COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Network Security Chapter
L1.1. An Introduction to Classical Cryptosystems Rocky K. C. Chang, February 2013.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Section 2.1: Shift Ciphers and Modular Arithmetic The purpose of this section is to learn about modular arithmetic, which is one of the fundamental mathematical.
Lec. 5 : History of Cryptologic Research II
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
9/03/15UB Fall 2015 CSE565: S. Upadhyaya Lec 2.1 CSE565: Computer Security Lecture 2 Basic Encryption & Decryption Shambhu Upadhyaya Computer Science &
Cryptography Lynn Ackler Southern Oregon University.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Computer Security (CS4800)
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Lecture 2 Classical Cipher System SIMPLE SUBSTITUTION CIPHERS By: NOOR DHIA AL- SHAKARCHY
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Chapter 2 Basic Encryption and Decryption
Columnar Transposition
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Confusion and Diffusion
Computer Security Chapter Two
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background to cryptography is illustrated, beginning with a discussion of general purpose cryptographic techniques and then the cryptanalysis including: frequency distribution, index of coincidence, and kasiski method is discussed. Various authentication schemes and examining their implementation advantages and drawbacks are illustrated. Different access control systems with advantages and disadvantages are examined. Viruses, logic bomb, Trojan horse, and worms are examined as well as methods to address each of these threats. Finally, the topic of network security and how it differs from single host security are presented. Securing network is not just a matter of extending the practices used from one machine to many but also entails additional elements which are not concerned at the single host.

References : Charles P. Pfleeger, "Security in Computing", Prentice-Hall International, Inc, Eric A. Frischand Gregory B. White, "Secure computers and Networks, Analysis, Design, and Implementation", CRC Press LLC, William Stalling, "Cryptography and Network Security: Principle and Practice", Fourth Edition, Prentice Hall Pub Date : November 16, Bruce Schneier, "Applied Cryptography", Prentice-Hall, Inc Noor Dhia, “ Black- Box Attack using Fuzzy Neuro- Identifier”, Baghdad, د. وسيم عبد الامير الحمداني, ” انظمة التشفير التقليدية “, 1995.

Syllabus 1- Fundamental of Computer Security Computer Security Definition Objective of Computer Security Kinds of Security Breaches 2- Cryptography Cryptographic Terminology Substitution Cipher - Monoalphabetic - Homophonic - Polyalphabetic - Polygram Transposition Cipher - Fixed Period - Columnar

Syllabus 3-Cryptanalysis Symmetric Cryptography ( classical cipher system ) Asymmetric Cryptography 4- Information Hiding 5- User Authentication 6- Malicious Code - Virus - Trojan Hours - Worm 7- Network Security

COMPUTER AND NETWORK SECURITY INTRODUCTION: Cryptograph: Is the science and study of secret writing. Cipher: Is a secret method of writing. Where by plaintext (or clear text) is transformed in to ciphertext (cryptogram). Encipherment (encryption): The process of transforming plaintext in to ciphertext. Decipherment(Decryption): Is the reverse process of encipherment,of transforming ciphertext into plaintext. Cryptanalysis: The art and science of breaking ciphertext.

Types of Key-based algorithems : 1- Symmetric algorithms (privet key):- are algorithms where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same. Symmetric algorithms can be divided in to two categories: Stream cipher: which operator on the plaintext a single bit at a time. Block cipher: which operator on the plaintext in a group of bits called blocks at a time. 2- Asymmetric algorithms (public key):- Are designed so that the key used for encryption is different from the key used from decryption and cant'nt easily calculated from each others.

plaintext Encipher Decipher Key ciphertext Figure -1 Encryption and Decryption symmetric Process plaintextciphertext Encipher Decipher K1 K2 Figure -2 Encryption and Decryption Asymmetric Process

Cryptology CryptographyCryptanalysis AsymmetricSymmetric Block cipherStream cipherBlock cipher Cipher system ModernConventional AsymmetricSymmetric Block cipherStream cipherBlock cipher Figure-3 Cryptography classification Figure-4 Cipher system classification

CLASSICAL CIPHER SYSTEMS Classical ciphers have been used since ancient Egypt to exchange classified messages between authorized persons. Since then, different methods and techniques are used in order to increase security level of such information. Most of theses methods and techniques are based on the idea that each natural language has its own distribution characteristics. The encryption process aims to uniformly flatten the statistical characteristics of language and obscure any correlation and dependencies between plaintext and ciphertext by diffusion and confusion. Cryptographic systems have been classified into two systems: Symmetric (one-key) cryptosystems: In symmetric or one-key systems, the enciphering and deciphering key are the same. Asymmetric ( two-key) cryptosystem: In asymmetric or two-key systems, enciphering and deciphering keys are different in such away that at least one key is computationally infeasible to determine from the other.

1- TRNSPOSITION CIPHERS: Transposition ciphers rearrange characters according to some scheme. This is done classically by some geometric figure, the figure is 2-dimentional array, and often called "permutation". Example: Encrypt the word “RENAISSANCE" using 3x4 figure, using [ ] scheme Ciphertext: ESCAARINNSE. Many transposition ciphers permute characters of the plaintext with fixed period d. let Zd be the integers 1….d, and f : Zd → Zd be a permutation over Zd, then successive blocks of d characters are encrypted by permuting the characters according to f. M = m1 …md,md+1,…...m2d,…..is encrypted as Ek(M) = mf(1)….mf(d), md+f(1) … md+f(d) RENA ISSA NCE

1- TRNSPOSITION CIPHERS: Example: suppose d = 4 and fE =[ ] and FD = [ ],thus: I1234 F(i)2413 M = RENA ISSA NCE Ex(M) = EARN SAIS CNE Dx(C) = RENA ISSA NCE

SIMPLE SUBSTITUTION CIPHERS: In simple substitution (or mono alphabetic) ciphers, each character of the plaintext replaced with a corresponding character of ciphertext. A single one-to-one mapping function (f) from plaintext to ciphertext character is used to encrypt the entire message using the same key (k); such that: Ek(M) = F(m1) F(m2) …..F(mN) =C Where: N : is the length of the message. M : is plaintext message given by M = ( m1, m2, …..,mN). C : is ciphertext message given by C = (c1,c2,….., cN). There are many types of simple substitution ciphers according to its equations used to encryption, they: Shifted alphabet (Caesar cipher): F(a) = (a + k) mod n Where k : is the number of positions to be shifted. a : is a single character of the alphabet> n : is the size of the alphabet.

SIMPLE SUBSTITUTION CIPHERS: Example: If k =3 then we can encrypt the following message as: M = R E N A I S S A N C E Ek(M) = U H Q D L V V D Q F H