You are on page 1of 6

Chapte otHoduchio9

Ao on inoal essege Ts as plantext, while


e coded e is caled h e ciphentent. The piocess
S
.

A
Cooveting omplaintent to ephertet is koo nas

en phenoa ON cHpion; estonioz he platext iom


the ephentet ?s
decphenfna o decxption The a x
Bchemes s e encnyption C o n s h t e she e a ok d

koasn as Cypjaph ch aschene ekoaon aSa


ciphes: Techoques ased
A p o aphe
decipbeina he
messoae uhutE asx KOoDeE°*e
enciphextn dasatls all iteo he ea APta ysis.
Caxptanalats isohatte peson eais bneak se
Code". he st e a S c"J - and

en;}ne called cafroleaH

a)basicTenm9 Cn yptoaP
fhe oosic temS
gaaph ole

platAext
This S e oainal otealiable messqge

data hat s e oBo h e algo>ithn S nput

e c p t i o n algenhom
The2 encpon elae1o Peo s vasious
Sabsi+utHons ond Aaosoiatfons onbe pl<itext
shned *
Secxet key shaned b sende Sesxe keg
Sender
a ecipiet
and orecarpeE

sansmte
-phentert
Y E Ck,x) DlkY

Decphon algos1T4h planiezt


alqo>tHonD
plarnteze &oCPo ouput
oput Ce AES)
aeveqSe ec phio
sgoahm)
ne tafc Enc
Modet
Ceoventonal encnyPHon odel)

Secmet ke
qlso foput to he encayption a o
The Sec1e+ ke
1he a Volue ependent e p l a i o t e t
and o
- ahm .

ke
e aaoai
The alao-fthn o e a dkk nente output
on espeeRe keg bera
used a t h e tEtme. he ezact
depend 0n
Subsuttons aod
a n s o t m a o ns pest e eslgonihn

depend on the ke

.Ctphentext:. toded
Thfs s he Scanble
message pmoducedo ss
and. De sec oudps
epends s n +he plate*t.
ke. Fo a
Aktenent keys oiIN praducie ve
ven
essa2
messape oo
Chertez+s The cphe1te»
S an aPpoienH. hent
E a n ds ,s ndom stHeamn
o a nd as
ointellbie
EC ption algoath
*a9
Tbs s essertiall eeaAptionzonh o
he
ad
eve Se .
3E okes + e p h e t e i E a n d te se re+ kej

paoduces the original pl aintet

Sec e use
Theae aMe t o neuinements

Corventional encayption:

h m . A«t oinimum,
Se need a soA encnyPhon a
be Sueh h a t an °PPone*
e o l d k e he l a o t h m to
to one
acc e s 9
and bas
ho kooos he algohi
he Cphenteat on
he Gphentext
be unablet to'deeiphe
CphetezBs oould s Statel
h s equinenent
e Out h e key be unable to
should
îhe opponent
9tongeq e )
stoae he on she
on
discove the even
key Even
cpheztext
decs
decspt
a
numben
benext
phenex
1 discov He

p oss ession o a numben o


he on she S m Possession

Key even
he she fs
ot she
covei he keyeven he o
phehext deeov
cphentets toqeten Oah
a
Dumbex ok 4.
PosseSsron o produced ieaeh c p h e n t e r t
hat
te plain et

Copies h
hee Seenet
Seenef
must have obtained o
2 Serden and neceven
myst keep ane key Lecune1
koshionand
Seru é
n a 4 b e k e y , andd KnooOS.the alaoni
d, s c o ë
poe co
Ab k e is eadable
C o n u n c o tion
us
ina
Geneatc Model ok Secubie ommunicai ón
ecute Conmunfcatf on is 'onen
enies e commuofcatio 9od do not a
a
d poxty t1isten in hat the need t
Communicate n a ot 3uscepHable o
to eave adnopp'ra

o Resi ception
s
A eneic model o ecne Comounic o i o n
de scnbed b ollowoa '2uae

Csusted hiad pa
Ce a o b e t , dfsks+buten oft

SeceA nation)
Sendet Ren
Seuth Toomaion
seladpPd
ansto a}n
channel Teate
tsansyocroehD

Secstett Sece+
okocoation otosranonb
D oPPOneot

a Model oh oetoonk Se t

Seuni
o desaable
9specs come
to paetect h e
1o

emmation
isnecessa
play'ahen f t s o
A n s m ssse
a oP ponent obo
h o piesent aetto

ondentialit, auhenkci+y and So on A He technfc


nave sooómpooents: es
o Povidina ecui
A Secufty- nelated
Secuty +ansto amaon on the ntoimatonn
to be Sent Exaoplea lnelude he encaphon he mes3age
bfch c1amsles the message So hat i sis unmesdable by
he
h e opponent, and he add?tion o Code based on
he
ok he L uomeadable he
Conteats
esage ihat
OPPenent. and
and h e add?tion oa Code bosed on4he

Conteots o he message , shfeh can be u s e to ve

he identity he Sendet.

eoies
omeSecet fakotnation shanedby too putoepls oaod
An is an
t R s hoped, uakson t te dppoment exampe
encpionkey used Conjuctonuoih-he sanskes1maton
Scamble he message. bekeme tanemissîon and un-

Scamsled it on TecepHon.
ste a d d paxty a y beneede
to achevea Seeuste tsanemissionfoa a m P E , a s i d : p a h

May
be be aponsible o dfstatbuina he secnet fapam
tTon
- tron he tuoo pinespals ushie keeping t om
oPponent
he 2enemal *odel.. houos that hene e eun boqsic

sks n de«ianina apantieuta Secumty Senvee


espetermina. h e SeCuh
*** elated
elate
a
)Desian
m a t i onb
Genesnate the Secet moAmottonto 'Ge used o ih ahe

aon abm
avelop Ahe methods to h e ehsibuton n d hgan9 e

eetet Satannation
Oo
paotocol to beused by eh e
algosihm
+at makes use o he Seua
Piocipals ) L acheve pant
and +he secnet okotmatTon
Culot eu+ySeivice.

1be OSI Secunity Aehitectne


)
h e . oST Secuni+ a t e h i e c t u e
emaie C
gmewoslk *hot piovides
and chalaetex
he neuiements o t SecuiR+y
det Aosee iaemniss
appnoaches e saHs{Eing
ouses on Secuatiy
e oST Sécunty a n e h i e t u o e
hese can be deRne
atackKS mehasfsos andd S e v i c e s .
S bte 4s olldOS

niabt Hat ezplott


e at A hreat is a pos a? ble dange
causse
tobea bieaeh Seuai heegne
Jalneabilty
possible boxm.

attack an atiog >ecun hneat ht ovolves


ttack: 9i
aniattempt to oatain oiten, destnothmemove, mptant es

wfahout auhoized aceess0 pe>1missîob


eveal oymahon

acon that Compomises e séaust


Secuty attack AX
o n o o n e d ex
an Oganizahon.

A docess Co aa dev?ce
Cox devi ce'
Secusty mechånism;
piocess încoponaHng Sueh
aS pMocess) h q t desaned to detect, evet, Ot hecoe

You might also like