0% found this document useful (0 votes)
80 views35 pages

CNS Unit 1 Notes

Uploaded by

imjyoti1511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
80 views35 pages

CNS Unit 1 Notes

Uploaded by

imjyoti1511
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
Crypingrephiy and Network security UNIT-1 ' . | PART-A: Banic principles . \. Security goals R. Cayplo graphic ailacks 3. senvies amd mechanism - 4. Mateemabis of Cryptography” a& Snleque , ‘ be attematic | ¢ extended Euckedian Algonifm. a. Modulan Aniiermaltt - e- Morice: $ Limcae Conquuence PARI-8 = Symmetric Encuyption 1. okemokcs Of symmebic key Cryploqrapy - a. Aigeinoie shuclunes: Group | Ring | ds Field, e. GF Ca") Field. 2. Jnbodsuckon ko Modren symimekric. teuy ciphers: a Modren Glock. ciphwus Erengption | b: tompontnts of Modver Block ciphers: ce wd choses of product ciphers & Atlatks daxignid par block, cipro © stream ciphuus : 3. DES Coala Encupstion stendard a: HistoTy of DES b- Des shuctwie ec. DES anolyvis a: Securely of DES e Mulkipl. DES. a Advanced Encryption | standard CAES) a: b- e qd e History of AES “Proms for malay ured by "AES Kay expamsioye AES ciphur- , Avaliysts, of AES UNITS) = , PART-A* Baric principles * as ‘ "1. Secumihy Gols. | The. secuvity goals Ma Network axe. caleqoniged imibo Three. dypos ie one | I confidentiality 2. Imtequlty : 3 Maley Cpbtare - r | = 1 comfédentioli —5 Gh reloles % protect) the reformation by riding “Whe content from unawlfowdzed waiter => comAden aly is applied while storing he rofrimalion and also applied dwiing We Tpamamission | of enfermalien | 2 Snkeqruliy : ‘ — When we cl oy wm ‘Re MMermdlion are bo be done ~ “conviantly > $ howd be dime only by Wie, auifounized * VRS process Lends Jo dnheqriby - 13 Availability : (We inbomolum whith wcrealed and, stored by am © “ exgonizadbione ru be made available fo De outrourited Evetiby - a Cruplogaaphic obec. | Whe cryptoopaphic allacks ave categorized mto 400 | Hyp Whey are r 1, 4 creyph - analiptt. ableucks: aN Supt choalie atlocks ” Lo bCryph- Analyte oblacks : > Ware atlcks uses sdatistical omd vatgebraic dechniques along wilh a secrel Key of he cipher, text. —? ‘Ihe. Objective of the cayplanabytics C crypt -aneliysis ) e to find “AUG propeshes of he ciphwe Jext- > Wc obkackerr A00kS “for MU distinquished propery a | quuosses De Kty which iw appdied oa the cipher ‘Tex | most of The cryptanaljhe aliacks ws divide omd. | CoNqULIL Poliay. “which, yedeces Re complexity: OF quessing Jhe Key, which linds to Brake Force attack: 2 now-Cryptonalylic atiucks : : > The ron-cryglonaly He allacks yeomly Confidential , imtegrity and availabitily — The confidantialily freaks ore Snooping a emolysis, hoes — The inequity vhreals axe modt seplaying ana vepudiokion. _— ailability “Wreok v daniol of sovie : refers to unauthorized occews ot intersection] focus oF whe nd Wathic Ricolion + manque reading » — We, 0N > snooping :H Se peas ye i naon wy ig | he. online WORe He tee nea 5 Moditiealion © Aktot Acceing fe rakermesion The allacker motlifies The information for bs benefit r > masque Gadurg : gle AML proces of impersinake ‘Some one ue ity the oftackex Meals the ob cand wrtber amd pin from a persow and pretend “hinwell fruwclh cu o Castor: 7 LR ‘ = eplaying : Th ailackor obtain o copy Of & MeMage uptel by O uner and Soler tie AO wre Sat massage + Repudiation: Jk» Performed by Two, pares during communication une To ORs ow sender and Rctiver wWhuU “hey Sometimes do aot acctpt Ia Arampackion + ! Loenial of sewvite : Fe Denicl of sewice U& very common allack| whuw wer Yequayts are not accipted by a senver - 3B Sewias and Michanism - . Seovtity Senvices and secuxily Mechanisms ow provided, by “tyu-7" (Srtemational Telicemmunication union fer, Telecommunicalionw Sector ) Qo Secwnly Servier : j i “Tha Secuvilly Senvids ane defined by TTU-T (x, 800) The Securily cenvills ae calegoni zed ints 5 types. Theey a w fate confidentiality ay deden Snteqpily @) Awltenticodiov un Non - Repudiadion. (5) Accetss