Ta add data (modify alata © au'r 2
“this exmang only author aed pesos trove
PrBiloge. C permtssfonp)) to chenge (oR) Mody the
data
+ Aces contyot +.
Requiwes ~that acces to tnforsrration Resour,
(May be combuolied by (08) “he. tongel Syste
Ss
MR Ellaltn te ose Sender @ Rectvey nc
einen Person
| Reakves, Reauher “that netthen the sence roy
oto. crnessage be able 10 deny the
| Gon ontssion.
Non Repudfation prevents. efthen sender os)
aerate feom, dlerying a -txanemnfiied ™estoge
Sealy Metheny 3
© seccety mmecharniam jy a netted “that
Motels ciate from Unauthorised aces; atioe%s
974 other threads
Ty pepo secuntty mechorntarys
hk enefpherment | enceypation. 1 4,
* ofjftas sia mature
S AuthentPcation Ocharge
4. eccess contsod
S- Oata Brtegaity
1 Enefphesment qe) Encrypten "wy
“this Gecavfty methanfarn deal, + b
lon d covering of cata eohth hein data to beer
confidential.
| % TE ached
Coleutadion, Com) algorierens
Sib, bifeting
apelytng crathernedt (cal
> Digftal Siearatunen
achtved by
is, securott fy methanignn
adatog Afgttat data. Tt [A -fown
electronic
johteh
Sfymatine ytohfch Tp added by Sender, coment)
Checwed by Seodes | Recefven |
re evrelea00
Tw worry !
3 Duthentfcatlon cxchorae +.
THfs seccrstly mmechant pm deals coflh fentlty
to be Knam in communtaxtlon.
TEA fA achtved atthe Tep/rp layer
NE Thao canys tramd shally mechantiaen "1 Used |
do erane data fm send (on mot
4 Access contvols_
TATA enethomtam jp used to slop (enauthodat
Access,
a * TF con be achved
SPOS apply Img pasucorda 5 casing phrecanlyn
ond 80 on,
same OSO. | Tratelgehiss o
hin secundy mechariam Jr used by
MCs dina hth fp created by 4
ee i
verefous techniques
exppending
at Fiselp
leegerker connect) Seccartee,
Ht deffren gecesi ty, ‘sesvitex and
: tnt Con be used at cath of the 3
“seven
erate approach FP provi,
a ae
pose ately:
| & parie attath attempe © |
make use of fnforsmerton farm the “Y
declot apfect sysem se s0Usep
we clastftd tnto Keo tyrt
jet) (ORD
stem bd
+ paste attacks 7
|
| |. Release of message conten,
| 2 -Proete omatys'
ri Rleage of eeuoge cortentp send © Reet
lector rofl
© Tele phone comessation , 07 el
| Messoge and a transfered file MY
Se
NS ve Lor) eonfidentfal tn-for mation. PF ceed
Vhe to 9 Stith, Infor rake °
poevert the opnen! pron leary |
the ‘
comtainn af thi Foformation
contain
i TRIS onallysiny—— portinie es) cot
ie. TH tee had enayptén, protection ty places
ee mfght sell be able to obsene “tre
de oe rremages The opponent coutd
; eerie location” and ‘tdenihy [identity |
orrenurnfeaton frost, ond ebsewve “the leagih
messogen being exchompeds
AE Thi To-foamation miyht be useful In guessing
eo Of communication “thet Las tartCae ators, <— Ser Terte-a;-
An active attack attempls 49 AEE System |
Fesermcep (08) affect thets opesartion
A Medel for netoosn Seurty
oe active ectlauky. Com ‘ee clautfied into 4
tyrep |
bh matyu exade
2. Replay }
3 meditation of mescoqgs | |
Be clenteth od. cevvtce
Rotormabion,
gf Hosayiemde sp comet coe format ont, | |
eal eerie, enti | |
mre entity pretends to be a défferent |
Replays ne Trancentss on |oata
Tt trvolven the pousive captor’ zt a
tml ond fp sub —sequnt oe terme eion |
Prodice and unautroriaed oft i
3 Medfeation of mesiagee s ROP PTF]
1 Shy. coma. that some pare ore" el ates)
4p aster, too Messages owe dealy [detord (*) \ Yr]
eo cheep ds an urauttestend oftet P.
to ate i | \ % i J
4 Deniad of servicers |
Te poeventa “the Porral use (08) mona
ment of communication facility. ha
) tg
ct tnfomtralion
2
, o dat
A seat
oppeneal
panty
Gey, arbiter, dftateutey
Trusted third,
Seevet
info-smmakion
|
s
Secunte
paces for netecorn
Fa’ |
+ Aine , & message tg be ctsonsden fiom one
| Prison to ernatten across Some Sok ob fotereet
“0 Legftat ee afer tp establish by
defintog a seute —threagh the fintesnck from
ce 40 destination
% The metuoek Secentty cnadet (the Stucke
Md laye of “enjtp,
Tip model shags that -ineve oe 4
w Calan AD algorttny fos performing tthe
SAAty —adladed trary formatter the alyosten
should be Suth that an oprovent aannet defest
"D prespose
| 2. Genevate “the Secret Information to
be aseck eslin “the a
S wevelop methods for the déstrituttn
One Shariog ch the Secret Tr-formabtin.
