Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views15 pages

Cryptography

The document discusses various encryption techniques and security measures to protect data during transmission over networks. It covers concepts such as symmetric encryption, confidentiality, authentication, and non-repudiation, as well as potential security threats and attacks. Additionally, it outlines a model for network security and the importance of cryptography in ensuring data integrity and confidentiality.

Uploaded by

nayeem.vsrnvr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views15 pages

Cryptography

The document discusses various encryption techniques and security measures to protect data during transmission over networks. It covers concepts such as symmetric encryption, confidentiality, authentication, and non-repudiation, as well as potential security threats and attacks. Additionally, it outlines a model for network security and the importance of cryptography in ensuring data integrity and confidentiality.

Uploaded by

nayeem.vsrnvr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 15
CHA PIERS ® Trkao duction ® Classical encyy orfon echot que, * Block CRphes ard data encyypt{on Kondowd * Comficlerdfaty uusteg Symenestic encryplon Chertes Tntto duction Topteps * Securtty ~eserds, % the car Security oxchieecture Becuntt. attack F Secunte Sesvice mechan p, mp A © model for network ® Secunit Seve Take duction ; Es oa for * &y uses Foterrety Cormpates, clattor fore ©R —ravell feo one compusen 40 nother kthen ous dota ip coating eudside, HET, oot Py 2) of fond, people with bad Yntention could modtfy’o Delete put data a ve By slog Cayptographyy » adding Seely | a ous data 4, eamp foreration -ftom one Computer ros to Wwe are using Sacrek Cay, In ory georhy » i 9 Mathematical —formalux to protect data in many Loy, | a Genputer seuntty t | ceteatfor, of “dy cestyrrd fo protect dater and hacneey Meteora Sere. 2 Meopuse 0 protect data ching thefy trons miSion Tntewet Secon? ty 2 Measuves to protect data during -crans'son OVER a coltecttoy of Inter connected Net OOM. Coyptogerhy & Coyptogmrby qh a-technique of securty [securing Frrformectfon and comm umnfantfon Using Coden to Ersuve corfldentialtty , Integy and authenitation Geecersiay rmechantpen) A cthat th pre Venting tUnauthorteed 9112s {0 Fofororant ny nthe wow “caype” mean tziden we The tard eysaphy creams 7 corlttog ©) Cy pio grey Tp the process of ifding Fotormatton Anat only authowsed pewoo a enessage [dala Core mead tt whos TTepita 3) s BU, 2 Fore | ter) Epp Ors Nerang, Oxcuntly ob the se % MoKn - ob any orgpent 2action. ees In to protect ~thefe cht to access “the} Fenty s the ora Tae we one Hoving 3_aspects “that i securtly reeds of on jeatin ate tarts that owe ponstbility A the 3 ogpets ave 4) secustty atlas | b) Secuntiy mechani SD seanity Services Se attacks ‘> Poy action “that compentorntiges “the Frfowmation owned by an crgemization Senitley crechoripnn 3! | A Mechantunrthat fp detysed to detect, prevent (OD ReCOVED fore a Secarstty attack Seurly seven A Senice that enhances the Saunly ] Hing Sqstermps amd the fnforvmation eomp-femp | 0% Srmanfaation | 1 coffdentalty 41. Access conteot 2 Authentteaifon 5 Non Repudfatton 3 Integration of secarty oh the dada, 1 : 5 : sho Cone dentality — Bofermatton Af ancner date the ok | Ang tmforrmation fn computer System accessable ABS austhowt aed by authoriocd pewter < a el 2 Aether teas To chee valid (rot DN fy the. methantgm 0 fdentify the st Fthet {uses