Professional Documents
Culture Documents
Lecture43 NetworkSecurity
Lecture43 NetworkSecurity
Network Security
Security
Security Services
Crytographic algorithms
privacy
authenticity
Message
integrity
Computer Networks
Encrypt using
secret key
Plain text
Decrypt using
secret key
Computer Networks
To send a message
Encrypt with public key
To decrypt, decrypt using a private key
Computer Networks
Computer Networks
Computer Networks
L I ( 32-bit)
Indian Institute of Technology Madras
R I (32-bit)
Computer Networks
Ri-1
Ki
Li-1 = Ri-1
+
LI
RI
Indian Institute of Technology Madras
RI = Li-1
F(Ri-1,Ki)
Computer Networks
Computer Networks
Computer Networks
Computer Networks
DES (Decryption)
Algorithm works exactly the same as that of
encryption
Apply keys in reverse
K16, K15, K14, , K1
Computer Networks
Initialising
vector
B1
B2
DES
DES
Cipher 1
Cipher 2
Computer Networks
Computer Networks
To encrypt P, compute
c = Pe (mod n)
To decrypt C, compute
P = cd (mod n)
Indian Institute of Technology Madras
Computer Networks
To decrypt
c, n required (private key)
Analogy
Suitcase with a press lock that is unlocked
Anybody can put stuff inside and lock the suitcase
But suitcase can ONLY be opened by the key
Computer Networks
Message Digest
Message Padded
Initial Digiest
(128 bit)
512
Transform
Transform
Transform
Message Digest
Indian Institute of Technology Madras
512
512
Computer Networks
Message Digest
Modern day: Operates on 32-bit quantities
Current digest (d0, d1, d2, d3)
Works on the hope that it is difficult to
create the transformations and the initial
digest.