Network Security Unit-1

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Network Management and Security
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
Lecture 1 Overview.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 2 – Classical Encryption Techniques
Cryptography Week-6.
Section 3.6: An Introduction to Cryptography
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
MESSAGE plaintext encode/encipherdecode/decipher ZXYCTHI MESSAGE plaintext ciphertext algorithm Cryptography “ art or science concerning the principles,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Information Systems Security
Cryptography, Authentication and Digital Signatures
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Traditional Symmetric-Key Ciphers
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptography. Introduction Cryptography is the art of achieving security by encoding messages to make them non- readable. Some cryptography algorithms.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Classical Cryptography
Substitution Ciphers.
ISA 400 Management of Information Security
Chapter 2 Basic Encryption and Decryption
Cryptographic Hash Function
Classical Polygraphic Ciphers
Cryptography and Network Security
Chapter-2 Classical Encryption Techniques.
Encryption
Information and Network Security
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Cryptography and Network Security Sixth Edition by William Stallings.
Campbell R. Harvey Duke University and NBER
A Technical Seminar Presentation CLASSICAL CRYPTOGRAPHY
Chapter 3:Cryptography (16M)
Visit for more Learning Resources
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
PART VII Security.
Security.
Basic of Modern Cryptography
Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.
Operating Systems Concepts
Security Attacks, Mechanisms, and Services
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Network Security Unit-1 www.educlash.com

Need of Security To protect the data www.educlash.com

Principles of Security Confidentiality. Only the sender and the intended receiver should access the message. Loss of confidentiality results in interception. Authentication. It helps establish proof of identities. Absence of authentication leads to fabrication. Integrity. The contents of the message should remain same when the receiver receives it. Loss of integrity leads to modification. Non- Repudiation. Does not allow the sender to refute the claim of not sending that message. Access Control. Who should be able to access what. It is broadly related to two areas: role management and rule management. Availability. Resources should be available to all authenticated persons who need them. Interruption puts the availability of resources in danger. www.educlash.com

Attacks can be classified with respect to 2 views: Types of Attacks Attacks can be classified with respect to 2 views: Common person’s view Technical view www.educlash.com

Done for financial gain Common person’s view Criminal Attacks Publicity Attacks Legal attacks Done for financial gain (for eg: fraud, scams, destruction, identity theft, intellectual property theft, brand theft) Done for publicity Makes the court doubtful about the security of system www.educlash.com

Technical View Passive Attacks Active Attacks www.educlash.com

Passive Attacks Passive Attacks do not involve any modification Passive Attacks are those wherein the attacker indulges in monitoring the data which is in transit. The attacker does not attempt to modify the data. That’s why they are hard to detect. Only prevention can be done rather than detection or corrective steps. Passive Attacks do not involve any modification to the contents of an original message . Again divided into 2 sub categories:- 1.) Release of message contents 2.) Traffic Analysis. www.educlash.com

Active Attacks In Active Attacks the contents of the original The active attacks are based on the modification of the original message in some particular manner or on creation of a false message. These attacks cannot be prevented easily. However efforts can be taken to detect them and recover from them. In Active Attacks the contents of the original message are modified in some way. WE-IT TUTORIALS (8097071144/55) These attacks can be in the form of :- Masquerade Modification Denial of Service Replay Attack Alterations www.educlash.com

Practically these attacks are performed at: Application level Network level www.educlash.com

Cryptography Cryptography is the art of achieving security by encoding messages to make them non- readable. Cryptanalysis: is the technique of making the non-readable format into readable format. It is just like breaking the code. Cryptanalyst: A person who performs cryptanalysis. Cryptology: is the combination of cryptography and cryptanalysis. www.educlash.com