control (ala. coder: yng | Ty tw used to protect the dota amd. prevent snooping. - [Wher preventing, discloumew of ofamalion 40 unautioon! Fed [pasties vy weeded » Wr properby of compid entioity is requited- qo provide confjclontiallity ihe cryptoqvaphic algolGnr and mode of operation needs to be designed ond implemen &® Data gequly : 44 desigd to protect Ake dokx prom modificalliw , ‘iwavctiow or delétior ete~) Onda sSrteqrily provides aymance We data has not been modified im an unauthori2ect manner after it was created , Tamsmilled or stored - (3) Aulentication: Hw used to give to provide access of data ko n authorided wos only aitien ti coctiow Services Qe , wo antequilly authenticator @) gowree- Auten tica tio (4) Non - Repudiobon- This Service protects the dota -eitfion by a sender oT & receiver by verifying “Rem wii a valid. pool gh, vegies digital Signatwue key (5) Access cmunol * TAL sewier Provide protechon again the unanifivdted access | dp te dota: : | Seowaly Madhamt set: sme secunbly michontsms one dipind by TIV-7T (x= 800) Wie | | Vanlow, Secuvuly mechamismas ore (1) enciphownen + Ty ib te pours Of Wi ding or convening ihe dole - SL Provils | confdentioily Sahih com be dome, by vag. & Techniquis: Way a (0) cryplogreapy ‘ ity (o>) Stegomoqraphy. (@ dala sukeqputliy “oo Sn This madnomism short cack value 1% appended fo he vy he send wilde will be revalued, ony fo The ackuol data yeceiver vIhe TeCLIVUL verifies We chick values cmd prownes he dot 3) Digital signature a : dy, his wudvontlie AGL Sendyt sends ao digital siqnakwie edecrmically 40 % receiver (a) Audbenkicediow exchamge + | Sn Audfinnkicaliovl exchange Awo entities exchange data i] or mmaages and puvst prove ‘Whew identity to each offer: i] coy Trahyic paddines = 44 revolves adding some relevant dala inko We actual dala | Traggic amd fries to ditect the Walhic onaliysis- 1 (6) Rooting conkrol - lo provide Move Secvuly , varuow> routing on to be Used ond Frequently chamged ca Aceuss control + Various oterrs Control mectonisms oF ov better: secuouty vahich ont provided iw Wie fom of bo and pusword - . 4. Malaemolicn Of Crypho graphy. + Gnleque Avifamalie - extendicl Eusteddian Algoritim- © Modular Au tfumallie * Menkyi Cey- Livwan Congruence + (0) Srkegen. Ayifemakic : : ~ S_nkeger Avigemalic » we Wt a set of integov, ond apply, | som operations - — A Set of integers are clenoteel by Z which contain cowrol Strategies “ramiques are to be wre in nome. ce anse s all | inleger yumbers ranging from Negolive infinity to positive Infinity - ben Be Fem yet BBV ON 2s Be OS> 2 In cryptography , Ie mostly use whe arthematic operations like addition » subtraction . multiplication and division: , To Perfom a binary operation on any two inputs will Neael | A 2 ‘Jour possible outputs - ex: tet woo mpats 8 and a, By applying addition on Jhese Two 1 inputs will provide foun possible oulpts- Addition + gaps 5 449 rs) + Ga = 4 ca sceay 74 as 4+ ca) 74 5) + Gay = Nence » the possible outputs eve for © and ave (ay, 4, 4 1u) Integer Division ; ~» In Integer Arvthematic » th We divide a number with another , we get a temdinder Quotient " “ TE The ter number we divide ie denoted by “A and | devisoy ts clenoted by “n” | Quotient ie denoted by a and | mainder 1s denoted hy ie rere The relationship, between above | four integers which are denotect, by A, Q. 1, and Ris devoted yang ex: let A> 255 and =) calculate the clivisibility rule by Using “ine above formula - ass > (23x) ar = 253 42 & 255 (> GcD cory HCE 4 > Hiahest Common facto - Grealest Commen Divisoy : — the Geo of Stee is caleulatecl om two values, ustere. the Common multiplts of eadn value ave extracted ancl multiplied to Produ GUD- ‘ atau 7 ans ex: calculate Whe GCO -fors au and 4g. Ar a Somwnon fedors MH AKAVAX SKI ZY ae he ond i Exe 38 GUD dh ay ue ou 3 e 2y T 3 aRyaxgerl xo vexatlll (b) extended Eucledian Algorithm - = Eucladion Algorithm. An Cucledion Algorithm is Used to find the gcd of two posilive numbers based on the