Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .

2.2 APPROACHES TO NETWORK SECURITY
CHAPTER-3
ENCRYPTION AND DECRYPTION
Encryption
2.2 Problem Definition
Ways and Sources of File Threats
1) Unauthorized Access
2) Executing Commands Illicitly
4) Destructive Behavior
Data Destruction
2.3 Solution to the problem
File Security
Cryptography
Private-Key-Encryption
Key Management
CHAPTER-4
ENCRYPTION BASICS
-Edgar Allen Poe, The Gold Bug
4.1 INTRODUCTION
4.2 ENCRYPTION BUILDING BLOCKS
4.2.1 TRANSPOSITION CIPHERS
1. Message Reversal:
2. Geometrical Pattern Encoding:
Example:
3. Columnar Transposition
4.2.2 SUBSTITUTION CIPHERS
1. Simple Substitution
2. Homophonic Substitution
3. Polyalphabetic Substitution
4. PolyGram Substitution
M=m1m2m3 ««
4.2.2 PRODUCT CIPHERS
C= Ek (M) =SkPkSk-1«««..S2P1S1 (M)
.2.3 BLOCK CIPHERS
Li+1=Ri
Ri+1=Li(mod-2)f(ki+1,Ri)
4.3 How Cryptosystems fail
SEND
+MORE
4.4 CHOOSING BETWEEN STRONG AND WEAK CRYPTO
CHAPTER-5
CRYPTO ALGORITHM PROPERTIES
5.1PROPERTIES OF GOOD CRYPTO ALGORITHM
5.1.1 NO RELIANCE ON ALGORITHM SECRECY
5.1.2 NO RELIANCE ON ALGORITHM
5.1.3 AVAILABLE FOR ANALYSIS
5.1.5 NO PRACTICAL WEAKNESSES
Implementing Rijndeal
Notation and Conventions
Rijndael Inputs and Outputs
Arrays of Bytes
The Rijndael State
Arrays of 32-bit Words
Finite Field Operations
Finite Field Multiplication
Multiplication by Repeated Shifts
Finite Field Multiplication Using Tables
Polynomials with Coefficients in GF(256)
The MixColumns Transformation
The Xor RoundKey Transformation
The Key Schedule
The Inverse Cipher
The Inverse ShiftRows Transformation
The Inverse SubBytes Transformation
The Inverse MixColumns Transformation
The Equivalent Inverse Cipher
CHAPTER-6
THE DES AND TRIPLE DES ALGORITHMS
6.1 DATA ENCRYPTION STANDARD
6.1.2.1Initial Permutation:
6.2 TRIPLE DATA ENCRYPTION ALGORITHM
CHAPTER-7
THE BLOWFIHS ALGORITHM
7.1.1 Feistel Networks
7.2 DESCRIPTION OF THE ALGORITHM
7.2.1.Subkeys
7.2.3 Generating the Subkeys
7.2.4 DESIGN DECISIONS
0 of .
Results for:
P. 1
Encryption

# Encryption

Ratings: (0)|Views: 330|Likes:

See more
See less

12/07/2012

pdf

text

original