100% found this document useful (1 vote)
185 views

CNS - 2

Uploaded by

Mahaling Preethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
185 views

CNS - 2

Uploaded by

Mahaling Preethi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 22
UNIT Symmetric Key and Asymmetric Key Ciphers ie / ioe Syllabus Symmetie Key Ciphers: Block Cisher Principle, low lock Cipher Operation, Steom Ciphers, RCA, lock Cipher Principles, DES, AES, Blowfish, RC5, IDEA, Block Cipher Ope St Asymmetric Key Ciphers: Princ iples of Public Key Cryptosystems, RSA Algorithm, Elgamal Cryptography, Diffie- Heliman Key Exchange, . Te Iea Lge ghin Knapsack Algorithm, LEARNING OBJECTIVES Introduction to Block Cipher Principles ‘Working of DES and AES Algorithms Ways of Encrypting and Decrypting Messages Using Blowfish, RCS and IDEA Algorithms Applications and Requirements of Public Key Cryptography Various Public Key Cryptographic Algorithms Like RSA, Elgamal Algorithms Se Ses 4S Exchange of Keys Using Diffie Hellman Algorithm INTRODUCTION The symmetric key cryptography is the earliest form of cryptography. It is also referred te as secret key cryptography. The encryption and decryption is done using only one key called secret key. It should be kept secret and sharing of the key among the users must be done by keeping the key to themselves. ‘Consequently, the encrypted data can only be decrypted using the same secret key used while encryption. Some of the techniques which are based on symmetric key ciphers are DES, AES, Blowfith, RCS and IDEA algorithm. Asymmetric key cryptography is also called as Public-key cryptography. It is a form of eryptography in which a user has a pair of cryptographic keys ie., @ public-key and a private key. The private-key is kept secret, whereas the public-key is distributed widely. A message or text data which is encrypted with the public-key can be decrypted only with the corresponding te-key. Some of the techniques which are based on asymmetric key ciphers are RSA, Elgamal, Diffie-Hellman key exchange and Knapsack algerithm. SPECTRUM ALL-IN-ONE JOURNEL FOR ENGINEERING STUDENTS. ‘Scanned with CamScanner _ (CRYPTOGRAPHY AND NETWORK SECURITY [JNTU-HYDERABAD PART-A SHORT QUESTIONS WITH SOLUTIONS | a, What are the design weaknesses of DES algorithm? Answer: etarars. | Dosen wanes Destin | Ronen ff en ttt oe snes een Last tee a earte doney woe ce The same output can alo be pried by carefully choosing different inputs tS box. Beteiricane wan rennremer aris miparer dete ete A 2.0 youre whe semen an haven Have Tous eT ODES a rormene newer seri} es ee ky sf He da esa oD arent td Tis ithe. eg snd taiee ns rssh al sce cme bacon os Rireiavereennreatany 3, We bet stent ef DES ao Th spe Sica fs eng L Unestos 2 kms 1 teat CorumoteDES artes ponte te vee fs neal din teats Howe | ‘sc laeap malt tenene cists ace nasal | ke tag ° DES. s6inko keghea niche feat is bce ae. Ase tafe esto ‘rd ei ein a ES cnn wa ee Fete ows sack cn tema onetime hon km pose, longs Tees yt dy sols EF okra saa te Te per ee chee wiltebe ine muses teas Deena Ge acu abe Boa o “ w i or oy ttre ctr on Tetnta te ese tnt theatre cigar i eta Seip att ceyneoea tir ny stints nenrgeig ence ste esr ~ safe ne tani dt ner re ct eae SES Gea Sn mina ies sore Be i TI Anewer ‘The sequence of each ofthe bloc weds isis = whofe pier renin foots. a between the encryption functions input for each plaintext bloc isl Th, Ue epee _ Sgusrile mpi ons ret phe al epee te eee ne Th sei ctr inthis rnd isha ce saison eer) ised senpton proces and produ es bck of ie me desea gee "opradace the fst lock of ipertetin WARNING: erence tok ACU Kp iy LAE LEGAL pope 39 unit -2_ Srmmatic Key ond Asymeetic Kay Chars [Dicuss about tectonic codebook moe owner chee sane at me opines ines tel ge ey specced ea ne erp raion ey When meager a BeGQhendne rn caso 628th nea hada a enlace nen yn amie EC mre in ede, Nt hates cin pes aes inay part he mewage nd any nut fe The ntl pete ECB at at A Fete Sram ciphers? aeewer Seren ate ‘eam cipher comers one charac eyo of pinta no achancter or ymbol of phen. Then of ge depen onthe Leyword nd the contol emuton ofthe enipherment goth. Satin hes wee bt igre Stren Enrptinn Medel “This sel eresestheenrptio soit of ream cipher Wan er sch a epping ot eplasing of exis cu dating th enotypion of ea ip thn ta ere wil have oes onthe remaing carves. Tiss bese ‘Sige ctrocter ofthe plates i enya tine, Sather canbe easly nied by the receiver and en Be emmcet GE List out the advantages of RCA agar. canner! eeanain o4 “Te two msje advantages of RCS lgertim over ther a2 follows, z 1. Rsprocesingisetemel fs 2 MsRAM wages very less 5.