Professional Documents
Culture Documents
Tech – I Sem
CRYPTOGRAPHY & NETWORK SECURITY
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Syllabus:
Security Goals
Cryptographic attacks
Security services & Mechanisms
Mathematics of Cryptography
DNR College of Engineering & Technology - Department of Computer Science & Engineering
UNIT-I
Basic Principles
Computer Security - generic name for the collection
of tools designed to protect data and to thwart hackers.
Network Security - measures to protect data during
their transmission .
Internet Security - measures to protect data during
their transmission over a collection of interconnected
DNR College of Engineering & Technology - Department of Computer Science & Engineering
SECURITY GOALS
Confidentiality
Integrity
Availability
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Taxonomy of security goals
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Confidentiality:
• Confidentiality is probably the most
common aspect of information security.
We need to protect our confidential
information.
• An organization needs to guard against
those malicious actions that endanger the
confidentiality of its information.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Integrity:
• Information needs to be changed
constantly. Integrity means that changes
need to be done only by authorized
entities and through authorized
mechanisms.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Availability:
• The information created and stored by an
organization needs to be available to
authorized entities. Information needs to
be constantly changed, which means it
must be accessible to authorized entities.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Model for Network Security
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Cryptographic Attacks
• Passive Attacks:
Attacks Threatening Confidentiality
• Active Attacks:
Attacks Threatening Integrity
Attacks Threatening Availability
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Taxonomy of attacks with relation to
security goals
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Attacks Threatening Confidentiality:
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Traffic analysis refers to obtaining some other
type of information by monitoring online
traffic.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Attacks Threatening Integrity :
Modification means that the attacker
intercepts the message and changes it.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Masquerading or spoofing happens when the
attacker impersonates somebody else.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Replaying means the attacker obtains a copy
of a message sent by a user and later tries to
replay it.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Repudiation means that sender of the message
might later deny that she has sent the message;
the receiver of the message might later deny
that he has received the message.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Denial of service (DoS) is a very common
attack. It may slow down or totally interrupt
the service of a system.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Passive Versus Active Attacks:
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• MODULAR ARITHMETIC:
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• THE EUCLIDEAN ALGORITHM
One of the basic techniques of number
theory is the Euclidean algorithm, which is a
simple procedure for determining the greatest
common divisor of two positive integers.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• We also define gcd(0, 0) = 0.
• The positive integer c is said to be the greatest
common divisor of a and b if
• 1. c is a divisor of a and of b;
• 2. any divisor of a and b is a divisor of c. An
equivalent definition is the following:
• gcd(a, b) = max[k, such that k|a and k|b]
• gcd(60, 24) = gcd(60,-24) = 12
• In general, gcd(a, b) = gcd(|a|, |b|).
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Finding the Greatest Common Divisor:
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Finding the Greatest Common Divisor:
Cont…
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Example GCD(1970,1066)
1970 = 1 x 1066 + 904 gcd(1066, 904)
1066 = 1 x 904 + 162 gcd(904, 162)
904 = 5 x 162 + 94 gcd(162, 94)
162 = 1 x 94 + 68 gcd(94, 68)
94= 1 x 68+ 26 gcd(68, 26)
68= 2 x 26+ 16 gcd(26, 16)
26= 1 x 16+ 10 gcd(16, 10)
16= 1 x 10+ 6 gcd(10, 6)
10= 1 x 6 + 4 gcd(6, 4)
6=1x4+2 gcd(4, 2)
4=2x2+0 gcd(2, 0)
GCD(1970,1066)=2
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Properties of Congruences:
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Modular Arithmetic Operations:
Many complex cryptographic algorithms are
actually based on simple arithmetic. In modular
arithmetic the numbers which going to deal are just
integers and operations are addition, subtraction,
multiplication and division.
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Objective Questions:
• Which is not an objective of network security?
a) Identification
b) Authentication
c) Access control
d) Lock
Answer: d
• Which of these is a part of network identification?
a) UserID
b) Password
c) OTP
d) fingerprint
Answer: a
• The process of verifying the identity of a user.
a) Authentication
b) Identification
c) Validation
d) Verification
View Answer
Answer: a
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
Answer: c
• The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Answer: a
• The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
Answer: a
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• A process of making the encrypted text readable again.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
Answer: a
• A small program that changes the way a computer operates.
a) Worm
b) Trojan
c) Bomb
d) Virus
Answer: d
• A unique piece of information that is used in encryption.
a) Cipher
b) Plain Text
c) Key
d) Cipher
Answer: c
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• These ciphers replace a character or characters with a
different character or characters, based on some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based
Answer: d
• Caesar Cipher is an example of
a) Poly-alphabetic Cipher
b) Mono-alphabetic Cipher
c) Multi-alphabetic Cipher
d) Bi-alphabetic Cipher
Answer: b
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• When plain text is converted to unreadable format, it is termed as _____________
a) rotten text
b) raw text
c) cipher-text
d) ciphen-text
Answer: c
• Data which is easily readable & understandable without any special algorithm or
method is called _________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
Answer: b
• Plain text are also called _____________
a) cipher-text
b) raw text
c) clear-text
d) encrypted text
Answer: c
DNR College of Engineering & Technology - Department of Computer Science & Engineering
• Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
Answer: c
• A cryptosystem is also termed as ______________
a) secure system
b) cipher system
c) cipher-text
d) secure algorithm
Answer: b
• Which of the following attacks is a passive attack?
a)Masquerade
b)Modification of message
c)Denial of service
d)Traffic analysis
Answer: d
DNR College of Engineering & Technology - Department of Computer Science & Engineering
Previous Questions:
1. What is meant by cryptography? Oct/Nov - 2018
2. Differentiate between Active attacks and Passive Attacks. Oct/Nov - 2018
3. List few examples for transposition cipher. Oct/Nov - 2018
4. Write about Security Mechanisms in cryptography . Oct/Nov - 2018
5. Explain security services and security mechanisms. Oct/Nov – 2019
6. State and prove the properties of modular arithmetic binary
operations. Oct/Nov – 2019
7. What is a Security attack? Explain taxonomy of attacks with relation
to security goals. Oct/Nov – 2019
8. Explain the extended Euclidean algorithm. Find gcd(a, b) and the
values of s and t for given a=161 and b=28. Oct/Nov – 2019
DNR College of Engineering & Technology - Department of Computer Science & Engineering