fillewing facts. Fock - From the above fact , ip ine second imtegey s ero , then The GOD of, The: Tuo Numbers is the first mleger Cron ~ zero) 2X gcd Cazuc,o> = 2346 Fack -2 + acd Cab) = ged (9,9) From ‘he above fact ,aand b ave positive meager Valuts and “ri ip whe vernainder -wohich is obtained by dividing alp oe 9cd C 36,105 royae (3° = gat bE) remaindon = gtd (6,4) = god (42) = 9d ( 2,0) Fa Coy applying’ Fecl-1) Fock - 3; gid Carb) =1) where ar ow prime numbers. From The above fact . it will bE valid when tae two Numbers ane relalively prime - ex ged (34) = 1 > Extended Euclidian Algoritim: > the extended Eucudian Algorithm wy wad to colewate the BEd Of ab avd aso calewall dhe, voles of ‘s’and “F- > Given Two inteqows ‘oma Wy We wud to Find. “6 ond “f Aven Anot ged (ab) =Gxaj+E Xb) = Sat Eb . :.. on Alqoxitim : 1 Snitialention ° Hee; MEBs S474 5 S29 | hoo 7 dpe eotile a. if (29) { @=rpas 5 v= - AVRKAr » NEN: 5 Me % FF S =5-QxXS2 5 S35, 5 SSG, £ f@x bry ye biny dae by 5 ee Cabyem 7 SESS kek; . Example: Give a= 16) an br 2g, Firth The ged. Carb) “Hy volus of S amd 7 : Hee $= S27! ; e 8 ring aa gcd Corb) = A * S + kx 1. =1GLA-} + 6X28 oo = = lel 168 =4 Hee aed a Heater yoved- ; ieee, PO : A ae Fiom the above example, We infer m=] 4 S21 > beer” al the final eration where %2 70° : fence thé assumption S=-Yand t-c6 er a= el and b:2¢8 \s Wue ex2: Given asia and bro , fd The gcc Cayb) and The Values of Sand . mM] He | A | @ | se wlofx]x 4 Me sss) 21 Bodiroe.. Aceh Cabd=Sxa4 AXE + a = (41ID)+ (9 %0D v . a eOVbe ag Lis = RMS Hence proved- From ‘the above example » We mfer met), Sho So for Gert and b=o oo 2x23: Given oxo “and b=45 , find The ged Cary and the Nolues a [fle [sis sh tha] o lusfolo | 1 [eli o Lt Lo 1 Zz — 4 @ C © us| oO] * x | of} «| Flo x AN=MS S=S|r0 dade) , acd ae) = Sxa +4 %b my -(oxa) +) 445) us = US tus = RIS Hence proved: From the above example » We infer asus, so om kes fox azo and b=45- 8 (0) Modular Aremoalic: Tn medular Arifematic, after we divide one integer with another inlegey , we Consider only The Yemoinder vobut «sWle,sailimot Comsider the auotient m9 ‘The modular AVmemal.c - Syutax : [a _med “n= 7) when a7 From “he above syntax, we divide “o’ yours eta” value and consider the remainder "5". ex: 34 mad 5 % ze mod 1a = 0 s mod as = 5 Loken agen Wen ow 12 mat Be + 1d From he above exampie , ib the*a® value is greater Then tle caleulate The division for a Temaindedy. iy a” Value 15 less Thon WW", The remoinedo will be “a” For Negative Values: ex\t —1@ mod Wy = 10 . : 7 ; ¥ yi! From The obove example 5 Since ‘a’ value is veqdve. Cve) Slee first colewlatL a Mod nw ond Wen ausign Uke Negative sign toy ond pds aad tan” 20 “Sy - step-1: Caleulale a mad = % ye mot We & OD step-2: Assign -ve sig dome 4 0%) Step-3: Add on HA = 14+ (4) 4 ween o ¢ €X2! -a moh 1 = 3 Stepl + colculatt: oo wmod n ~ 2 4 moins FCW step-2: Aswgh ve Sign tow = -7C AY ; sepa: Add ® #9 n= toe) = =3 (a) Matrices 4 —vA malux & collection At i we ae runts which are vepresertted w The. rows amd Columms- Rows ane mdicated “an am columns ave indicated by “C” ty oY andl ex: -] 2 & e % Row mani = eokit ie mahig which ha» only one You (ap))- x [23 4] a en mobix: A coum ynalix Uo vvabix which Was only“ ove colurniy =) ex: |; 2 ‘ 3 SOYLONL. Naokvix : 10us will be 4 Folly 5 aus vo. soudne rnahiy,, Bat number of wa mahix (H=C)- equal to The number of columns ex: 12 3 as 6 [es 4 a . 