__Miscompatibe with ealy 802.1 ccs pois. {5 What ae te principles of public key eryptonyatoms? Anam ¢ “The pips of public ey cryponysems areas flows, [esould be simple enoegh ye so poweflto encrypt er derypta message ng keys ‘he public and privat key should be ditinct ch stone ou ot be deve rom tec “Te plies shoul ot et dele without peat ey. {GHB Compare block ciphers wilh steam ciphers Answer ¢ (tsa apr ann oeLnoe A. ae) ' A oy operates ova of pai Ienantsone it ren yt at time, eis stronger ian Mok ier ei slower than Boek eps. ost ofthe network based symmetric ceyptgtaphic erpisations do not se steam ihe Examples fs) Autoheye genre cipher (Vera pains ne Mock ites Examples ly tlowesh Jones. SPECTRUM GLLAN-OME JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner_ CRYPTOGRAPHY AND NETWORK SECURITY ( ob . Diterenaa "ate conventional and pubic Key enervpven Answer Tonia Peon rotate rel ‘Conveaional Eee 6) aust ean andasome| F On ak As only ones nua abide seed set a4 rs te epee fn cet Pps ‘912. How keys are exchangedin Die selnan sigan? The Difetidinanhy exces aF er a ih ee at Tee) enn be wed eT ie NEE SEO. “he Dvbetoha agaien yfftve cs iti ry el 1 a logan el lon unser OH A00 HIS ke and RBCS a read encotbckes ta fre an || er st deen. sien 12 | escompies Reslewtonanetasete ects bt] 3 thc ender and the esc shares enh ths publ Aduierescne, a 1 [woke sawed caoftchesicati psa] | [UNTUAHYDERABAD ay 6. | tke epregaphi alert, The pros ofthe alrite 10 a0 tg | ate dsc hein. Te dc | Ferapannentpapine top ident whose pone thins fp Lethe ig root ofp dent nein GEILE, enaipctmalp.c! mod, — ‘ede gt fray ner manda imsne rota of apr ene ice a armap whee 05/501) > Keantmee = (aed me Sint. Be lth sed ste, 8 Keay" nodp, Inds oe be wes ache eset: Ano ct enpthe meage Ling fd ‘eon ips igs oi aroma) n ono mas e t pi i 9. Explain the importance of knapaack algo. Anower ‘The inporaee of aap iin incu dy 1. helps th peaing steno alte {sto aeheve manna eli. cen 00 a ssa fous escus 10" ramber of ls (ech sk euies a leet source) 29 {hel the wr in indigo aslo igs whe te ping ona 2. Wabi helps te Wit w masini he poi asoanc:» et ours CRNA. ena Gut ABLE face LESAL pected A a UNIT-2_Syimeti Key ant yee: Kay Crs PART-B ESSAY QUESTIONS WITH SOLUTIONS 2.1 SYMMETRIC KEY CIPHERS 2.1.1 Block Cipher Principles, DES,AES, Blowfish * Catt, Explain block cipher design principles. oe ‘Teer thee ctl apecs ef ck ip deg, ich ae allows, 4, Naember of Rounds ‘he hshr timber of uns he ight eae soy opel eats xen elie A ie, Gel sand eh ths spect atte hoo mba a “ot tequre xref an asi tlc hy aha SIDES Thisspectis deste beanie ace ea ‘iterating varios iene 2. Dosgn of FenctonF ong Oto ign, OHO ‘Faction Fist heat of ese okie and mot wes Sones pro ) Nowtinseiyia + Oneof the main finns fection Fis w make cepts fics pss some kind fenfson in Festel ep heredy making it SHC rstheasunlicar ar publetctse, te mere eine i Sret Avabnche Cero SAC) Alerts ms poses poo Aare proper, one ito nutistuagdihen At rings ute ta out SACs tasdon ths property 358s Dat an cop” f an bo shold ake witha Fook sean ips one sl vac A emer ia 18 can abo be appli © Freamply Bi Independence Criterion (BIC) ‘Thisereistaes thatthe out sand’ muse independat ofeach er and she change indent ‘when an niu npat sive forall be ale sy : 14 Key Schedule Algorithm ‘Akey isdn crate singles for eve sound with an Fest Mock itr Generally, ubeys ar cowen nde {Sines the comple of dedi fn dil ley ant athe cope of opertingbsk othe man ey: Bat tone ofthe gc pres forth en aiaonced et ‘GIB, Whatie the importance of studying Festel cipher? Answer: Inportane of Studying Fete ip his impoot wo tly Fleer becuse al he ant wed ymmei grits areas onthe susie of ese bk bet Example. Blows DES, RCS, SDES,CAST:28 et: samarium iia ine Tani ee rec a apd hl ote at ef a aed wih i le ptt nae Not eco SEC i a cadre tatoo om sein te et ses npeposin bengal fenton fom an puto the net oie extn. F SPECTRUM ALLIN-ONE JOURNAL FOR ENGINEERING STUDENTS doe so by voce wy Scanned with CamScanner forts sions, Te Flowing rests “8 ee th a > a a5 SSSR Rs Ee = caveroonarny ANO NETWORK SECURITY ONTUNTDETIRY ~ I {Q16. Describe Fister cipersrstre mia neat Answer: visu Fed dngrtota bic asin ch el AEE ST Neshemosti 20s ee ae emo pe ca Nahr ina aby 80 | Fae ence! 4nd Bone ici ets {ng and br cri eet = ene exh te Eixpnncdna kms ria ty genni nn fo yk | “Atfinu tet arriba sats och lth itt and Xo, | etic cen es ud St a, Sunes blast