pame omdnpasienrds mesiy Usecl Authentication 1 tlegaty . Ta add data (modify alata © au'r 2 “this exmang only author aed pesos trove PrBiloge. C permtssfonp)) to chenge (oR) Mody the data + Aces contyot +. Requiwes ~that acces to tnforsrration Resour, (May be combuolied by (08) “he. tongel Syste Ss MR Ellaltn te ose Sender @ Rectvey nc einen Person | Reakves, Reauher “that netthen the sence roy oto. crnessage be able 10 deny the | Gon ontssion. Non Repudfation prevents. efthen sender os) aerate feom, dlerying a -txanemnfiied ™estoge Sealy Metheny 3 © seccety mmecharniam jy a netted “that Motels ciate from Unauthorised aces; atioe%s 974 other threads Ty pepo secuntty mechorntarys hk enefpherment | enceypation. 1 4, * ofjftas sia mature S AuthentPcation Ocharge 4. eccess contsod S- Oata Brtegaity 1 Enefphesment qe) Encrypten "wy “this Gecavfty methanfarn deal, + b lon d covering of cata eohth hein data to beer confidential. | % TE ached Coleutadion, Com) algorierens Sib, bifeting apelytng crathernedt (cal > Digftal Siearatunen achtved by is, securott fy methanignn adatog Afgttat data. Tt [A -fown electronic johteh Sfymatine ytohfch Tp added by Sender, coment) Checwed by Seodes | Recefven | re evrelea00 Tw worry ! 3 Duthentfcatlon cxchorae +. THfs seccrstly mmechant pm deals coflh fentlty to be Knam in communtaxtlon. TEA fA achtved atthe Tep/rp layer NE Thao canys tramd shally mechantiaen "1 Used | do erane data fm send (on mot 4 Access contvols_ TATA enethomtam jp used to slop (enauthodat Access, a * TF con be achved SPOS apply Img pasucorda 5 casing phrecanlyn ond 80 on, same OSO. | Tratelgehiss o hin secundy mechariam Jr used by MCs dina hth fp created by 4 ee i verefous techniques exppending at Fiselp lee gerker connect) Seccartee, Ht deffren gecesi ty, ‘sesvitex and : tnt Con be used at cath of the 3 “seven erate approach FP provi, a ae pose ately: | & parie attath attempe © | make use of fnforsmerton farm the “Y declot apfect sysem se s0Usep we clastftd tnto Keo tyrt jet) (ORD stem bd + paste attacks 7 | | |. Release of message conten, | 2 -Proete omatys' ri Rleage of eeuoge cortentp send © Reet lector rofl © Tele phone comessation , 07 el | Messoge and a transfered file MY Se NS ve Lor) eonfidentfal tn-for mation. PF ceed Vhe to 9 Stith, Infor rake ° poevert the opnen! pron leary | the ‘ comtainn af thi Foformation contain i TRIS onallysiny—— portinie es) cot ie. TH tee had enayptén, protection ty places ee mfght sell be able to obsene “tre de oe rremages The opponent coutd ; eerie location” and ‘tdenihy [identity | orrenurnfeaton frost, ond ebsewve “the leagih messogen being exchompeds AE Thi To-foamation miyht be useful In guessing eo Of communication “thet Las tart Cae ators, <— Ser Terte-a;- An active attack attempls 49 AEE System | Fesermcep (08) affect thets opesartion A Medel for netoosn Seurty oe active ectlauky. Com ‘ee clautfied into 4 tyrep | bh matyu exade 2. Replay } 3 meditation of mescoqgs | | Be clenteth od. cevvtce Rotormabion, gf Hosayiemde sp comet coe format ont, | | eal eerie, enti | | mre entity pretends to be a défferent | Replays ne Trancentss on |oata Tt trvolven the pousive captor’ zt a tml ond fp sub —sequnt oe terme eion | Prodice and unautroriaed oft i 3 Medfeation of mesiagee s ROP PTF] 1 Shy. coma. that some pare ore" el ates) 4p aster, too Messages owe dealy [detord (*) \ Yr] eo cheep ds an urauttestend oftet P. to ate i | \ % i J 4 Deniad of servicers | Te poeventa “the Porral use (08) mona ment of communication