3x8 : , Additive ddentity mahiX? Tw a malik tolich contains alll 2e'oes and wher addid fo a walix volll produce De 40m aul nF . oe o by eat = (eaters) v Soy snabix . Multiplicakive “dally pmabix «the mulhipaicabve Wants, smoky ombains wh The AJagoval voli, with t's awd he numaning Nobuo Ore wn Os- . - [of an (! “] x\\ eye a , _ {-- 34 ol) 7\s 4h... ba ed 7 ay . ‘ mudd ipAicakive . eanhty Mabix | ~ Adelibiovy amo Subhactuan: — 4 , oa teehee) Eg] ae (rifts Scalar Multiplication ; Qe scalar multiplication , we Wuuliply a wabix wil a scalor Value x , fl 2 3 _ ~ 3% \s «J ea | Scalar tohix 7 aa ; / Determinonl: m= ad-be < pe 4 me(33] Wun |m] = ad-be . = (xu) - (2%3) =u-G red ©) Linear Gomqauenee : Conqrucner: Two imbegers aw Adid 4d be congauent if one integer mops mulple rwmbers of oflwr inleguas - > amonuce % mdicaltd by congruence operator Cx). = To dnote “a and “b” one congruent >» b we ‘Yepreuul it as ab. , % ex Q mod W=2 Aw_omo Wor 2 ax mod lo = 2 ~3 mod who”! bw => From the above example -2,2,12,22 ane Conquunt do eoch ote simce the aleve vollies ae Applied’ with, modulo, Pritt ond Gives tue san susull - THe Covglence for ane above yoluus wut represented os 322812 %2> mad to ~ il Lire : td ghe Liman conpwnct & wad I cryptography fer solvmg an, equation’ a, or o sek of equations of ome cr Move, Vaxiables. 29 The Lint Conguunce ton be poWeds: for ° chy single - Vaiable linear equalovs . Wi) set of timo Equations wb single -yaiable tintorr eqjucilions : le Com solve ike singlt vantioble Uneat ‘equaluon udhich, 1s in “the Sow lax b Cmodnd}.., - oe solve ‘he, Feuohon Wy% Ay 2 (mod 18) aol: calculate ged oh (quis) Tht geo Of (a.m) => ged Cauia) =2 ‘ ; since “We. ged ab Us w) wo Svoucuth tae “2 vou uv divisible by ‘ey (Be & aby ww). , : since Q divides 12, we have posible soluliovs ° Now wx ge ta(mod '8) — ou 6 (mod 9) & mod. a) we et vw w 6.9 Col 9) > fad gu (mod 4) ou mot 4 x x x re @ - BE Th Assume 2% OF %e » fo find another % Co) whwees 7 x= Xe * (lad rl = By applying te, Kyn amd d “m above equaliin we get w7 tot KinJd) [asec ¢ vay I2) | = 6+ 1Cis]2) 6419 2\S- Herat 5 ayer \educing Xe Equtation , we have Two solutions. G awd 1S- whith Salishy fhe Congquunce- Yr gia (mod is) a : | ) luxe GQ mod Ie = 12 i exis mod 18 = 12 | PART-8: Symmebic Encryption. * a | Mathematics of Symmabic key copes GQ: Algubrade Shuchunes ; | : b--Group , < | . | tung t a Rad ‘ e& Gt Oo") Fiedld (@ Adgebroic structures : | An Algebraic shuc uw a umbination of the set and The operations thot ove applied to the Elements of The set- Alquovaic, shudiows ant of wee Typ “buy ae - wo Groups ‘ : @ Rings () fields. cb) Groups : : A Group (G) a st of eluents wil a binary operotion ” ‘es whide 4alishies four properties - Yay “are oR 3 CLOSUAL * Asmocalive ¥ Sdenllihy x Snverse > Abel. Gyoup : > AN Aodian qaoup wa Qroup whew it sadisfies all “the. for qoup prparkes along with on. additional propetly Ccommutative propediy)- > An Abeliam group can also be Called, Os Gasman ive! areup, Properties : ; * Closuw property : ‘Th ol nc bo ave | setuments of “GW “Carb 18 aliO ‘an dimenk of Gs ; * Associative popedty: Th “ot, and ‘cove elsinerhs ob ‘a, hen fb>-e = a:Cb-o) ¥ Sdariiky Ppropely : For ol ‘ol in Gs Vou Exists on cleynent ” é which & Called ‘The ideribity sluvent , whine eO-ae-a- *& Swrowe propery For cach ‘alin “Gy Thee wexists em element ; O whew aatsc.a +e 4 commutative prspelty For all “and bing, We, have.” ab=ba . . Finite Gyo alls za epan we called o finite group ) HF Sme group Gos fereite numb, of Ouments in a Ss ele it ts talled” infinite qnoup: ade of group -(lal): — St indicales he toi number of eumends im & posh Sub gyoup : > lek “W be & subcyoup of “Gio fo Ga

> where “Tow ‘a non ety suse Of SS) shew: WR subgroup Ob Ge: Cydic Gvoup : . ‘ STE a subgroup of & GHOUP is’genevaded by using The Pusey of an tlewmenk F Won suo group Callid a aydic pou . (C) Ring: ‘ a 2 a Ring The steond opevcilionn must, be dishibut ARing & on abgetroic Shuchune.. winidn danoled oy “R! whew | < rN R. 4cl4,F Cle Pa Ring os Two operations , whut Vat first operation mural “salisfy- he five Propouties of abelion group who as the atcand operation, must satay only two properties (tlosune > aswociative)- ec over he first operation - Dishibutvity — > dishibutivity moms that -for all aslo and C velo we ave orshibiat! ty ao OC) = (atib)-caQe)- @nac - @de)- (unc) Poy eos cormmuntative fing : A commutative Ringe obo aning, in which the commutative property 4 also Aatiified for the somd. opercdliow (a) Fidds: . A Field is a Comutelative Ring which is Amnoted bay “e" whew fee Tad yt ,a> 478 antes (abelim) *F wri 150. poor’ me Wo Sn a fiddh , te Atéoncl: operation while propodies cs) Like the first operation - (2d ga oid, The, Bent oF Fra oper vanks of “R” abso. aalialies “all the akon hows wo inverse: * GF ees LD GF Atamas for’ -Gabeis Fields Sovpet i (D Galois fields are’ Firile fidds whwu the number of olernerla Aloud be Pp” wwe pu a prime wiriber ama. wa” positive integer wunber- . a 4 (a) Hewal. Gualou Fields ww, mdicated by GE (p%).” a. Srhoduction to Modten Symmetic Kuy ciphows- a: Modven Block Ciphuns - WA Symnmebie ~Kuy modven Block cipher ences ” nit” blocks of Phoin Text oF decrypts “abit” block of ciphen qext- (Aa enctyphion or decnyption Algovitinm wits The Same “k-bit” key. (3 Dectypion Algorithm mut be The inverse Of Encryption Algorithm usheve both “The Atggriems Wt, rhe same Key. Sendo (rebit, filoin text} [eeigetion Jot kay | et Wink Cighin Text) Receiver: (Carb plain text) Decryptior } [eat _openiey) iaThe Tbit lock Values con be try FRE RSE oy S\2 bits (S Yhe medren block Cipher ss Two Types ef wide bai y ONS ) Subsituhisn COD “Wensposiion 2) | Permutalion - W) Subgtitbion tor) Tom position : 5 Tis mechanism gubstiuies bils instead of Chonoctens « Here, Let or Dil WD We plain Text Con be replaced either by | s9n permulalion phat » THe vext v ver toy fackoriol “Times trot “s ih a Wok hor earunis Ten. 0° > taleuldte vil, whidh give, 3) 7 SKAKV = 6 = ie will hove ‘Tolah pews op eh ws L een (Brome permutation) So ichh whew KS MBYO3N) C312) C32] >The set of permutations for’ N= 3) is: 6 clenierits + > he pamutation im modven Block ciphn uses Thyee types of Keys, “Mey wwe @ full-size - (&) Pantial size (©) Key- irs phon. rif ( Full- size Key Cipher: : . oy J A Tull size K1y Vomsposition cipher ‘Wanxposes bits without Changing They Values AB) Pantial ~ side key ciphet _ The pool uy cipher wa group uvdin “We composition operations ik Lou a Subgroup Of The. con eapording full-size Ky cipluy CO Nata pars _ A Kuys lus ciphor is moslly viol used im soptwant Ercnyption: ov Decayption , drst&l it cay ye uscd me Hondware “dmpienentadions ; 6. Components of o Modren Glock ciphut- The main Components which ove iwvolved Ina. Modven Block cipher ave. Ww p- Box C Diffusion ) “eo S-Box Csubsiitution) W D-BxX! © piffusim) - . L, +h Detox a Waditional uchonism yohids s wsed fox Worse Cipla Cohkonackuw). Me ‘forn of bits. a ) > Jr modien Bleek cipher Whee, are “wee Anjos of D-Box hey oe. | (@) Shoighk D-eox tg ) Compression D-Box CD Expanmore D-Box | D Straight D-BO*! . A Straight PES faces San’ inguds amd Produces ‘xv’ oudpuls 8 S pemutalow a . : ; _y Here We hove 1) possible Mappings © toaos 4 5 \ = straight pbx, Bis \ ch) Compression O- eo : i = A compression H-Box “Ya !D-Box wiih Ww’ rq amd ‘mn ‘oulpuls when men: me > Were some ob the Mputs ort blockid ond will mot swach the oukput « > Vre Compression. D-Box i mostly wxtd with Key -less Block cipr- Seypm 4 ‘ as uu $s m peo UR BY © Expummion De Box « ie > An cxpamtaion D-Box Ba Dr Box with’? Sls ond antigo ww M70 : ‘ > Here some HF Leu inpuls gro Umvucked’ 10 MOE ‘han one ‘oul > The expansion D-Box mortly used wilh euyrless Block iPox. n \ a 3 . ™m (+ 23 4 5 , NOTE : : From “the above D-B0xeS , The Straight D-Rox is only invertible 5 WinAD as The compression D-Boy ard ane expansion D-Box ave Mok invertible « (2) S-BOK Csubstitulion 80x) > A substitution Box Cs-tox) is wed when we have dq frerertl number of inputs and diffeunt number of outpuks « whidh ae represented os n-bit word as input and mbit word o% output who “Wand mn’ aw not necesorrily She same : = ihe warlow, ativities thet are performed By ce) Toverkbility, (b> Complement Cod Toverse. td Gyawlan-shitt Cexcunive on) [Link] claws Of product ciphuw,- Product cipher = Q) Product ciphwe wos diveloped. by she wore which iy complex Shuctuxs whew it Combines Aulstilution 3 eprnudeion, ond Other components also We “Weo important componints of product cipher anc diffustow and. Conpusiove Oiffwion + Th iw wad to bide the sutatiowship belvdeen the Cipher Text avd We plain text. Confusion + TH is wtd to hide the et between Me ciple text aud We fay: Two chaaes of product cplinr : tt) The qwodven block ciphixs Gre mostly axed on poduct ciples (The clases Of product ciphuw ‘ave (@) peislel cpler : ; b 4 ‘ s-Roxes. ore - (BH NOW- Feistel Uphor.