cago ke DES, Re fiction Sek ha of he latest. Re a remain, operation i peor ASA Ow Pract, Tho ee A aca. 200) Tihs | na BB) - Ko kok Keke Ka KERB Decryption The poses of of plaintext. Thesab hse Se ete int ound Ts Foe provided spat instead raion sroided as hey K, forte sata he enayption oes. While dsogeine SRSA a eee and Yk encryption sso 3 ns si a a wl ub ey Kf ast roun of sin fo erp. Toten is ao tue wr 2_ Semi Key adhere oy ice oro a anime nrtan Sa Peay stints ire otc es pga tg ea eat Fone eree ots enough to make at eatonship between the statistics of cipberiat and valve of the ene should Be cindy nna nna ei ee Shetty ements ws Ese, a siple linear substitution function can be used to METEONE confusion. rain ea EE ects arb te oR, - am ane process ied gam wa ane i Jota aes fewnefegber=t te eps “ pccaniionen reget eros ta es a ‘camer algorithm uses two diferent cipbers that can be implemented _atienatvely, In ber words, the C89) week but _cooplermentary ciphers sul Time secure algo in a vcore called 3 pout St ‘DES alocdm week on locks of dts y ding» dat bok int wobec: WSR chat aftheBak se peal tally in DES algrith,dvision x ta sch ht genes ls 2 rans Bethe Some et pended on 64s SOB ning cea sichat 1-2 cs so seercary ay wl inst neh. SaaS Sa fap Goa wc fet 9 Del TAPS o si, eftalfan reetaton expan a Su i (9) Conbine bei (0) Combine the ig al ie al © “The nw ht ais the esl f se cmbiaos (Thc OM a becomes th new ea (Gy Tey pte oie and at ew sh st th il sri Tefal [re] 32s 3 iat ound of dec. This proces des GAT Whats the aference Between ais Answer : The 1. Dittaion jon of new al jon and contusion? ot ol he ern os ng lacks at ewe ate coesin a stsiealy more COMES 6; ing the statistical rote 1 iftsion ees med cach ofthe atest Sis at may ips valves This eps in dap ig asc by aay pie ta oe ange sinc of he cpr. Ths sh np ancraging operation to cry 2 SSeS ohare. Me 2 Emon Otod28) Where Ik Suveessve fetes to ba t sen LEGAL recedes Scanned with CamScanner oe <_e— 1URITY (INTUHYDERY "eta Em ‘orveTocaapnry ano NETWORK SECURITY [ RAB Mrs spi ‘ {nea seemed so as epund cack ht a dt ook > rome hearin w Me "stig sinner, inane AS : SI Pep or caming ou pomutson xpi Ct 45 LUNIT-2_ Syme Ky ant Aaya Ky phos [ats Cohen Tre pre wo ex Row O 12 5 Ts ‘ np wens 9? wenuss sno 730 niwwo wan os aid baum au2bt He runo si ous 3 wis aad Tomato seco rmabar legal bs 1 4 Te prowice longer resus tat can be compoessed at The perm veep peau sona i The fitz a Bae pe, whereas th eit ean can be iti Tok, Thi table eee. 10 wish ues Pol ng, vanes gaan the ase om ft i movement oh, Te Pesiaton ef is ty, AS he Sane SG eau aca rest 18 - TT = 6 7 * 7 ae ee ere a wf 1 ws] 6 i Ta | is | 6 120, | 2 | 2325 Minow | o et a fats 7 Tae ts Peat} cosa | 33 [34 | 3837 feasweas| 73 fsorpae amp eet eee DL ae Te Pets puns pmmn pepe baba gh anti pti ea Fig: Poen ot PemetinEgaion | ey Trane pert ie srsiesd to S6 thy by Badin ry it of he hey. This he ten i ito wo 2 fan eee es aes ae se oe tt a ceri unk of gt api combi get aa ee Seco rants wd ding ce Te 48 thy i combines wid expand ih RN Scie Tero om ts aston noes to SN.es. + ashe pom hone bias need conc eosin bene hehe andthe bert Mk “was elpat iol ats mW ash of pt bi | oe ra at i et hones hf ih asi of aes A A, A | Ay aed apm sce ong wih bef ue se a EASRQUU din sea bapa Sn, | Sorpacs tab, A- AA eA abe a clive oma ety tr, Ts | bina arin seve in i iin ea Te ee aa geunostnch whem at tony aa, nthe Sol agg on 152 ad eat | ‘Gomi iniay fam 0101 en P= 113 a= 0100 8 Thi mpi at tes ematon Stamina dumm beeper Th abe 10 aed WARNING: xovePsceyg ston s CRNA. Many HLUBLE LEGAL pts | 1 ° 812.6 10 3 L ua nn us 7 5 B ones Fieve OES “There fom Snes ae move Phew a 32 bis re puta hy promi sai posta. The falonng tle fine = Brees te poston which bisa moved SPECTRUM ALLAN-ONE JOURNGL FOR ENGINEERING STUDENTS Scanned with CamScanner I conver "eh = igh bal feta emo i | Dac opetth ey) : See " ae Fe stg ia ota anys yer et a | eee a OTS Fret lla eae eatecmrnn wr «and decryption of data using 2 single algorithn 18 very help. for rmplementatioa of DES hardware and software. a smeowe } OTN sean remote ct 2 fueapart reves 3 tiecrng otter | 1 genta oa te sk opt | 2 Ieerenes os of ambigiy the initia ad iat py, | DES algont performs a final permutation ‘ermuitete dats Hck ar Heaton ad pert fe ‘Runde. The al perucsion consul av at vee of | 20. Explain the strength and weaknesses of Dj | Ital pereutation which shown nthe ble bel Tig | Strength of DES The srength of DES ismostlybasedupon the flowing two fst. 1. Use ofeboves 2 Key