facility. ha ) tg ct tnfomtralion 2 , o dat A seat oppeneal panty Gey, arbiter, dftateutey Trusted third, Seevet info-smmakion | s Secunte paces for netecorn Fa ’ | + Aine , & message tg be ctsonsden fiom one | Prison to ernatten across Some Sok ob fotereet “0 Legftat ee afer tp establish by defintog a seute —threagh the fintesnck from ce 40 destination % The metuoek Secentty cnadet (the Stucke Md laye of “enjtp, Tip model shags that -ineve oe 4 w Calan AD algorttny fos performing tthe SAAty —adladed trary formatter the alyosten should be Suth that an oprovent aannet defest "D prespose | 2. Genevate “the Secret Information to be aseck eslin “the a S wevelop methods for the déstrituttn One Shariog ch the Secret Tr-formabtin. 4. speckty a protocd to be used by FS Sen Piindpaly that mrmker use oftne peerag oatthnn ama “the seco frvevmale, Stee algontinm Atheve Oo pantfeuter, secustny service EASk oak th esfrtng ax postal Sey | ae Uae th ATioo Kfrds, ot threads can be presented by “the | Progsamy, | 8) Thfosmation access thsecdp thread, b) sewice Mod? data on behalf of Use coef have acters to that data ubo | chou | | not > Servite threats ¢- Cxplofet seavice Flaw, fn compute. | examples Ar Scltopre Viouses ard woos are to Otto, STC) —— di iP ifagelay | £7| FF 82 Je] E58 eal 5 \6 =e meno- alphabet efpher > poly ~ alphabet citer > one- Efene pad Wbslfeakion -Lechotquen, 4 Reflnkton ¢ Th fe ene of clasicat ercsy pon TrechrPayucs, Se fatiea Wohese the Characters PSetent fen the original mestage oF eer by Other choractesg (or) Numbers hemiey™ Pe ©) Caeser cfcben 2 The eonltere Krcion use ob oh “I Cipher 5 ard the sfonplect coat Ly ” jullus cesses athe cacsas ciphey involuys seplating each telex of the alphatek cofth -the eters Standing S elacep frrthe cleo “the Alphabet subsitiuten, 4 tee cam cefine “Ihe trerapferrrten by Wy | At peaicg , a flags uy v}eo| o 7 T TTT ek er. HH aaah Plain text 2- meet athe pte 9%) by toR TD| SMU, et \me cfphey text 2 pal a ‘Dp TWHU) LOKH) 2. the simele ord oy | |rettod of encyption techn’ que se fs simple type ef. sbsttuter cighes, Beh once: cht an et fo. 22 10 a letee oth Some fed rumba ot postion | chen with alfhatet om THe corn tbe expsesseel 08 paix. Fr cach ‘piste text letter“ Subse phecirhe ber tet & fon chore s tne encayption f° ys 4 P r posteOmrs ” Abe O shite reay be of omy anroianty Sotho pie gereval caesas agosto Fn. area aa | [C= ecretpr) mad OO an the “vornge "I to 25+ Sinrly 8 polos lainthese “k’4aken on a value The decyyption allgpaten bp [p= oc =(e-*) mod G8) | | “3 Fimpostant chomctenstin of ths problem | q@mated up 10 Ube Paute- force Cayet oralysq ©) “The erey plier and deception. algerie. ox Kroon | thee ae only 95 typ © OY 9 The lonpuage of the platn text Jom easily orecognfaatied Bile alphabet cipher A reno alphabetic. Ciphes ina ype of Substation Cipbes hae i ‘Ththtp tethnfgue, ee Can Swepbte single erates, aotth ony othe, 25 chovactey,. And | pia simple | [the odes, of the Seploce ment > not ved in shy # Chample ; we com se place Sq lwith ang a gaan Bee Con be Othe, chosactesx efron “St 2 sephcat with ‘A’e2) “Cw 2” amd $00m * Th Caesay cipher » the attackes r cash pe “The platy teat ga Hp easily oecogntaable, + TH Moro alpabele Chey » carga text Atfyiceets Yagcloy jan. cpbenint letter map, fo a “atten lettes ® possible comb inating ove 26! ofelee|s{" PY ey alvin Jai le loki a Phin tent ¢- THANK YOU Gipher text 2 enogp Ba “ Secerrity, “them Coresass Clpher = ratte ereayptfon and, leenpitn 10 bi Mone alpha bet?c