Professional Documents
Culture Documents
Ass 1 Solu
Ass 1 Solu
Confidentiality is probably the most common aspect of information security. We need to protect
our confidential information. An organization needs to guard against those malicious actions that
endanger the confidentiality of its information.
Integrity means that changes need to be done only by authorized entities and through authorized
mechanisms. Integrity violation is not necessarily the result of a malicious act.
The third component of information security is availability. The information created and stored
by an organization needs to be available to authorized entities. Information is useless if it is not
available.
Q.2
Additive Cipher The simplest monoalphabetic cipher is the additive cipher. This cipher is sometimes
called a shift cipher and sometimes a Caesar cipher, but the term additive cipher better reveals its
mathematical nature.
In a multiplicative cipher, the encryption algorithm specifies multiplication of the plaintext by the key and
the decryption algorithm specifies division of the ciphertext by the key.
A Vigenere cipher uses a different strategy to create the key stream. The key stream is a repetition of an
initial secret key stream of length m, where we have 1 ≤ m ≤ 26. The cipher can be described as follows
where (k1,k2, …, km) is the initial secret key agreed to by Alice and Bob.
Q.3
The heart of DES is the DES function. The DES function applies a 48-bit key to the rightmost 32
bits (RI−1) to produce a 32-bit output. This function is made up of four sections: an expansion P-
box, a whitener (that adds key), a group of S-boxes, and a straight P-box.
Expansion P-box Since RI−1 is a 32-bit input and KI is a 48-bit key, we first need to expand
RI−1 to 48 bits. RI−1 is divided into 8 4-bit sections. Each 4-bit section is then expanded to 6
bits. This expansion permutation follows a predetermined rule. For each section, input bits 1, 2,
3, and 4 are copied to output bits 2, 3, 4, and 5, respectively. Output bit 1 comes from bit 4 of the
previous section; output bit 6 comes from bit 1 of the next section. If sections 1 and 8 can be
considered adjacent sections, the same rule applies to bits 1 and 32. Figure 6.6 shows the input
and output in the expansion permutation. Although the relationship between the input and output
can be defined mathematically, DES uses Table 6.2 to define this P-box. Note that the number of
output ports is 48, but the value range is only 1 to 32. Some of the inputs go to more than one
output. For example, the value of input bit 5 becomes the value of output bits 6 and 8.
The S-boxes do the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit
output.
Q4.
RSA uses two exponents, e and d, where e is public and d is private. Suppose P is the plaintext and C is
the ciphertext. Alice uses C = Pe mod n to create ciphertext C from plaintext P; Bob uses P = Cd mod n to
retrieve the plaintext sent by Alice. The modulus n, a very large number, is created during the key
generation process.
Q.5
NIST has issued a standard (FIPS 198) for a nested MAC that is often referred to as HMAC
hashed MAC.The implementation of HMAC is much more complex than the simplified nested
MAC
There are additional features, such as padding.
1. The message is divided into N blocks, each of b bits.
2. The secret key is left-padded with 0’s to create a b-bit key. Note that it is recommended
that the secret key (before padding) be longer than n bits, where n is the
size of the HMAC.
3. The result of step 2 is exclusive-ored with a constant called ipad (input pad) to
create a b-bit block. The value of ipad is the b/8 repetition of the sequence
00110110 (36 in hexadecimal).
4. The resulting block is prepended to the N-block message. The result is N + 1 blocks.
5. The result of step 4 is hashed to create an n-bit digest. We call the digest the intermediate
HMAC.
6. The intermediate n-bit HMAC is left padded with 0s to make a b-bit block.
7. Steps 2 and 3 are repeated by a different constant opad (output pad). The value of
opad is the b/8 repetition of the sequence 01011100 (5C in hexadecimal).
8. The result of step 7 is prepended to the block of step 6.
9. The result of step 8 is hashed with the same hashing algorithm to create the final n-bit
HMAC.
NIST has also defined a standard (FIPS 113) called Data Authentication Algorithm, or CMAC,
or CBCMAC. The method is similar to the cipher block chaining (CBC) mode discussed in
Chapter 8 for symmetric-key encipherment. However, the idea here is not to create N blocks of
ciphertext from N blocks of plaintext. The idea is to create one block of MAC from N blocks of
plaintext using a symmetric-key cipher N times.
Q.6
Kerberos is an authentication protocol, and at the same time a KDC, that has become very
popular. Several systems, including Windows 2000, use Kerberos. It is named after the three-
headed dog in Greek mythology that guards the gates of Hades. Originally designed at MIT, it
has gone through several versions.
Three servers are involved in the Kerberos protocol: an authentication server (AS), a ticket-
granting server (TGS), and a real (data) server that provides services to others. In our examples
and figures, Bob is the real server and Alice is the user requesting service.