length Use ofe-bores Crpianayss ofthe DES algorithms possible ony \wedkneee of boxes used nema dutiog teratone However the atempls made 1 find the weaknes f ‘Hhowes were not succeded tl date Key Length» DES wes 6 bts he length on which rate force atk issubjctedo flue. Assume that alfoF the key spe ‘ns to be searched, then o Break the cipher, a mache performing one DES encryption er microsecond woul fequire thousands of yer. tbe bewte force isthe oy atsck that can be made ce an encryption algoriti then such an atack can be opposed iz 219. Explain DES algorithm with suitable examples. Discuss its advantages and limitations. Answer: Map R89. OMe) The decryption algerie is similar tthe encryption lgorithon with a difernce Ut the heys ae wed fa tee ‘der. This ncans, if encryption ender ofthe hess ate KKK, won Aig the a ery ple 8 Ke Kyo Ki, TBS, the sami algorithm works for both enenyption aed decryption shied te a sing longer hes. The selection ofthe Ley size can bedoney | Sut ee aoe cay | Setsbeting EFF cracer a basis for esination. The Ba, hs the key, he longer willbe the time takes to bea oe ee AD | eke te nger wil etme takes wreak he DES WARNING: xeroxProicenyng ot took 9 CRNA st Anyone oud putt LABLE lo lce LEGAL proceedings _ aa. sanvor avo NETWORK SECURITY INTUHYDERA Rg anarnr Ano " o = 11.2. Symi Koy and hayrmetec Koy Gohers ). = Alerihn in enna i 2 Dege weatnwes Complete lt wegen bathe ete scr probe Ha menage Premed uieg iene AZC= Dest x0 ben de comementofeneryptedrnerige .fige sen othe encryption fcomplonced ence IESDES (“owe sh iste ccmplonent a * sa DES, te intel Ky is taken done into two equal tcl a eeeeleee tran ete Eipcincinsacacmgeitrantirae Bip tacmacenr Sica lea tara 7 copelindnie one etme Cet nae eee eeaccen role cee oerc Etienne yoni tne (ans mont aoe soe ay See ne le ag me Tjomete mene nareatees eran Roy ctavetg Aisne wc Saco id psf canon pica pmameacpan es _rseraton of keri plan ext fom cipher eat with fre [Srurotire cles ofthe DES alvin ducts com (221, Explain in Brot about double and tiple DES. Answer t Double DES _Douhle DES algoridim is wsedo overcome the problem ‘of single DES whete in hey length sfned to $6 be The goths encrypts the data with two keys K, and Kad cary ‘we eneryptions. First tenerypts the message With, 'm) then performs second encryption on this encrypted smessige with hey C= BAK, BAK, m) Shitalepurefdodekne ae Sasdskepreanb oped Fhinext Py ant pera C, fer ergo an dre. To Ecoicabeplomenruetsascmtsrmpacarest ‘hoiy dotnet ar be toch Tune DES ie wed to improve the security of DES sleet geil cote poe Rete (Fasteners the message wit ey K, BKm “The perfrms encryption wih ey Kon teeny FiK AK, m) [Apin ery the message wth ey Kb C= BK, UK, 1K) ower, this isan incorret stay of performing ncption so salvar ir ane ia ile DES te ng two hes UK) stead of Uae heys for encryption i the (Borer the messae with hey Ki AUK) (@_Thendcryptte nenpled meng whey Dik, BAK.) ‘Ags encrypts withthe fist key C= BK DUK BK) - “Teron this med quite diel beak andao provides significant stengh by wang a hey length of RD bis (G22. Explain the AES algorithm (ost Paper aX} May 14H. 0) “ «i wy the peop RES gob Standards and Technology). Rijadaol was developed ty two eyplogrpher Dr Jenn Dut a Dr Yaa Fine, AES was mean fo opace D'S (Dal Energion Siac because Miwa inca woh seco soft iolemenstens Various evasion ita er eed by NIST select te prod AES alin, Ril ass Ble oer dae by NIST — [SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS. Scanned with CamScanner Pe te [UNTU-HYDERABAD) ai ceverocnar No HEMORKSED ee at ne epee eNO tng masa A cach Se Ne gone moma of fout BYTES E2EH. So, = Sane fe Benn chino iene a aed eeuireeet eaten | | Geeel ed a Cea] | Sa ert Fig: new of ES Ain WARK: xecx Prose be ACUI et Aye only LAR LEGAL proceed Be rr uit 2 SPITE KEY ed dayne ay Sent NES Lalit DES (at we Fev tes inevery round) AES wis epee rounds whee och an eatin an eee runs whe 4 pense ted le ney cd ae {AfS moles The 12 they ised wo form an ama fay fur weds where cach wont 32 bes long-An aay Ise rersesthe hy Ee ds dt weds 38) Abs nas ot ile ge amin which oe ws perme nd he remaining res we eso (o) TyteSebttaton er Stes edo perme so ofthe sk (0) Shingo Rowe "involves sine permuatin that an be performed ia row-wie fashions Musing Coton Stal ies na pan wah ia nen saa finn of (Ais Ronns Key |Abiwie NOR operation teucen he esa Hock nds por of an exude yi pcos AES sacri very sng. The cipher eas wh add ound ge ncpption and derption, fone ‘he ound of fou tap eachand thes sth wu fie ee F ‘Thekey