192 Cryptography
192 Cryptography
192 Cryptography
Network security is a set of technologies that protects the usability and integrity of a
company's infrastructure by preventing the entry or proliferation within a network of a
wide variety of potential threats.
Internet security is a term that describes security for activities and transactions made over
the internet. It's a particular component of the larger ideas of cybersecurity and computer
security, involving topics including browser security, online behavior and network security.
Q-Explain security attacks threating to integrity
What follows are some of the most common types of active attacks.
Masquerade attack In a masquerade attack, the intruder pretends to be a particular user
of a system to gain access or to gain greater privileges than they are authorized for.
Masquerade attacks are conducted in several different ways, including the following:
A session hijacking attack is also called a session replay attack. In it, the attacker takes
advantage of a vulnerability in a network or computer system and replays the session
information of a previously authorized system or user. The attacker steals an authorized
user's session ID to get that user's login information. The attacker can then use that information
to impersonate the authorized user.
DoS attack
In a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or
website with network traffic, making it difficult for legitimate users to access those resources.
Two ways a DoS attack can occur include:
1. Flooding. The attacker floods the target computer with internet traffic to the point that the
traffic overwhelms the target system. The target system is unable to respond to any
requests or process any data, making it unavailable to legitimate users.
2. Malformed data. Rather than overloading a system with requests, an attacker may
strategically send data that a victim's system cannot handle. For example, a DoS attack
could corrupt system memory, manipulate fields in the network protocol packets or exploit
servers.
DoS attack
In a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or
website with network traffic, making it difficult for legitimate users to access those resources.
Two ways a DoS attack can occur include:
1. Flooding. The attacker floods the target computer with internet traffic to the point that the
traffic overwhelms the target system. The target system is unable to respond to any
requests or process any data, making it unavailable to legitimate users.
2. Malformed data. Rather than overloading a system with requests, an attacker may
strategically send data that a victim's system cannot handle. For example, a DoS attack
could corrupt system memory, manipulate fields in the network protocol packets or exploit
servers.
Q-3© Write down the round structure of DES algorithm for encryption method
Table of Contents
Key Takeaways
View More
We live so much of our lives today on the internet. Whether it’s for storing our personal
information, finding entertainment, making purchases, or doing our jobs, our society relies
increasingly on an online presence.
This increased dependence on the internet means that information security is more important
than ever. The stakes are too high now. Users need to know that their sensitive data is kept
confidential, unmodified, and readily available to authorized readers.
Data encryption is just one weapon in the cybersecurity arsenal, but it’s one of the oldest and
most used. And since no discussion about data encryption is complete without talking about
DES, here we are!
The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher created in the
early 1970s by an IBM team and adopted by the National Institute of Standards and Technology
(NIST). The algorithm takes the plain text in 64-bit blocks and converts them into ciphertext
using 48-bit keys.
Since it’s a symmetric-key algorithm, it employs the same key in both encrypting and decrypting
the data. If it were an asymmetrical algorithm, it would use different keys for encryption and
decryption.
DES is based on the Feistel block cipher, called LUCIFER, developed in 1971 by IBM
cryptography researcher Horst Feistel. DES uses 16 rounds of the Feistel structure, using a
different key for each round.
DES became the approved federal encryption standard in November 1976 and was subsequently
reaffirmed as the standard in 1983, 1988, and 1999.
DES’s dominance came to an end in 2002, when the Advanced Encryption Standard (AES)
replaced the DES encryption algorithm as the accepted standard, following a public competition
to find a replacement. The NIST officially withdrew FIPS 46-3 (the 1999 reaffirmation) in May
2005, although Triple DES (3DES), remains approved for sensitive government information
through 2030.
Gain expertise in IT Security including security and risk management, and more with CISSP Certification
Training Course. Check out course curriculum.
Triple DES Algorithm
Triple DES is a symmetric key-block cipher which applies the DES cipher in triplicate. It
encrypts with the first key (k1), decrypts using the second key (k2), then encrypts with the third
key (k3). There is also a two-key variant, where k1 and k3 are the same keys.
