Professional Documents
Culture Documents
Iss Unit 1
Iss Unit 1
Examples:
Destroying some H/W (disk or wire)
Disabling file system.
Swamping a computer with jobs or
communication link with packets.
Security Attacks
Interception:-An unauthorized part gain access
to an asset.
This is an attacks on confidentiality
Example:-
Wiretapping to capture data in a network.
Illicitly copying data or programs.
Security Attacks
Examples:
Changing data files.
Altering a program.
Altering the contents of a message.
Security Attacks
Examples:
Insertion of records in data files.
Insertion of spurious messages in a network.
(message replay)
SECURITY ATTACKS
1.1.2 PASSIVE AND ACTIVE ATTACKS
Access Control
Data confidentiality
Data Integrity
Nonrepudiation (and Availability)
1.1.7 Basic Vocabulary of Encryption and
Decryption
Plaintext: This is what you want to encrypt
Cipher text: The encrypted output
Enciphering or encryption: The process by which
plaintext is converted into cipher text
Encryption algorithm: The sequence of data processing
steps that go into transforming plaintext into cipher text.
Various parameters used by an encryption algorithm are
derived from a secret key.
Secret key: A secret key is used to set some or all of the
various parameters used by the encryption algorithm. The
important thing to note is that, in classical cryptography, the
same secret key is used for encryption and decryption.
Deciphering or decryption: Recovering plaintext from cipher text
Decryption algorithm: The sequence of data processing steps that go
into transforming cipher text back into plaintext. In classical
cryptography, the various parameters used by a decryption algorithm are
derived from the same secret key that was used in the encryption
algorithm.
Cryptography: The many schemes available today for encryption and
decryption
Cryptographic system: Any single scheme for encryption and
decryption.
Cipher: A cipher means the same thing as a “cryptographic system”
Block cipher: A block cipher processes a block of input data at a time
and produces a cipher text block of the same size.
Stream cipher: A stream cipher encrypts data on the fly, usually one
byte at time.
1.2 Classical Encryption Techniques
CLASSIFICATION OF ENCRYPTION TECHNIQUES
Key +3 +3 +3 +3 +3 +3 +3
Ciphertext Y R B D J H U
Key +1 +2 +3 +1 +2 +3 +1
Ciphertext W Q B B I H S
1.2.2 Transposition Techniques
All the techniques examined so far involve the
substitution of a ciphertext symbol for a plaintext
symbol. A very different kind of mapping is
achieved by performing some sort of permutation
on the plaintext letters. This technique is referred to
as a transposition cipher.
The simplest such cipher is the rail fence technique,
in which the plaintext is written down as a sequence
of diagonals and then read off as a sequence of
rows. For example, to encipher the message "meet
me after the toga party" with a rail fence of depth 2,
we write the following:
m e m a t r h t g p r y
e t e f e t e o a a t
permutation
1.5 SHANNON’S THEORY OF CONFUSION
AND DIFFUSION
Outline
History
Encryption
Key Generation
Decryption
Strength of DES
Ultimate
1.7.1 HISTORY
In 1971, IBM developed an algorithm,
named LUCIFER which operates on a block
of 64 bits, using a 128-bit key
Input round i
Overall probabilty
of given output
difference is
(0.25)(1.0)(0.25)
= 0.0625
Differential Cryptanalysis
Perform attack by repeatedly encrypting plaintext pairs with
known input XOR until obtain desired output XOR
When found, assume intermediate deltas match
if intermediate rounds match required XOR have a right
pair
if not then have a wrong pair, relative ratio is S/N for attack
Relation
Ci = Pi XOR Oi
Oi = EK (i)