fused nly inthe add round bey ae. Du oth te cipher begins and nds with nad ond stage lg with some sei Wothrapes ate lied th begimingo en, hen they ca be reversed without equing th key. ‘neal thy ag pies snc it egy ene en pri ema icmhinge bce sea reese ou er ee TimcTastic cara ascpeteat eo ops of SO pon fs Ua abst meg Sactha'y Hom enone Te a ie saps Se a tin et ci tnt decyl peo AES nee acon ent egret fom ran on ‘Rettman ofAtand sage besos way Sok wie Adtooe © Alnd hy Blk=Rik Inf ek pn a di vent ob er ting i inne xu tt ein dst i Se bc cnt of a ays ie Sscyeseet par esccneesnd csp 10. ‘The lato of toh encryption and dsrypion ste Sates which ensure ht he ips et i eerie ‘a, Explain substitute byes transformation. Answer: Subst Byes Transformation “Te subst yes tafemstons ae tsa lst int wo types. They 6) (©) Forward subsite byte transformation (inverse subatiaeyte eansformation, (Forward Substute Byte Tramformation nica simple ble lookup whichis ao known Subs. SPECTROM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS i3 Scanned with CamScanner ——— 3 So |-HYDERABAD| JecunITY (UNTU-HY 0 crverocrann AND NETWORK SECURE z igre Sexo Sante Be Tansee IEEE EPP Ee fe eer Jes on fo eo BN Sd a fo ropes ee br feed [ASP fr fP r fs fo fos ox or ez fof few fr sa} a0] <2] Po fren [sm onc P| is rpm foo] [Fs [ac] se] efor] mes] fe 20 6] fa frees Joe ace fooler [xara 7 rf [| =f Fee Fo Jos fe os fo © fears fs Jo fo [>| F foclarfe oo far eo fos Jose [7 J [Else [2S = Dp Jno) [an qn fale Table Ser In this transtomaton, te AES defines 1616 mai consisting oftye vals, Ths matin ao refred to aS-bu that inti cons 3 pemmataton of 256 ht vals, Iemaps every single bt f sel ew hte inthe flowing ssn (0) Thebes be ft seemed a oa a he hi of Be a xem i ‘considered as a column valve, os ™ (i) Botheow ad ola values topetr acta indene tothe Sto hus Bep in sling a nique S-bioutptvale WARNING: secxPrcacnying cocks ACRMENAL at Aoyon un guy a UAB ec LEGAL pong ynit-2 SITU ae Rayne Key ors ion Co ee aft alec ae [8 inne row 9 actu ofthe Sos. Sse un $ asso AL the vale [05] wall Ne mapped aoe 2A Now, t@anderstan the concep of heaton conse the fllowie _ahe coirston ofthe S-bo is shown Bel eres ffm Fig Conptatin et Bt ato elo Sex ‘The toxin italzed wiht alc rom by row nth ascending oder uth that te ft row nts (0D), (01, 0 {02} nlOF Jobe second ow incase (10) [11] aadso ca Therefore stow j and ola the val of ay lbs bal iy Now every byte inthe S-box is mapped is mative inverse in be itl OF (i) Assume tat every bye in the Sox cous Sis which re dented a (BB, Bp Be By By By By) Tete 60 ‘pipe tans formation every nvidal ,e flowing re obi ~@) 2B, OB 9449 Byaneat Big mir Byori na 2S, “The above tacformton nthe marc or can ke epeeseed as, lef frre i, tn the marx mupication of tis tansfomato, every met inthe product mie isthe Bt wise NOR of oct. ef lements of ner ad oe cau, SPECTRUM ALLAN-ONE JOURNAL FOR ENGINEERING STUDENTS. Scanned with CamScanner | yut.2_ SAREE Ke ond eye Ky Cates 2 82 (Taverns Son CRYPTOGRAPHY AND NETWORK SECURITY (JNTU-HYDERABAg| Thc, Stbstitute Byte Transformation ry OPE Of trans al exons Restatement sinc os pense rimeet Shou mene ieee armen Tanah msc ctl es, Showntel, The above matin ceil y costing te nen Ba Watesboat ine folowina. {) Shift rows wansfomation {iy Mix colar transformation (i) AdaRoundiey vanstornation. (Shi Rows Tantra Shiota ctnied it fra a foward shite sat, sof te emt is pvr fr taro De ea hi is perfored ‘etlrmad Tas pe effete abo owns Sit Row. Ur Pwr wanfomaton th cea kts eed for cachet st ito wasfration and inverse shi 0 tansfomation unpedwhereafrthseend ON ye cele shit ee imi fr be fot ow. ye cic ef hit nike fora tf ow taster shit deve mms along witha 1 cacaar hsb ———— © econ to embraces am neon min ee cawulsoear aan ies on ie sy gs selfs Se Sie os 0101 O25. Su Sasa] [sitsit sits \tetrepetc tintin ems peo neni na eeraa oe aaah ae pwi be tonne ma moe : cana aae weecieses Jt o v¢ oalsin sa Ss" oo ule em 0 of anstoratoncante dit pe su Sis SU deo prove tht ution 2) ener of eu (1) we eed prove the NBs, Jo 0B aD 09 f02 a3 01 Ob Su» Su Sis So} [50 Sur Sex So} Joy 0 08 oD ]or 02 03 0115 Ss Siz Sa] |S Sis Sz $3} Ja 09 0€ B01 01 02 03) Sy Su Sex Sin} |Sia Ser Sia Sa Jap 0D ©) oF Jes of OF @2]5yo 5, Ss Ss} [Se Si Siz Si [oe 0 00 v9 Jer 03.01 ot] [1 0 00} 1 o€ of ap}or o2 03 01| Jo 1 0 = |p o9 o& oa}o1 ot a2 o|"[o.0 1 0° fos oD 0 o€fos 01 61 o2| 0001 “he shove enka mati indicates that he rout of nee tafomatin mats a forward tanafirmaton mas gots ey mat ample Sa(63 0 CD Frheboky _, Prpsrojs