Lecture 1 2 3
Lecture 1 2 3
Instructor:
Dr Mohammad Wazid
Associate Professor, Department of CSE
Graphic Era (Deemed to be University), Dehradun, India
Email: [email protected]
Homepage: https://sites.google.com/site/mwazidiiith/home
About the instructor
Qualification:
1. Postdoc from Cyber Security and Networks Lab, Innopolis
University, Innopolis, Russia.
2. Ph. D (CSE) from Center for Security, Theory and Algorithmic
Research of the International Institute of Information Technology
(IIIT), Hyderabad, India.
3. M. Tech. Computer Network Engineering from Graphic Era
University, Dehradun, India.
4. B. E. (CSE) from KEC, Dwarahat, (Regional Engineering College
(REC) Uttarakhand, India.
About the instructor
Research background:
Published 84 papers in international journals and conferences in the fields
of
Cyber Security
Authentication
Internet of Things (IoT)
Cloud Computing
Big Data
Blockchain
About the instructor
Research background:
Some of the research findings were published in top cited journals, such as
the IEEE TDSC, IEEE Transactions on Smart Grid, IEEE Internet of Things
Journal, IEEE Transactions on Industrial Informatics, IEEE Journal of
Biomedical and Health Informatics, IEEE Consumer Electronics Magazine,
Future Generation Computer Systems, Security and Communication
Networks (Wiley) and Journal of Network and Computer Applications.
Awards:
• University Gold Medal in M. Tech program
• Young Scientist Award by UCOST, Department of Science and Technology,
Government of Uttarakhand
• Dr. A.P.J Abdul Kalam innovator of the year award
• ICT Express (Elsevier) Best Research Reviewer Award for 2019
Course Outcomes
• After completion of the course students will be able to:
1. Understand the basics of computer security
2. Elaborate the cryptographic techniques.
3. Discuss the transport layer security
4. Find the pros and cons of various key distribution methods
5. Analyze the wireless network security
6. Find the level of system security
Grading scheme
• As per the University scheme.
• Criteria for internal marks:
• Performance in the class (queries and answers)
• Performance in the class tests/quizzes/assignments
• Attendance
• Behaviour with the teacher and classmates
7. Backward secrecy
If an entity (for example, smart home user, smart IoT device) is
just deployed in the communication network then it must not
have any ability to access the previously exchanged messages.
Components of a cryptosystem
1. Plaintext
• It is the data to be protected during transmission.
2. Encryption Algorithm
• It is a mathematical process that produces a ciphertext for
any given plaintext and encryption key.
• It is a cryptographic algorithm (i.e., AES) that takes
plaintext and an encryption key as input and produces a
ciphertext. For example, EK(P)=C, E stands for
encryption process, K stands for key used, P stands for
plaintext and C stands for produced ciphertext.
Components of a cryptosystem
3. Ciphertext
• It is the scrambled version of the plaintext produced by
the encryption algorithm using a specific encryption key.
• The ciphertext is not guarded.
• It is transmitted through a public channel.
• It can be intercepted or compromised by anyone who has
access to the communication channel.
Components of a cryptosystem
4. Decryption algorithm
• It is a mathematical process, that produces a unique
plaintext for any given ciphertext and decryption key.
• It is a cryptographic algorithm that takes a ciphertext and
a decryption key as input, and outputs a plaintext.
• The decryption algorithm essentially reverses the
encryption algorithm and is thus closely related to it.
• For example, DK(C)=P, D stands for decryption process,
K stands for key used, C stands for ciphertext and P stands
for obtained plaintext.
Components of a cryptosystem
5. Encryption key
• It is a value that is known to the sender.
• The sender inputs the encryption key into the encryption
algorithm along with the plaintext in order to compute the
ciphertext.
6. Decryption key
• It is a value that is known to the receiver.
• The decryption key is related to the encryption key, but is not
always identical to it.
• The receiver inputs the decryption key into the decryption
algorithm along with the ciphertext in order to compute the
plaintext.
Components of a cryptosystem
• For a given cryptosystem, a collection of all possible
decryption keys is called a key space.
• An interceptor (an attacker) is an unauthorized entity who
attempts to determine the plaintext.
• He can see the ciphertext and may know the decryption
algorithm.
• He, however, must never know the decryption key.
Symmetric and Asymmetric Encryption
• While communicating on an unsecure channel (i.e.,
Internet) we have to be careful about the confidentiality of
the shared information.
• There are two techniques use to preserve the
confidentiality of your message, Symmetric and
Asymmetric Encryption.
• Symmetric encryption allows encryption and decryption of
the message with the same key.
Symmetric and Asymmetric Encryption
• However, in asymmetric encryption two keys are required.
Asymmetric encryption uses the public key for the
encryption, and a private key is used for decryption.
Differences of Symmetric and Asymmetric Encryption
BASIS FOR
SYMMETRIC ENCRYPTION ASYMMETRIC ENCRYPTION
COMPARISON
Basic Symmetric encryption uses a single key Asymmetric encryption uses a different key
Purpose The symmetric encryption is used for The asymmetric encryption is often used for