4. speckty a protocd to be used by
FS Sen Piindpaly that mrmker use oftne
peerag oatthnn ama “the seco frvevmale,
Stee algontinm
Atheve Oo pantfeuter, secustny service
EASk oak th esfrtng ax postal Sey |
ae Uae th
ATioo Kfrds, ot threads can be presented by “the |
Progsamy, |
8) Thfosmation access thsecdp
thread,
b) sewice
Mod? data on behalf of Use coef
have acters to that data
ubo |
chou |
|
not
> Servite threats ¢-
Cxplofet seavice Flaw, fn compute.
|
examples Ar Scltopre
Viouses ard woos are to
Otto, STC) ——
di iP ifagelay |
£7| FF 82 Je] E58
eal 5 \6
=e
meno- alphabet efpher
> poly ~ alphabet citer
> one- Efene pad
Wbslfeakion -Lechotquen, 4
Reflnkton ¢
Th fe ene of clasicat ercsy pon
TrechrPayucs, Se fatiea Wohese the Characters
PSetent fen the original mestage oF eer
by Other choractesg (or) Numbers hemiey™ Pe
©) Caeser cfcben 2
The eonltere Krcion use ob oh “I
Cipher 5 ard the sfonplect coat Ly ” jullus cesses
athe cacsas ciphey involuys seplating each
telex of the alphatek cofth -the eters Standing
S elacep frrthe cleo “the Alphabet
subsitiuten,4 tee cam cefine “Ihe trerapferrrten by Wy |
At peaicg , a flags
uy v}eo|
o
7
T TTT
ek er.
HH
aaah
Plain text 2- meet athe pte 9%) by
toR TD| SMU,
et \me
cfphey text 2 pal a ‘Dp TWHU) LOKH)
2. the simele ord oy |
|rettod of encyption techn’ que
se fs simple type ef. sbsttuter cighes,
Beh once: cht an et fo. 22 10
a letee oth Some fed rumba ot postion |
chen with alfhatet
om THe corn tbe expsesseel 08 paix.
Fr cach ‘piste text letter“ Subse phecirhe
ber tet & fon chore s
tne encayption f° ys 4
P r posteOmrs ” Abe
O shite reay be of omy anroianty Sotho
pie gereval caesas agosto Fn.
area aa |
[C= ecretpr) mad OO
an the “vornge "I to 25+
Sinrly 8 polos
lainthese “k’4aken on a value
The decyyption allgpaten bp
[p= oc =(e-*) mod G8) | |
“3 Fimpostant chomctenstin of ths problem |
q@mated up 10 Ube Paute- force Cayet oralysq
©) “The erey plier and deception. algerie. ox
Kroon |
thee ae only 95 typ © OY
9 The lonpuage of the platn text
Jom easily orecognfaatied
Bile alphabet cipher
A reno alphabetic. Ciphes ina ype of
Substation Cipbes
hae
i ‘Ththtp tethnfgue, ee Can Swepbte single
erates, aotth ony othe, 25 chovactey,. And |
pia
simple |
[the odes, of the Seploce ment > not ved in
shy
# Chample ; we com se place Sq lwith ang
a gaan Bee Con be
Othe, chosactesx efron “St 2
sephcat with ‘A’e2) “Cw 2” amd $00m* Th Caesay cipher » the attackes r cash pe
“The platy teat ga Hp easily oecogntaable,
+ TH Moro alpabele Chey » carga text
Atfyiceets Yagcloy jan. cpbenint
letter map, fo a
“atten
lettes
® possible comb inating ove 26!
ofelee|s{" PY ey
alvin Jai le loki a
Phin tent ¢- THANK YOU
Gipher text 2 enogp Ba
“ Secerrity, “them Coresass Clpher
= ratte ereayptfon and, leenpitn 10 bi
Mone alpha bet?c ciphes, matotaton on foeeres
pei ald edt het eur sees
The poly alphabet cipher f
SIP alpha wsce det by ee,
rant typ |
seth cipher asp matte one ch
we cath fetter of the Keytoord deternioen Hh
plage
Hain teat |
exam s- |
|
pawn |
athe phin tect (At armack at
i- Lemon |
key wor
onvat the plain toot
‘Th -thip, techet que y (0 “
corel. The Pore
‘into cipher text ty using key
age hoy |
Ste |
Convert letters to Numbers
apt": feste Le keys [> [7 el
lolita fstype ie] TS 1o\n) |
slurnbey| | —)— 4 4 >.