beteraaicy — palspal Repciaps] §— EDSLAehd S te ihr iept adopt teat ‘This ransemsine isa wll uit pec case mon te sae at abo ‘as amarty oo yt clan There, poi exe he etl yes of be plea replied oe fet colunn of ee. Apples fund esto ses i clue By oleae. This pe of teasformation she sures hat he bytes fone coi endo ter fret ol Example ope aE [s7]F3 appr] —> [7 ]r2 ob] Fig: Shit ows Tmsrmaton Seen Aa cn Fire Mi Camas Tuaslrmaten oat seciton oye ofeach ner coin ‘om combining mia clu wapfonmtin with shi sow ans ietacluesr more dtu wes compared coucd nis tantomaton approach, de igenention coos ‘rrwad scl nsf. (i) AdaRoundhey Tossormation “Toe Adtkoundhy wasfrmation sony eeprzl no to pes Thy a, (6) Forward sd oud key wssfrmaion (6) verse addon hey transfomation “SPECTRUM ALLIH-ONE JOURNAL FOR ENGINEERING STODENTS Scanned with CamScanner CRYPTOGRAPHY Forward Ada Rownd Key Warman nts tanformaon the NOR opeaion ketone ith 128 sof sate and 128 Bf ars ty TA eastern ‘ a sep as clan wn between ¢ yee wegen ano woe madi. (0) tnvere Aes Rownd Key Tramformation “Thictranrmstin snr te raed ey wanermaton she NOR crete 8.088 tovene. The add oan he easton no 2d ‘whens period th smpntea bens ofse Example esomnine oho eS EN susan Beresie aEae _nee Eee CS as Enomerate[ndetall about the steps in Blow Fah algortnm angexpiain the process ofeach Found arestdisgram — etARi0.CS on spain blows algortan ones |: on ' ‘wit apeatapremessteinhow enenyption and { eeypton are done using Blowfish algorithm. fttonumbreftixis fa pe ney has key eg of 688 Mk se ede spo a key kgs open 488 Bs. The prion ws lage Pendent snes beeen ceed ng Hod es Sper Therefor. he Mom fe fee eee ‘ein voftareueidnow Use DES sa IEA. te Blush ‘sarong’ and fase tests pce sedan el rine mend Abo, iavasbe Bela tree |ANO NETWORK SECURITY {JNTU-HYDERABAg Thonn French se rons ote Bt ie to 60 by, oe Steeda mmc E208 RE, Tee area Terao hm ad ech ud fap Tend hm ai “) 1 an ope manne tbe ad te ble Seachicereit mona sre nates i find a Hak MS SEIS, rer faethe for af tip ef nce a etoS e IONES ident he wurde LE and RE dete the behets then he agoritinisdetingd ito 16> Ae we OPS De = ARE} @ RE; > BLOCKY LER, OP, Reo lk, 8 ‘The Kesh eiphren i fint ded it 0 ha 1 ant BD, ech of aie SDB. Ther a show 16 rin, ‘eeblgntinandinach oud bho ae wed ine Soe fe nau tote fi abbey te for Pop con nthe oud te sb 8 NOR with 7 roe RD aed AD, NORGE wih FTRD| to proce de FetcctonFissameas deine inthe Mosh encrypt cots eFunds od LD a BD, dnote he ea | tines ote amex te he slot dined a, feted RD,=WD,, Py. 1 =FRD] © RD, > BLOCK? 1D, #80, 9 Fi RDp= 1D, & P: Key Espasion i Bowfich tn BlowSh soi, the encryption and desrypi| proces require 18 sub hops which ae drive for | Uripmabey ofa 488i The wibheys pert are of {espe The woarayssedinhisexpunsion ae hey {esata box box) any ©) Keyan Remain 18 ub hos. PP, Wht st WARDUNG: ecrPrcoccyg ets a ARMIN he ody LBL oe LEGAL pce a=. each ab ey 3, pu. Asay Chan oe Ar nei sn 5. 55 ee ipo t 32D These even cay 84 eme ete af, case ame sae S08 Sfmt re sesinsoled inte proces okey genrtin ate nto tate fst ep. the hey ay andthe ow Ste are Buntved wibbowdscnaldipisag 02200088 pao tsaH Abe sinte K-0-on0734 sonoyotinieptims et ao ogd Maihtelgam (ieee sre kpanic pees ene Stegall @ethig any (ieee ok or Ebner he eth tem se ald Tafaceanteigaiey neon ‘Tene key geecrtel fom the previous neparetscd Fevenergying stig contin al ees (00 00000 0500000), 4. Thekeyaray als and ocr om ste 3 4. Tht cry of sep 3 is enced wing the new key my ales 6 Thekeyaray values and Kare retce with pat ener rom te 5 a 4. Thispocesitepested ill he key ary aloes ant then all bores re replaced wi vaning oa. Att of 521 erations re requed nade produce webtess epceg wah ou 35 ‘Gis, AES consiats of four fonctions ine ayers ‘Which of the funetions are primary for con fusion and which are peimari for eitfusion? “nich athe ayers aor confusion and which {efor athlon? Josily your answers. ‘Thetis yer of AES me 1. ica mining er 2. Nentinar ine 3. Keyan lye “The fnctions sect with hve tre bra, byes Stitow MaColans AddRowndiey Fencton Used fr Cosfoion ‘The fnew cefision in AES ae Bye sed aaitouniiey 2. AddRoanakey Fer arower refer Unit , 2 Function Used fr Diesions| “Thefts wed fr iision a AES ae ShifRow sed incotonn. 