- co) feist Gyr! 0) Feistel cipher ws bol invertible od nov - invertible ontponans . Jor hack ciphy ; @ BW yu wid Mm ES (pata ‘noiyplion Stamdond + 2) Th was designed’ by Feistel , Hence callid Fei stad aie i Feistel stuctwue + => Tn feistel Stucture, W number of woUNAS ave poten, jn each round a subshtution w& performed om falh of The i followed by permutation - 4 “>on Feistel shuekute Whe Ruy Ww) Expanded » where % differed ray % wid mm evo Youn mn Po hy? ae “yoo : A, who f ain ‘Text (pion ead a i se =a 7 e x ‘ zg ; .3 8 3 : Fe ky ka. € t £ | Ccipher. text) .. Enc plow ipebaypion | From he above figure j‘the “final design « of a Feistel cipher orth wo founds for Encyption ard Deciyption gre, Obsened: $$ (Tn Encryption side of Fetstel ‘ciphin » frst’ the ploin Text & divided into two pants (tr, &\)- (2) The & CRight Side Of putin Text ) ib now applied with an Eneryphin functun (J) along with a kay (iy) thal TCR Kr) . ro (S) Tae above vesulh “OF F(R KT) B_ KOR CE), with Leyte port of loin Text Ctr) - (o> “The Yeukant oF KOR if swapped wlth Be ight gank .C&r) of He quel Text - =F re Er we vesull of above ov ‘laken as mput for te next round. - Since ke Feistel ciple consis of Two wounds » Aha samme process i applied for Dre above resale, But dhe key which & applied fer Encayptiow oust be difjuent (ka). (6) “The buultov aftr Round ~ 2 will be sod fo the Reuivet side - dor Secujpliow » CA We Deouptun prows oso comisl of Woo Tounds whi inverse of Enowypow (b) Non- Feistel shuctarc : A won feistel shuclunc ciphins « Uste ahe invertolle components: Acomponmnt im the plain Text er the Comrebpanding component in ane phen - TMs BG s-Box must hove an equal mumbtr of imputs awd oukpuks: 7 No Compression of expamsion D-Box ave alles - since Afny one wot mvertible - ad AYacks designed for Block cphuws- 3 Te atlacks om block ciphers are bad on the shuchwe of Fe modlyven block ciphers: > ‘The atiacks for te block: ciphers mou. use tO digo “ype of Techniques’ Wey oi oe L ch ew the O) diffeuntial Crypt analisis @ Limar crypt analinis W Diffountial cup Analysts : The di frountial cayph analysis attack uy dom ova choosen pls Text Tae goal OF the differential Crypt analysis allck. Jo find The cipro key for tte choosen plain Text- => Since, we clo mot know the cphy Key we used Jo anolyre the encryption’ algovittim in odin to collect’ Somme im\pr mation ) ae yelakiowmiup between The plow text and Splat ‘ext Prowcurc: , Considine + §-BOx which is “present i tee cai ishich hax one KOR and ont Kay. to Convert tiw inane’ S mo ne Text - Plain Tect | ] ] KOR key ciphant Text ‘ 7 We tan create the dliffeuntial distribution “whe - for each s-Box and combine them to create. the distibution for each turd: > we ton create a dishibution Tale tor the. “complet. ™ma modven seam ciphut > ove done =o bits of a Ame. ; > Te ploin Text bit sheam. ib indicoled oy," g “aaee” : PrPy ree P24 PF = Te cipher Text bit Stream vb widivated by "ch whine : C= Cy casey > The vey. Wt, stream ie widicdted 3 KO whe: ee Kase Kak, : ‘ > The M1 Wits ove Urtdrfor yh staat ‘of plain yeh ps _ aioe tee Ca) ont Ck) encryption, Cy = E CK, bi) pecryetion, = Pj = DCK, Cid *] ‘ | Lk } ye Bek De ooaee| —— J free Beh st Encryption $F Gar GG Decryption > Pre Bh | The matren stream cipher is cotegovi2ed into Ate aypes » Shey Om A} sgnehrondus ream ciphwr: | (® Non Synchitmows » vtreart cipher, CY Synchronous shreant cipher - ‘ | 4 a Synchronous shea cipher “Whe key stream Ws independ | of ihe ploin dext on the ophet Texk- | The synehvonous stream captor. vats fa) one -Kme pad w Feedloack, Aral “Register Cese> Ce) Lior Feedtouck, Shift Register (LFS) (a) Non - Linu Feed-back stiff Register -CNLFSR) @ on - Sgnelsionous sheom ciple: = $n. Novi- Syrchronious Streant ciphor s Dre Kay dapends ovt eft | dh plain fexk ov the cphwe yext - | 3. DES CDoka Enoypitiony Stomdand) | a: Hisbyy of DES. | history DES stands for data Encrypiion, Samdand, which & > syromebic KLy lock diphur thol wor developed oy nist Crati Tune of skamdands amd Technology ): DES war published boy Firs. C federal ‘ngormaliow proceming. | Skandord °) wm 145 Ererypbivy omd Oeouypuio wilh OES + Gu Wit plaintext. Ger bit plain rext ; —— 4 iz t : . Emenyption | oe E 56 bil oe . — i —s} Reverse | Decaypdiowe js. Mt to | cu tat . . ok gj Capra Text : GY bit. aphot text "pos" Shudive’ “(ODES Slands for Oola tncyphon standand a CODES UW based on Block ciphers who, the beck size is 4 bit (3) DES Algaithm vw symmelic , where WsxUs one Super key (A)-DES Algorithm is Bad on feistel cipher - oo : Details. k ie : . C1) Bleck size of plain Text = Gq bit (@ Block se of Apher Text + Sy bit? @) Total number of Rounds f ue , _ (4) Number, of Permutations 2.12 C4uithal , Fah) jr supeky tN, Ceawit) , (2) Sub Key ‘ +16 Cus bit each). ; TAL [plain Text al : Frid Pewnuksbien) Pat p . ya BE _| } L I Gulp Key | = > tai gy i Bs Keay UpOAsamenD F gzcor From the alcove DES shuctne , tte ‘fivee main components are W Tribal and final permutations - (D 16 Rounds () Round Key Gene valoY UW) Tnitiel and Final pevinulations : ‘the DES Algorithm we {wo permutakion boxes , Wiey are inital Permutation anc -final yermutakion. > he intial, pevmukation takes Gl; Bil Plain Text 5 imput and produces Gy bk output » who the cutput forwarded to Reund-] -fancion she Final pemutation inkey Gy bit mpul fom Round ~16 and praduce au Wat Giphen Text os oudpul. whe wenent vere soy @ =F Round Funcion + “DA Des shuckure has a total Of Ye Tounds | where each wud takes 64 bik nyo alung with a 48 it Subbuy and prods & 64 wit output: +s Rik i <7 va nh rites ae AGA) Km 4: e . ie we bil (2) : oe a eh eee a The: Gu bit input and divides it into) CR). usc two a a seeipanls et named as Left. (L) ancl Rit parts ant 32-bi tach - Now “The K-32 bil UW fomvmdect to DES furuction yg-bit subkey which prodivces a 32 bit outpd ° tao The above 32 bit oubpik U x0R’ uel L°3? pit which rents 3 32-tak output -- “ae ‘ 7 (5) The, above. L-32 bil ig Lar bit ond R32 pit are Combined NENW cowiwed Gynbit, daka woe output of one sound - DES Function : ‘ To wt OES Function -tit ¥ am ends prodidibia Ba stk, wight and qe bi sublay ou input Des. Funekor ap tC) / yw J Emrcmsion 000% Ss, aA L aleng with & papped, wth” @as. bil ond bot the wei ue bil Sublecy (OD The DES funation * p-tox whidd voulls a ug wi oubpul care okeve cukpuk & XOR Wilh 4s bit subs Key amd ves uls & ig lit cotpae: a The above ue wt output is supplied 40S Box which souls iS Ls Lit output: (6) ie above. 32 bit output UW Send to a shraighr 0-# cody @ 32 Wil output - 9 ied: (3) Round Key Genouator: (A round Key gerwrokoy takes osete boil ae Key, 0 rope rom ad ou bit superk4y + ei oinds 1 shi it ci : = shit wer) © Bap (,ai96 / irbit \ portity pep _/ Remaining | abit so bit | ciph RY Leet ag bit sola HL @ ty 1b - a Fromahé above figure » the 56° tat cipher Key is, divided wito Awo halves Cas bit each): ts, on Lee sde ond wget Side ‘axe applied voit leh The | ae-bi cvewlay shill; 7 @) the oukpuk of le ore’ Combined Ogoin and. @) The Compression D-Bo used as a yYound key: 6) similaty » The Same process is repeated anotnen 1S times te produce a twhal of 16 Round Keys C sua keys )- NOTE: The tele Gievdor shih u done with | soit “for fhe” wounds "1, 2 and No» Whereas jhe left civatar shift u ir civenlo ys on nay side ond, ng side senk fo Ane! Compression O-Gox yx will yesulk a yg -PE ukpok which is done wilh alits for ine Yemainimg Younds - C. DES Analysis. DES Analysis Q) propention + Avalome Effect | @ Design = D-Box , $-Box | @ Weaknus + 0-Box . 