ciphes, matotaton on foeeres pei ald edt het eur sees The poly alphabet cipher f SIP alpha wsce det by ee, rant typ | seth cipher asp matte one ch we cath fetter of the Keytoord deternioen Hh plage Hain teat | exam s- | | pawn | athe phin tect (At armack at i- Lemon | key wor onvat the plain toot ‘Th -thip, techet que y (0 “ corel. The Pore ‘into cipher text ty using key age hoy | Ste | Convert letters to Numbers apt": feste Le keys [> [7 el lolita fstype ie] TS 1o\n) | slurnbey| | —)— 4 4 >. hi ojp |e) 1s |v |e 1y wir vf! ct gee ir Yelal w lis fe |e | Cee Le Pata Numbers | eat ty | Lg eset: Fare «LA Baer oe ela Zs al Keyuort Coeplace) aE crop uty 1) ed Dx’ 6 BR a es 26 Wye > Re rratteden aimye BMS "= aymyigio ve reer 2) 26) sJo 3B! wus) 222° ot y a ¢ earns | | ya) 17 med 26 Ee sanyeton)| 1) sod 36 paces 83 ° pease | of Be word formula, Ma habe wt Zz “bus cory moa 36 | a sep-33— | Ciqrayrod 26] 23 | Decryption «sg | piz(ct-wr +26) mod 26 (tats ered 26 sae | [Pi € = | (or ° rt 3! : Obl ered 261 4. a eas eo a w8 | _texf (e) a LT u - w hiaaaiel o [al Vv ee ’ ly Tiwi “Os ng 43rd] Cory) rede} 4. e eee | 23°] eT + 7 | s M pe a +26 rat) 19 fT 1aqti29 mrod26| ry Fe Canupereds] UT ER Arta 0 [ke Cigna azeyerong © (ora) erodas| 18__| p || | (is perrente) 2 Canty root wT es | - | ¥ Ceatu erodes] i ee e aif aes a= Ege dey eee pea pee Rabetdt & a a ; Wj (acne mabe © |* ae (Corel ze)rred 26) 22 | amare) ic fmeret Cin-ty aseptic] 13 | man cer, the regi acon of9 6 ai p mod 34| [getepursd 2 Cipher wey lain kee ON tent 4 Ard the deryplion ‘ip clone by og (pets mod 26) pam 9 ext Theme Pifoce the Key Jp a 2¥2 matic, plain tock Amack ptould be commted into Veco OF a Gireck = aT TA ch [a] (59 (9 = cl ole [ele [aff Peseta [als afele veh als|tlolviw | ee FE i Bete eh tba Sees [aL (ae. hae 2 21 34) nod 26 =. i a |e gin eae prewes) i. + shout be 7B deeypt the ches tot pameze: 8 trio vetody of lerglh 2! Convested me (fda) hehe AYE, ss vector PeKE mod 26 e al 2 gfednes = |Pmaagt epee roe PRT = "Sj mod 26 Pe fF | F (.le(8) eee BLE PS Tppotah 4 Pekle mod 26 a?’ Be -fsreycey tetaal = Car 2KID AIST 0 96 SCO) A 3% vector Pele mod 26 ofa 6 Ee sa Catala 26 | 30) 366Cy 26 =f 2xst 25x1y | eet: 1S xly piesa xf let 350 | Any Sear i> 4 lh 366- tsa | mod 26 = LeJ-fJ Weelebe phos. | ay adyantag’e o- paleadbys [tog] “ ote fas-the foltacirg athe ttt efpher tg" Ad Vomtages Lsecurity ;- AS the aftr cipher caorky ohh browrs ot letey, onthe thon afogle Leuel © cae *o wolth capfiak and: tasrcase PM, cypted and deceypted 7) ee Sm 3 Mathematital backer Mone ooh “hes allgoafthen tp based on the fege ‘ bea and provtdes. O fearre ee) Understanding and cweosting aA) Faia cena? + Complenity lfaeeet advanced ee operations od Thy iP raf fp allagsithen Uses a “4 sever the algerie spa ptfon proce dare. his Sonp' Secusfay crave By Eley ait cfpheve " “the best krowon Mattfple Leta” enevgpAion the" pay false cipher ¢ 4 Th thin ciphers echich Lean Plain text as single wnfig and Cony Wolo cipher text dagrarys, The flog fatex algorttnin f tose O° el [df Sex watitx of Cetteyp condewucted vay Ori citer hl Sogpony: tore latin inf unl) tl F Genesate tne Heyp Square owt @ “He kajquaoe Gh 505: gntd caleba ACESS Op thelshey for encaypttng the plot text Belvewn tegen / usage] eavartnt & és t yahien more Prequency Aratyss thee SEZ mM chee ye to ae erevyptton a 4 a Sfaniticomtly 4o beak the foe quency oral ee Lsed yp bseok Sipe Subteeatton Cehy Fe Coypl cralyate J. frposible * Making ‘the aibttertion in Aimee

You might also like