1. Soto ‘For answer refer Unit, Q249, 2. MixCotema Foranower refer Us, 246. Layer Used for Contain “Te liners we for consonance and ical gg These ere lend ERT Pease Meares = ‘voles complexities in describing the relationship exist she Zt ] ino pen anderen am oa a sete tain esr reece manele onan = eae Te TERT] «| Parameters ot FeltelCiper Figo: Geneon of Sub bes “The parce of eel ihe ae 8 low, SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner CRYPTOGRAPHY AND NETWORK SECURITY [JNTU-HYDERABAD) oF the Mock Tm eth metic = Cai ee et ne thal mm Teseiy mote ink sie iinet, ere analiobincrnd ying ys ges la way ort TEARS aes teptfenpn aloe asa sen mabe ESL “Pe huss of the algrtn asin tors aac ane aes cof. Ines ey Hae CE ay found tobe inst Hence, 128 His ae mol ree 3 Number of Rounds Acie bsnl arachnoid ede "ous tun ebro a eo see 4. Abort fr Sb ey Generation = , sofenpnsbn ome om “Te poesof eating se acd S ba henna ni, ‘sate ie a. Sound nctonF anes cession Ht cole en ait Be se oan fan te atin teste doco i on 5 Soyunn shel cys ce ening natin Comeratoe Fat por “Tecessono telat a 5 ws, 1. taser Ergon Der pono State Tnncoetbe eset ofthe athe acs eft ite bitin he teins (iy sa Siete apementenevbngnse Ae ere apo tha Be eectin ef Spot mn eto 2. Rneatatasi ‘scone with coef mig the let en aa, i ad th he poe of TSUNA Spanichwittenadcatr Avorn, prea ane sas Hower Ds apn cyto ne ican 2.1.2. RCS.IDEA (28, Explain he proces of enryton and decryption in RCS alps. ResExenpton sap ‘The fandamenlepeton thal se wen RSs enero pes, 1. Adon 1 pers madle1 nsds ant te y+ whe 2 Mine Excuse OR: hissy & - Auten Ratan: pions cc tinea cet sy mov tthe ity is and indent << | ‘The aint f si 2 bs i fi Sale no les ah of sie w is andi seed ina Biss especie Lets dees th rou and LE, a RE, ss eh an hae fe ts er onlin ond he some ten LE, an RE, arte Kt lbs fe data te et ofthe ond Ths LE and RE, conn te tan np hahes othe cp ose 3 Ses WARNING: serouPcsyg ti tok NCRRENL a ya iy LBL LEAL pce 2. Symi Koy and Rsrnti Key ers mG wt so—| sa ot i . k es so a) igre: repn Poe CS ews frist ie sow, { 1440, RE B+ SIN ‘ | fet Lord LE (LE, ORE, << LDIELD newer + tn) ey, i>? HD, 98RD. RCS ago sel 2 ete rac) 0 Fae Det oS The we ofthisalgnt mak deca ed ikea ype capes, ce he aoe ae gen ‘healt ofthe ts oie ele, WARING: xcerescpy ttn BINA Fyn BLARE ae LEGAL cee cence. ‘The desin gol of IDEA alot ae ssid a> wo lent ous sch ay that ono al se mal epee stent odie ew ne eed be impemenaton 1 Cxypeeraphie Strength ‘The fllming he pals of IDEA slain ht ae od Be cOpOpNE eng, fy) Moekensth ‘The stsicamsscanke madecompec by making {etre ngloegcnoph shat he cponet ens tensed even ew leks repeat enseles and Seat mee oen when erated es "Ts, ts ahangzou haves longer bee gh ‘ichint incense compen enplemcning else narypton fain xpnenty. ay een In oder prevent he exkative hey sachs te Asleng mat be made loge noah. A the IDEA ‘Sim se 12th lene Mapes tbe see inte ures well we ‘he gece ipheent mt dpe on the plas ts well sen the ey nich mates yey compen, ‘Te, te objet of comping the mista noc rts opponent steht sates {tthe cphenet depend onthe sists aes. IDEA eines ier iret opertns nde bbasicvediggal 6) Dison ach ofthe pitest is ln wide invita hey is shoul fet every eet ic The sisi rte ofthe let ths iden Deas of be ‘preding oat he single pliteat Bove mule ‘Spheeatis. Ths sess DEA ui eset Implementation Consiteation IDEA is design in uch a way that Bis ees staan trdat plementation. The hardare ‘eplentatin died kelp seed The aps ‘fnew iy 2d ow-os, (6) Useet simple Opertin “he options he iy dion te wo prota thor erations en. Th eee ‘sated yall te tai dene ee ‘Themulistesioa modes) bere afl tee prs ene tap ee at ‘ang sip pena opeins @ 4 Mardace plementation Dogs Rips ea tnsnremcta deri (Silty of kaerypton and Decryption ‘Tetequreneitsotavem grin tenes ts vek area into exnptng or dpg ae inematon, st y wing ile bey Sate ee Soa std sane eeepc al eens DES. Three lll DEA ck (0) Rega siracue Teese ofte terme berg an nde inert Visto er ence, to tai aaa bling Hs we wal conc IDEA which epee mal te sn the proces of encryption and eer. tion in DEA algo, teary cc) oR Describe the encryption process in DEA algo. situ tha eat sete, Answer: rota 98 20) ‘The pt a9 IDEA arin i 6 Sk of, pintetand EEK Ley at psn Bak ‘Spee sui. Ts exten aden DEA "Sesame bet hy deel hey exuason Fundamental Operation wed a DEA. ‘Thee aie fame esos at a wl IDEA. They a, 1. Biwi Exe OR (8) 2 Sth Moti AC) 3. Si Molto ai (© [SPECTRUM GLLIN-ONE JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner 0. Eschof ih above pears maps TN pater fetoa single 6p Tnasbon tdi cvhel hem ae ‘eves andthislpe DL Atonuntacwanh Theory ‘Adi and Makin operations ae shy oil to fe wd IDEA. This sd Beane the eat a toe aNd ‘hey cao bays protice a Tere 1. Bite Haetnine OR (®) [Nomraticaton ae doe ta his