hi ojp |e) 1s |v |e 1y wir vf!
ct gee ir
Yelal w lis fe |e | Cee Le Pata
Numbers |
eat ty | Lg
eset: Fare «LA Baer
oe ela Zs alKeyuort
Coeplace)
aE
crop uty
1) ed
Dx’
6 BR
a
es
26
Wye
>
Re rratteden
aimye BMS
"=
aymyigio ve
reer
2) 26) sJo 3B! wus) 222°
ot y a ¢
earns |
|
ya) 17 med 26
Ee sanyeton)| 1) sod 36 paces
83 °
pease | of Be
word formula, Ma habe wt Zz “bus
cory moa 36 | a sep-33— |
Ciqrayrod 26] 23 | Decryption «sg |
piz(ct-wr +26) mod 26
(tats ered 26 sae | [Pi € = |
(or ° rt 3! :
Obl ered 261 4. a eas eo a w8
| _texf (e)
a LT u - w hiaaaiel o [al
Vv
ee ’ ly Tiwi “Os ng 43rd]
Cory) rede} 4. e eee | 23°] eT + 7 |
s M pe a +26 rat) 19 fT
1aqti29 mrod26| ry Fe
Canupereds] UT ER Arta 0 [ke Cigna azeyerong ©
(ora) erodas| 18__| p || | (is perrente) 2
Canty root wT es |
- | ¥
Ceatu erodes] i ee e aif
aes a=
Ege dey eee pea pee Rabetdt & a
a ; Wj (acne mabe © |*
ae (Corel ze)rred 26) 22 |
amare) ic fmeret Cin-ty aseptic] 13 |man cer, the regi acon of9
6 ai p mod 34|
[getepursd 2
Cipher wey lain
kee ON tent
4 Ard the deryplion ‘ip clone by og
(pets mod 26)
pam 9
ext Theme
Pifoce the Key Jp a 2¥2 matic, plain tock
Amack ptould be commted into Veco OF
a
Gireck = aT TA ch
[a] (59 (9
=
cl ole [ele [aff
Peseta [als afele veh
als|tlolviw |
ee FE i Bete eh tba
Sees
[aL (ae. hae 221 34) nod 26
=. i a
|e gin eae prewes)
i. + shout be
7B deeypt the ches tot pameze: 8
trio vetody of lerglh 2!
Convested me
(fda) hehe AYE,
ss vector
PeKE mod 26
e al
2 gfednes = |Pmaagt
epee roe PRT
= "Sj mod 26 Pe fF |
F (.le(8)
eee BLE PS Tppotah
4 Pekle mod 26 a?’
Be -fsreycey tetaal = Car
2KID AIST 0 96 SCO)
A3% vector
Pele mod 26
ofa 6
Ee sa Catala 26
| 30) 366Cy
26
=f 2xst 25x1y
| eet: 1S xly piesa
xf let 350 |
Any Sear i> 4
lh 366-
tsa | mod 26
= LeJ-fJ
Weelebe phos. |
ay adyantag’e o-
paleadbys [tog] “ ote fas-the foltacirg
athe ttt efpher tg"
Ad Vomtages Lsecurity ;-
AS the aftr cipher caorky ohh browrs ot
letey, onthe thon afogle Leuel © cae *o
wolth capfiak and: tasrcase PM,
cypted and deceypted 7)
ee Sm
3 Mathematital backer
Mone ooh
“hes allgoafthen tp based on the fege ‘
bea and provtdes. O fearre ee)
Understanding and cweosting aA)
Faia cena?
+ Complenity
lfaeeet
advanced
ee operations od
Thy iP raf
fp allagsithen Uses a
“4 sever the algerie
spa ptfon proce dare. his Sonp'
Secusfay crave
By Eley ait cfpheve "
“the best krowon Mattfple Leta” enevgpAion
the" pay false cipher ¢
4 Th thin ciphers echich Lean
Plain text as single wnfig and Cony
Wolo cipher text dagrarys,
The flog fatex algorttnin f tose O° el
[df Sex watitx of Cetteyp condewucted vay Ori
citer hl
Sogpony: tore
latin inf unl)
tl
F Genesate tne Heyp Square owt @
“He kajquaoe Gh 505: gntd caleba
ACESS Op thelshey for encaypttng the plot text
Belvewn tegen / usage] eavartnt &
és t yahien more
Prequency Aratyss thee SEZ mM
chee ye to ae erevypttona 4
a Sfaniticomtly 4o beak the foe quency oral
ee Lsed yp bseok Sipe Subteeatton Cehy
Fe Coypl cralyate J. frposible
* Making ‘the aibttertion in Aimee