CST433 M1 Ktunotes - in
CST433 M1 Ktunotes - in
CST433 M1 Ktunotes - in
OSt
seeurity architecture- Security attacks, Services, Mechanisms. Cryptography VS
Cryptanalysis. Classieal eneryption techniques-Symmetric cipher model. Substitution
ciphers- Monoalphabetic vs Polyalphabetic ciphers, Caesar
Playfair cipher, Affine cipher,
cipher, Vigenere cipher, Hill cipher. Transposition ciphers Keyless, Keyed,
Double transposition.
services
Levels of Impact
Moderate
High
Low Impact
organization is able to
perform its primary functions, but the effectiveness of
the functions is
noticeably reduced
(i) result in minor damage to
organizational assets;
(1ti) result in minor
financial losst or
(iv) result in minor harm to
individuals.
Moderate Impact
(iv) result in significant harm to individuals that does not involve loss of life or
serious, life-threatening injuries
High Impact
The loss could be expected to have a severe or catastrophic adverse effect on
organizational operations, organizational assets, or individuals.
A severe or catastrophic adverse effect means that, for example, the loss might
transmissions. T he
on, or monitoring of,
Passive attacks are in the nature of eavesdropping
Active attack involves some modification of thedata stream or the creation of a false stream
andcan be subdivided into four categoriès
Hard to detect
Active attacks- focus on
Detection and Recovery
Hard to stop 0 ing
Easy to detect
communicating open systems and that ensures adequate security of the systems or
of data transfers.
-|+ 100%
AUIHENIICATION
The assurance that the communicatingE cntity is tha
aDATAINEEGRITY
Tho asvurancc that data rcccivcd ard cxacty as
A
ODe that it clains to be sent by an authorized cntity ce, contain DO mods
catuon, serion, delcugn, 9E21Cpi)
Peer Batity Authentiation
Used in associalion wilh a logIcal connccuon
to
provide confdence tn tho idcntity of tbe cntitics Conncclion lafegrily with Recorery
Providcs for the integity
COnnectod on and detects any of all ascr data on acon
modire conpcc-
within ccon,
o
orr
replay of
repluy of any
any data
data withn an couro d eOenc
Data-Otiein Authentication
lna connectionless transler, provides assiurance lha with rocovcyaltcmptcc
the souroc of roccivcd data is ar claimed.,
Conncction Integiiy wilhout Recoverg
Asabovc, Butprovdes only detection withoot
ACCESS CONTROL S2 recovc
The provcntion ol unauthorUcd usc oar
e t a s Service contros who can have coess Scective-Ficld Conncction Inteprity
o u r , under whbat conditioS access i n occu Povidesfor the integrily of seclccicd ficlds within thc
and what thosc acocssing theresour allowth
fo do) tionatoadata bockoftransfered over a connec
and takes the form
delcrmination ol
tho sclected helks havc becn
whether
modified,inscricd,
DATA CONFIDENTIALITY deleted, or replaycd.
1bc protcclion of data Irom unauthortized
Connectionless Intezrity
Provides for the
inteernly ol a single connectionles
data block and may take
Connection Confidentiality the form of detection ol
The protction of all uscr diata on u connccion data modhication. Additionaly, a iited form of
replay deteclion may be provided.
Connectionless Conndentiality
h e protection of all user data ina sioglodt bla Sckctive-Ficld Conncetionless Integity
rovides or tha nlCgrily of sclected ficlds withina
Singlo connectionless
Sekctiveield Confidentiality data block; takes tho formol
determination ol wbether tho selected belds hav
ho conlsdentiality
of sclected sclds wilhin the
us
dala on a cOnpoction or in a single data block. been modificd
Nonrepudiation, Destination
Prool that the messago wax
received by the specificd
Dury
Security mechanismn
feature designed to detect, prevent, or recover from a security attack
no single mechanism that will
support all services required
cryptographic techniques
specific security mechanisms:
n l e Padding
Ihe insertion ol bits into gaps in a data strcam to
Notarization
The use of a trusted third party to assurc certain
properties of a data cxchange.
MECHANISM
NotarZauo
IDD n eXCho
rity
conu
R o u t i n g
c o
SERVICE a
Conlidentiality
Traflic low confidentiality
Data integrity
Nonrepudiation
Availability
Sender Recipient
Information
ecurity-related
transformation Channel
Security-related
transformation
ceret
intormation information
Opponent
using this model requires us to:
Svmmetric CipherModels
A plaintext message after encryption is known as cipher and which follows symmetric
encryption is also known as symmetriccipher.
Secret key n a r h a r e d by
pe
ransmitted
PhCtex
Plaintext aintext
Encrypton
ngoritn Deersption algorithm
pu (reserse of ener plion output
ngoritlim)
Detail the five ingredients of the symmetric ciphéer model shown in Figure 1.l:
decryption algorithm - inverse of eneryption algorithm -takes the cipher text and
utio
Downloaded from Ktunotes.in
-a secret key known only to sender/ receiver
with the message X [X1,X2,X3,. and the encryption key K as input, the
Cryptography
Cryptographic systems are characterized along three independent dimensions:
Substitution- each element in the plaintekt (bit, letter, group of bits or letters) is
mapped intoanother element
Transposition- elements in the pläintext are rearranged.