Important terms used in cryptography: Plain text The original message which can be easily read is called as plain text. Cipher text A coded message which is not understood by everyone (except the intended receiver) is known as cipher text. Encryption or Encoding or Encode The process of converting plain text into cipher text is called as encoding. Decryption or Decoding or Decode The process of converting cipher text into plain text is called as decoding. Key A key is a character or a group of characters used to encrypt or decrypt the plain text. A key is generally developed/created from the plain text. www.educlash.com

Some techniques of encoding Substitution technique Where the individual letters of the original message are substituted by any other alphabet. Transposition Technique Where the individual letters of the original message are just rearranged. www.educlash.com

Substitution Techniques Caesar Cipher: The Characters of the plain text message are replaced by alphabets 3 places down the order ATTACK ON TAJ DWWDFN RQ WDM www.educlash.com

ATTACK ON TAJ SRRSUP AN RSD Mono-alphabetic Cipher Each character is replaced with alphabet with no order. For e.g. each A can be replaced by any letter from B to Z or even A and so on. Here the no. of attempts are as 26x25x24x23x22…… or 4x1026 possibilities. ATTACK ON TAJ SRRSUP AN RSD www.educlash.com

Polygram Substitution Cipher: Here rather than replacing each letter, each word of the message is substituted. Replacement happens block by block ATTACK ATTACKER GJJGPM YHZOGCIV www.educlash.com

Poly alphabetic Substitution Cipher: It uses multiple one-character keys. Each key encrypts one letter of plain text 1st letter- 1st key, 2nd letter-2nd key …….. After all keys are used, they are recycled. Examples : Vigenere cipher, Beaufort cipher Example: www.educlash.com

PLAIN TEXT KEY www.educlash.com

Developed by Charles Wheatstone but named after his friend Playfair Cipher: Developed by Charles Wheatstone but named after his friend This scheme uses two main process: Step:1 Creation and population of matrix. Step:2 Encryption process www.educlash.com

Step:1 Creation and population of matrix (using key) Choose a word, sentence or characters as a keyword. Create a 5x5 matrix. Fill the keyword in the matrix excluding the duplicates. After filling the matrix, if there are still some blank space then fill them with other letters excluding the ones which you have already filled. Let us say, the keyword is “NUCLEAR ATTACK” www.educlash.com

Let us say, our original message is “BOMB PLACE IN EUROPE” Step:2 The encryption process -> break the message into pair of 2 letters as: BO MB PL AC EI NE UR OP EX TQ QR XK TN BQ UN RF PQ LY Use the matrix with respect to rules. N U C L E A R T K B D F G H I J M O P Q S V W X Y www.educlash.com

Step:2 Encryption Process Before initiating the encryption, break the plain text in pair of 2 letters. If both the alphabets are same or 1 letter is remaining, add X after the first alphabet. After the initial process, take the pairs for encryption. If the letters of the pair appear in same row of the matrix then substitute them with their immediate right letter. If the letter of the plain text is itself the rightmost, then wrap it up with the left letter If the letters of the pair appear in same column of the matrix then substitute them with their immediate below letter. If the letter of the plain text is itself below, then wrap it up with the top letter If the letter of the pair are not in same row or column then define a rectangle with the original pair and substitute them with other corners of the rectangle. www.educlash.com

Invented by Lester Hill in 1929. Hill Cipher: Invented by Lester Hill in 1929. Treat each letter with a number like A=0, B=1, C=2…… www.educlash.com

Let us say, our original message is “TAJ” As per the rule, T=19 A=0 J=9 Convert into matrix form as Now multiply the plain text matrix with any number as keys. The multiplying matrix should be of n x n where n is the number of rows of original matrix. Now compute mod 26 on resultant matrix i.e. take the remainder after dividing by 26. www.educlash.com

Now translating numbers into alphabets, we get: 19=T 25= Z 21=V Therefore our cipher text is TZV To decrypt hill cipher, follow the steps: 1.) take cipher text matrix and multiply it by inverse of original key matrix 2.) Again perform mod by 26. Thus we get our original text. www.educlash.com