5-BOx d+ Secunily of DES. Seewuly : Brut force Atl (> ww Unto crypt analysis @D viffeunkial coyptarvalysis e- Mubbple PEs mwdkiple OFS O 2 OES (> 3 VES: Examples > The algorithms dna ave implemanted by ving DES ore © CAST Block cipher @ Blow-fieh WEA Ctkomdional Dota Ewuyphaw Algoritim) G AES (Advanced evnnyphion standoxd ’) i > AES sands for Advoncd Encxyption sandond whide Us a1 specification Gor the endiyplion thok wa, vhabdlished by Notional inmtitudte of Standards and. Tehinaoyy (NIST) in 2001. SEs ‘w much shougar than DES ond. tiple DES “eterpite bang han Ae implant - i Acs betas: > AES w & block Gphwe > Enorypts dota in Wocks of (28 wits each. > Tho key see Can be lag |iaz Jase bits: at imeonrs Vi take jag bits on mpd ond odpuds Re, tats of] encrypted ciphivr Text oa outpuk. ] Ln 7 AES velit of culshituhion: - pernuiialion. network. principle hich. mugerb UL we petkprmed using O° Antics Of Linked. operakiows whidy involve, replacing and shifting of the input data. : ; + y2e bik plain Text cbs ; Rourd Keys | ' ’ i 4 fe cagats? fr |e etl a ogg : : ge “round ee ; cipher Fey os sali teow! y -—~(Crasitqe ov. 286: biED |... Reura '' Ee an uy x |= team re ey sad | 3 jas eure he i Me >| Lea aut an” . ase | ~d —— 7 Relalionvup belween \2¢ bit cipher Text ¢ ; Sumber ob wounds Working of the cipho: | di ore Spr key Se AES peryona operations on eyes of dota. voll tnamn wm cits. nen, the ‘block sie, vs. 129, bits. IRL Shor Procimes ae wits GF Ie ya) of the inpuk dada of of ime - " Wh py Maw . The wimber of rounds dupends onthe Key length ax “plows: | + 128 bit key ~1o vounds eta bik Reyisnla wounds fo pent ona ease bit ky AG younds...+ 7 ; Encryption « : nes considow eieh woik at’ a 16 byte(lu byte x 4 byte)

Sulaytes -> shift rows ~> mix columns : : = Add wound Key.’ I yok Toy NOTE the Leuk your doeant hove tho. fax cour vound F She sulbbytes dues The stbstidution owed shift 1s and Mix @ lus Performs te’ pomudadiion iW the algorithyr- . ; + Sutblay les: eae any tell Ne : “ope a ST atte implammis the substitwlion how. “each lyte ‘U. subsiluted, by anotwr byte SVs perjomued using 0 beokup fable alka called. Mt, S-Box Thy substitution ts dom “ma way hal o byte & Ne substibiled tay itselp ened alts not subifiluted ey anothur lyfe esis is ¢ Complimu’ of the | tunand byl we rau Of this shp wa 16 bye CHX¥) mobi = Shipl Lows - | Each Yow U shifted a puvicwer wurnioer of times: Vu Ft vow 'w nal shifted The cuamd ow bs shubted one. forthe Wt: “The Thiid ‘row is shifted twice cfothe Wits TW fourth vow we chifed thvice tp the LL eo MAX Cetus toda se the oe S This stip ‘U lonsically, 0 mabix, mulliptentinn «cach coluvnih is siwbiplled | anit oF Specie MahiX ad. tus tne poriiony of waa bye inthe toumn, vw changed ab ayeyudt . i + Add round keys + ae : ‘ Shrew the Rualmt oulpul of the previows stage ib XOR with the Lnrepoding round kay -Here ste 6 bytes is, not conpidued Ona gid bul jwA o» 129 bits of dota - . > ‘Pyler old Whee Younds 128 vis oh encrypted dota te given lack, % oudpak This prows repeated unlil all Me doa. ty be onowypted uNdbagors Ws pros: a Ww shogyes in Une younds can be wasiy undore fox Shwe Sages More on wpe tL wich ulun pabormed viet Aw | = Each tag blots gou TWvough the 10512 oF 1) wounds soe ie Ton te Key size - l ey day 8} each Yound WM LR OWPtiON 1 a Follows. * Add vound Key | # Soverge UK GODIN, e wit OWS | * Soverse subegte * o Sverre MIX Colts : a J—> Twos stig & siivilan to te mix Columns sb encaliphion ye ditfers in Jana mnah\x used fo Cony oul bs operabow . ; + Spverve sublytis + . : Js Inverse Stax 1 und ox a bo Leokup fable and wing wshidh Me } wyts art substituted diving ducuption i ny rot | enouyption and ducnyphion of AE Poin ext Ciphury, Ciphor Kay Plain Text rz . ao | [wet Md tnd | 6 8 | i or el | [ Smee Aid round tay) war 3 | cen | [Rrvevic ix cottons J | 4 [sevense Shakt wass | : 3 a | - E (ane ehbyts | 3 ) 2) | s Cube # | S|) | 3] Cstaitano— — P | 2 S| (Mx tetumns_| remereree ppc wey | batted eae | 1 Fro i ar | = wy 2) ——_—_—_ | © | Saverte shaye few ] | Zz — Shift rons — — =——" yg ttyg todd round Buy] | <--> CARA Roun eaty Ja ew Ss

You might also like