A block cipher processes the input one block of elements at a time, producing an
output block for each input block
A stream cipher processes the inpüt efements continuously, producing output one
element at a time, as it goes along.
Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus some
knowledge of the general characteristics of the plaintext or even some sample plaintext-
ciphertext pairs.
Brute-force attack: The attacker tries every possible key on a piece of ciphertext until an
intelligible translation into plaintext is obtaihed on'average, half of all possible keys must be
tried to achieve success.
Koown Pizintext
Encypooa aleoril
Gpberie
n e or more plaiales ophertcat pain fomed with thbe sccret key
hoca Paintext
1920
The Playfair algorithm is based on the use of 5x5 matrix of letters constructed using a
keyword.
Let
the keyword be monarchy
The matrix is constructed by filling in the letters of the keyword (minus duplicates)
from left to right and from top to kottom, and then filling in the remainder of the
matrix with the remaining letters in alphabetical order.
Repeating plaintext letters iat would fall in the same pair are
separated with a Filler létter such as".
Plaintext letters that fall in, the samerowof the matrix are each replaced by the
to the right, with the first of the row following the last.
letter element
Plaintext letters that fall in the same column are replaced by the letter beneath,
with the top element of the column following the last.
Olherwise, each plaintext letter is rcplaced by the letter that lies in
its own and the
row
columif oceupied by the other plaintextletter
al toe
M ONA
B
me et me at th es ch OX ol ho us ex
XL TU-CIPHERTEXT
CL KL CL RS PD IL HY AV MP HF
() Monoalphabetic Ciphers
rather than just shifting the alphabet
could shufile (permute) the letters arbitrarily
random ciphertext letter
each plaintext letter maps to a
different
hence key is 26 letters long
Plain: abcdefghijklmnopgrstuvwxyZ
cipher: DKVOFTBJWPE SCXHTMYAUOLRGZN
Plaintext: ifwewishtorepla celetters
Ciphertext: WIRFRWAJUHYFTSDVFS FUUFYA
Frequeney Analysis
letters are not equally commonlyused
i n English 'e' is by far the most common letter then T,R,N,I,O,A,S
have tables of single, double &triplé letter frequencies
substitution
O In this scheme, the set of related monoalphabetic
rules consisting of 26 caesar ciphers with shifts of 0 through 25.
Each cipher 1s.denoted by a key letter. e.g., Caesar cipher with
the value d (Since a=0, b=1, c=2
a shift of 3 is denoted by key
and so on).
o To aid in understanding the scheme, a matrix known as
vigenere tableau is constructed.
O Each of the 26 ciphers is laid out horizontally, vith the key
letter for each ciphet to its left. A normal alphabet for the
plaintext runs across the top.
10 her
isdet
WX
A C D
N O po
STU VW
TUV W
M
v G
L.
EM O PQ
L M NO Q R
G NOPQ QRS
S TU W
k1 k2
(C1C2C3) P P2 Pa)ka1 k2 kmod 26
Or
C-KP mod 26,
Thus the cipher text is generated by performing the bitwise XOR of the
plaintext and the
key. Decryption uses tie sams key. Because of the properties of XOR,
decryplion simply
involves the same bitwise operation
GOK;
ciphertext =10000101
Advantage
Encryption method is completely
unbreakable for ciphertext only attack.
a
Disadvantages
It
requires a very long key
transmit. which is expensive to
produce and expensive to
memat rhtgpry
etefeteo a a t
giving ciphertext MEMATRHTGPRYETEFETEOAAT
i) COLUMNAR ALGORITHM (Row
It is also known columnar transposition
as
transposition).
It is more
technique.
a
complex scheme n which messages are written in
row.
a
rectangle row b
In this example, the key is 4312567.To encrypt, start with the column that is labeled 1, in
this case column 3. Write down all the letters in that column. Proceed to column 4, which
is labeled 2, then column 2, then column 1, then columns 5, 6, and 7.
Key: 43 1 2 5 67
Input: ttna a p t
WCo 1 xk
n i ypetz
Output:
NSCYAUOPTTVLTDNROIEPAXTTOKZ
P DCk,c) Ck m od 6 PkK- P
o , sysltro Can be des caibedas
C P t+ki2P +kiaPa )mod
CRCbRI Ph + k22 Pe + Kas Pmedt
C3 Ca P1+ k32 Pz tka3 P od.
ka ka2 kas
A C PR mod .
V w X 2
2.0 2) 22 22 3 2 4 2S
C kP oo ob
rod
a
3
ot 3
L9 ae d2 tmsd ab
Ot bx
19 "
Secord veeti
C
P od ab
Rivd veebr
C- eP
o ed 26
34
E wnod
lential
Ceplas luol- s Fk MF]o
Ae3 d mulbrn pe o 6
a b o o dn la-6) umlkep le oj ]
The'o e o ne lLsd
adjaro a fro v le
C: -C
Fee e
Beore ddaeupio cu
Kaue leAn
edeljle) 3P26
-6t 26 23
2
207 18
Aleutfolkenq meclG
7 8
Cpke k mF ID
e Cmec 26
plaurlan P
L39
C
P:
plinuxt od ot
Placnloxt TTAC
Downloaded from Ktunotes.in