Introduction Of System Security

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Cryptography encryption authentication digital signatures
Cryptography and Network Security Chapter 3
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Announcement Grading adjusted –10% participation and two exams 20% each Newsgroup up Assignment upload webpage up Homework 1 will be released over the.
Chapter 2 – Classical Encryption Techniques. Classical Encryption Techniques Symmetric Encryption Or conventional / private-key / single-key sender and.
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
Lecture 23 Symmetric Encryption
Review What is security: history and definition Security policy, mechanisms and services Security models.
Network Security Chapter
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Cryptography Week-6.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Cryptography Cryptography is the technique of secret writing.
Symmetric and Asymmetric Ciphers. Symmetric Encryption  or conventional / private-key / single-key  sender and recipient share a common key  all classical.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
 Classic Crypto  Slides based on those developed by Dr. Lawrie Brown at the Australian Defence Force Academy, University College, UNSW  See
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
Lecture 23 Symmetric Encryption
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Applied Cryptography (Symmetric) Part I. Many savages at the present day regard their names as vital parts of themselves, and therefore take great pains.
Cryptography and Network Security Chapter 2
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
Secret Key Cryptography
Conventional Encryption Message Confidentiality
Columnar Transposition
Introduction Of Information Security
Chapter-2 Classical Encryption Techniques.
Cryptography.
Part 1 By Dr. Shadi Masadeh
CSCI-235 Micro-Computer Applications
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Conventional Encryption Message Confidentiality
Chapter 3:Cryptography (16M)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
NET 311D Information Security
NET 311D Information Security
Block Ciphers and the Data Encryption Standard (DES)
Algorithm Types & Algorithm Modes
SYMMETRIC ENCRYPTION.
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Introduction to Cryptography
Computer Security Chapter Two
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Conventional Encryption
Presentation transcript:

Introduction Of System Security Slide Prepared and Presented By: Mr. Ankit S. Didwania (RC-1093) Open Education Resource (OER) by Ankit S. Didwania is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This is a Free Culture License! You are free to use, distribute and modify it, including for commercial purposes, provided you acknowledge the source and share-alike.

Learning Outcomes Learner should be able to detect the process of Symmetric Cipher Model Learner should be able to understand the basics of Cryptography and Cryptanalysis

Evaluation Strategy Sr. No. Question Type Mark 1 Multiple Choice Question (MCQ) 2 Brief Subjective 3 Detailed Subjective 5

LeD 2.0: Learning Dialogues Activity

Symmetric Encryption Also referred as conventional / private-key / single-key encryption algorithm In it, same key is shared by both the sender and receiver Its classical algorithm, but still widely used Modern algorithm uses public-key algorithm, invented in 1970’s

Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver encipher (encrypt) - converting plaintext to ciphertext decipher (decrypt) - recovering ciphertext from plaintext cryptography - study of encryption principles/methods cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key cryptology - field of both cryptography and cryptanalysis

Symmetric Cipher Model

Cryptography characterize cryptographic system by: type of encryption operations used substitution / transposition / product number of keys used single-key or private / two-key or public way in which plaintext is processed block / stream

Cryptanalysis objective to recover key not just message general approaches: cryptanalytic attack brute-force attack

Cryptanalytic Attacks ciphertext only only know algorithm & ciphertext, is statistical, know or can identify plaintext known plaintext know/suspect plaintext & ciphertext chosen plaintext select plaintext and obtain ciphertext chosen ciphertext select ciphertext and obtain plaintext chosen text select plaintext or ciphertext to en/decrypt

More Definitions unconditional security computational security no matter how much computer power or time is available, the cipher cannot be broken since the ciphertext provides insufficient information to uniquely determine the corresponding plaintext computational security given limited computing resources (eg time needed for calculations is greater than age of universe), the cipher cannot be broken

Brute Force Search always possible to simply try every key most basic attack, proportional to key size assume either known / recognise plaintext A brute-force attack involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.

Summary Learner should have understood the following: working of Symmetric Cipher Model the types of Cryptography the basics of cryptanalysis

Acknowledgement Book “Cryptography and Network Security”, 4th edition, by William Stallings, Chapter 2 “Classical Encryption Techniques”

LbD 2.0: Learning by Doing Activity

Multiple Choice Questions (1 mark each) 1) Symmetic key cryptography is defined as _____ algorithm with _____ key is used for encryption and decryption. same, same b) same, different c) different,same d) different, different 2) Modern algorithm (invented in 1970’s) uses _____ key algorithm. conventional b) public c) single d) private

Subjective Questions Brief Subjective (3 marks each) : 1) What do you mean by brute-force attack? 2) What do you mean by cryptology? Detailed Subjective (5 marks each) : 1) Give the requirement for secure use of conventional encryption 2) Which three dimension are used for characterizing cryptographic techniques

THANK YOU 