Key Takeaways
• The NIST had to replace the DES algorithm because its 56-bit key lengths were too small, considering
the increased processing power of newer computers. Encryption strength is related to the key size,
and DES found itself a victim of the ongoing technological advances in computing. It reached a point
where 56-bit was no longer good enough to handle the new challenges to encryption.
• Note that just because DES is no longer the NIST federal standard, it doesn’t mean that it’s no longer
in use. Triple DES is still used today, but it’s considered a legacy encryption algorithm. Note that NIST
plans to disallow all forms of Triple-DES from 2024 onward.
Now in our understanding of what is DES, let us next look into the DES algorithm steps.
DES Algorithm StepsTo put it in simple terms, DES takes 64-bit plain text and turns it into a
64-bit ciphertext. And since we’re talking about asymmetric algorithms, the same key is used
when it’s time to decrypt the text.
1. The process begins with the 64-bit plain text block getting handed over to an initial
permutation (IP) function.
3. Next, the initial permutation (IP) creates two halves of the permuted block, referred to as Left
Plain Text (LPT) and Right Plain Text (RPT).
4. Each LPT and RPT goes through 16 rounds of the encryption process.
5. Finally, the LPT and RPT are rejoined, and a Final Permutation (FP) is performed on the
newly combined block.
Round Function
The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-bit
output. Expansion Permutation Box − Since right input is 32-bit and round key is a 48-
bit, we first need to expand right input to 48 bits. Permutation logic is graphically
depicted in the following illustration −
• The sender and receiver don’t need any prior knowledge of each other.
• Once the keys are exchanged, the communication of data can be done
• The algorithm can not be sued for any asymmetric key exchange.
• q: q is a prime number
• a: a < q and α is the primitive root of q
2. Alice selected private key a = 4, and Bob selected b = 3 as the private key
3. Both Alice and bob now calculate the value of x and y as follows:
Fermat's “little” theorem states that if p is prime, then ap ≡ a (mod p) for all a. An alter- native
form states that ap−1 ≡ 1 (mod p) when p is prime and a is any integer not divisible by p. (This
last condition is needed for the alternative form, but not for the usual form.)
Bob wants to send Alice an encrypted email. To do this, Bob takes Alice's public key and
encrypts his message to her. Then, when Alice receives the message, she takes the private key
that is known only to her in order to decrypt the message from Bob
Q7(b)what is email security in network security
Email security includes the techniques and technologies used to protect email accounts
and communications. Email, which is an organization's largest attack surface, is the primary
target of phishing attacks and can be used to spread malware.
Email security is the process of ensuring the availability, integrity and authenticity of email
communications by protecting against the risk of email threats. Email enables billions of
connected people and organizations to communicate with one another to send messages.
E-mail security becomes a critical issue to research community in the field of
information security. Several solutions and standards have been fashioned according to
the recent security requirements in order to enhance the e-mail security. Some of the
existing enhancements focus on keeping the exchange of data via e-mail in confident
and integral way. While the others focus on authenticating the sender and prove that he
will not repudiate from his message. This paper will survey various e-mail security
solutions. We introduce different models and techniques used to solve and en-hance
the security of e-mail systems and evaluate each one from the view point of security.
1. Cryptographic keys. An encryption algorithm alters data, and a recipient needs a specific
code (or key) to make it readable once more. HMAC relies on a shared sets of secret
keys.
2. Hash function. A hash algorithm alters or digests the message once more. HMAC
uses generic cryptographic hash functions, such as SHA-1, MD5, or RIPEMD-128/60.
• Secret keys. They must have a way to decode messages they get. A secret key handles
this task, and it's meant to stay secret and hidden.
• Algorithm. They must pick one hash function that all of their messages will move
through.
When complete, the message is considered irreversible, and it's also resistant to
hacking. Someone who intercepts this message won't even be able to guess at its
length. The work renders the message contents absolutely useless to anyone without a
key or a code.