Cyber Security: UNIT 1 Introduction
Cyber Security: UNIT 1 Introduction
Cyber Security: UNIT 1 Introduction
UNIT 1 Introduction
OSI Security Architecture
Classical Encryption techniques
Cipher Principles
Data Encryption Standard -Triple DES
Block Cipher Design Principles and Modes of Operation
-Evaluation criteria for AES -AES Cipher
Placement of Encryption Function
Traffic Confidentiality
OSI Security Architecture
4. Data integrity
5. Authentication exchange
2. security labels
5. security recovery
SECURITY SERVICES
X.800 defines security services in 5 major categories
Authentication: assurance that the communicating entity is the one
claimed
Access Control: prevention of the unauthorized use of a resource
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
GENERAL CAESAR CIPHER
Can use any shift from 1 to 25
I.e. replace each letter of message by a letter a fixed distance
away
Specify key letter as the letter a plaintext A maps to
E.g. a key letter of F means A maps to F, B to G, ... Y to
D, Z to E ,I.e. shift letters by 5 places
Hence have 26 (25 useful) ciphers
Hence breaking this is easy. Just try all 25 keys one by one.
MATHEMATICS
If we assign the letters of the alphabet the numbers from
0 to 25, then the Caesar cipher can be expressed
mathematically as follows:
For a fixed key k, and for each plaintext letter p, substitute
the ciphertext letter C given by
C = (p + k) mod(26)
Decryption is equally simple:
p = (C – k) mod (26)
CRYPTANALYSIS OF THE CAESAR CIPHER
Disadvantages
The message is decrypted at each node.
Otherwise, it is 0 bit.