Transposition techniques Rail – fence technique It involves writing plain text as a sequence of diagonals and then reading it row by row to produce cipher text. T J A C T A K T A Cipher Text : ATCTJTAKA Original Message: ATTACK TAJ www.educlash.com

Simple Columnar Transposition Technique: Write the plain text message row by row in a rectangle of pre-defined size Read the message column by column but the sequence of columns can be any order. Original Text : ATTACK ON EUROPE Col 1 Col 2 Col 3 Col 4 Col 5 Col 6 A T C K O N E U R P Columns are read in 2,4,6,1,5,3 order TNEAUKOAOPCRTE www.educlash.com

Simple Columnar Transposition Technique with multiple rounds: It is same as earlier one but repeated again upto 1 to 3 times as desired. www.educlash.com

Vernam Cipher (one time pad): It uses a one-time pad, which is discarded after a single use and therefore is suitable only for short messages. Treat each plain text alphabet with numbers as A=0, B=1, C=2…… www.educlash.com

Original Message: ATTACK TAJ Plain text A T T A C K T A J 0 19 19 0 2 10 19 0 9 + One Time Pad N B D E P S F Z L (substitute with 13 1 3 4 15 18 5 25 11 any letters which are used only ones) Initial Total 13 20 22 4 17 28 24 25 20 Substrcat 26, If >25 13 20 22 4 17 2 24 25 20 Substitute N U W E R C Y Z U www.educlash.com

Similar to Vernem cipher. Book Cipher Similar to Vernem cipher. Instead it uses characters of books to substitute. Remaining all the work is same www.educlash.com

Encryption & Decryption Encryption or Encoding or Encode The process of converting plain text into cipher text is called as encoding. Decryption or Decoding or Decode The process of converting cipher text into plain text is called as decoding. The important aspects of Encryption & Decryption process are: Algorithm The technique/ method used to encrypt or decrypt. Algorithm is generally not kept secret. Key A key is a character or a group of characters used to encrypt or decrypt the plain text. A key is generally kept secret. www.educlash.com

Symmetric Key Cryptography Asymmetric Key Cryptography Depending on what keys are used, there are two types of cryptography mechanisms:- Symmetric Key Cryptography Asymmetric Key Cryptography www.educlash.com

Symmetric Key Cryptography www.educlash.com

Asymmetric Key Cryptography www.educlash.com

Possible types of Attack Things known to the attacker Things the attacker wants to find out Cipher-text only Cipher text of several messages, all of which are encrypted with the same encryption key. Algorithm used Plain text messages corresponding to these cipher text messages Key used for encryption Known cipher text Plain text messages corresponding to above cipher text messages Algorithm to decrypt cipher text with the same key Chosen plain text Cipher text and associated plain text messages Chooses the plain text to be encrypted Chosen cipher text Cipher text of several messages to be decrypted Corresponding plain text messages Key used for encryption www.educlash.com

Key Range A key range a number of attempts to crack a key. For eg: for a brute force attack with a mono alphabetic algorithm, there are 0 to 100 billion attempts to crack a key. Thus a key range becomes from 0 to 100 billion. www.educlash.com

Key Size The concept of key range leads us to the principle of key size. As money is measured in rupees, dollars; the strength of key is measured in key size. We measure key size in bits representing in binary system. If a key is of 1 bit, then the possibilities are 0 or 1. If a key is of 2 bit, then the possibilities are 00,01,10,11. If a key is of 3 bit, then the possibilities are 000,001,010,011, 101,111, 100, 110. Generally, a key is preferred as 56-bit key or 64-bit key or 128-bit key. www.educlash.com

Steganography Steganography is a technique that facilities hiding of a message that is to be kept secret inside other messages. Initially, sender used techniques like invisible ink, tiny pin punctures on specific characters, minute variations between handwritten characters, pencil marks on handwritten characters etc. Now a days, sender hide secret messages within graphic images www.educlash.com

Thank You www.educlash.com