peaton a si ‘ets in he oninay way. ede fo a vere onside at U8 T "2 TY ad Zane wes Y© Zio cba. 38 Yoon soma nese wi © © Revere HEN Y= Zhen fin Yh 2 of Zand Vateknown ten 2 (-D Ene. Modited Muipts Operton (©) © Medea: Fah. a524u rout cult and tha muni ac when ded 21 4 Reverse: Mipcom nnd 2*+ Lene, Revue ay ar eee and?" hava Ioenc A such at miles fy 8 wil do subir Eaample JENS Y= Zen id YS i.e. mod 2"6 Tan hen ‘vor 20 7a eX | Key Espason Aspe 12h hey sed IDEA as inp Tis ey then capil shes KR se Te Cah “The key ean fr IDEA cc an dro bt “Togenee 52 encypton ys inan IDEA cxeyton, iniay 126i hey then nd chopped fom ek ea time afler Ie ts eacs cit Teh Ls. Scie KTS TSR ISX [® [6 Toperertcnentigthys ated chop gin ‘och time afte Hecht When ol rx or he Kes. sap tapo the pine a show CRYPTOGRAPHY ANO NETWORK SECURITY [JNTU:HYDERABAD) | yf-2 Tit sevens] el Rowheeieks gots Fgre0eastcte Single Round in IDEA IDEA consis att of 17 rounebicharearangdig shaming hatexchoddnunkered ound Home, ‘es-eumbered ound: The inputs foreach ound ferms 6, scm hat tested four Ti pte and eds XXX on8, Aterperfrmingthemhenatia operation ‘BC ea are sow Ny, an X, Four bey oe wd in an found tw Ky A Ka Kao hye ae wed in an ‘Sen und eK and Ths at ol ound conti apt ap an and a heysas KA, K and Hower, ‘Set nd oma apt 8, A A a and wes heyy Kank, eps Ai and Tas, New, a produedby pfrming 248K, * Ne. rade hy pefoming 1+, New, spr by pefoming. +, New Xs re by pefrming. 1,8 K, Weanbe shown diagrammatically a, as KK Kad K, 128 key 16s outs, BS xX ON T CI © a | 3 Ho Purhcmore, ogee et ih a fom ‘5150 and perform he chopping a dee preven, Coie he ees of fein 28 Han then chopping tei al he S2leysare gtertad 3 WARNING: wouPronygel stokes CRMINA et oyna uty 4 LADLE LEGAL proceed. fa syne Key 20 AS key gy “rene he APOE Opa, 148,86 y peroring, Gee HO, 1260.4, (mad 29), Dut solace by petri, eek, ‘ut solace by psfoming, WK, DUA spose by ptfrmig. ¥ pen OK;"485 00810 (na 251), sre a eX Xanliuek "pei XA ue Kd hey te ina 812 pe en sin jms ov hls eat an st ia KS Ya Z Ya 2 ta ak tee A ad sitions coo T0082, 17,04, ZoneX, opooice Fant, hrowgh mangle in Fen(K,OT)+2) 9, ZB ON) Na ‘Toprdes new yy aX, Kerk A O2 newXea O1 @ @ @ 7 ve ra el ae oe aera nS x OS By gr: Eves Raed ith “Ter isn nent revere the shone eins, 5 ste cyen undies nese. This meat EW, diya gen he oly X and, ar pode wig ‘bene Ky and Keach ie ey ae fd tan even rod, ‘Ts tapes becaoe te ouput f the mage fast Ya fiz, do aot change even the np changed om off new we et Mee X te tisiep apa aap MNewd 107, um ipa 6, Ours, -ten NY, Op, 07 )67, op, = “Wis ings, Xp ed. Sn om el ee tS tren y ping tne gen, ADEA Decryption The dept aes fe state pe Ke apanon ASIDEA dentin einen ete wel Ht rand ef EA iene fees teat ad eae ee Teles wel neni ke ‘rod Ths he fi edtnaad veka ‘the inverses ofkeys Ky AK, and K. ee mene othe, “Maiev none, Inverse oF he, * Inver DAs, iene Alanine K, Ade iene of verify, = Map vnc Asn hn ands oan iene, ekg a at iret Tha else penal apne peeweivene ae 2.1.3 Block Cipher Operation, Stream Ciphers, Red x2, Describe the terms information secur ‘computer security and network secu Answers formation Sect, leat seri wits ote pc ft ha rina fener wa Se Blowin eghinste wes to eh a es pes ‘ariel aces se, eu aban agen a he eat ely des wth he oe. py ok abhi readosoleewustleemoltedia “To males changes in he nforeaton sey syle scar Hebe Beabasemein etre oso egupen, ena be te ae nay oxpzton nas prov eter by sal ty dintatve meas Azan fps iy ‘Sage of raggl ling oie ag we Be pope es Tac fr peering este dunes. A cu of feast apgsach per eg NE eloyed daring crest es Kodo Aone yA a, “SPECTRUM ALLIN-ONE JOURNGL FOR ENINERNG STUDEATS scanned with CamScanner ‘ cavProcRAPA ANO NETWORK SECURTYINTUMYDERABAD) |» gyn honky cer ’ Computer Sent ssc hire operation fF ‘Weft th ranch ofc senec tds hc aration serait Accs wit abamemens mest scene, tegen pot an scorn sat wl ion Toots ab aad ols bevels Ths pe sc far pea eas fae ah DUELS Toc wher fencing wie ret oft ox etesting data eyeing Shes fon, cen the as cae ops Neoworh eceiy nthe nctoohinfastatt slg with te ato hiss reer can untried aces TS ie ih he {ee tanamiting dt twee 0 NP eva the dats posesing etme, ‘Neo seu feet pla or atangements ma caplet) tees dansratr fr ett teeth a ‘canine ofdnibtedsyscms, nett nd ares commmacstion fie tebvtwecn stem wand amar The cone nk somewhat TINE any anatomy tenenesed wah atu 1033, List and explain ferent block cipher modes of operations Anawer Mottin ey Modes f Operations ‘The dee mes 1 Ciphers Ching (CBC iar Fedtk (CFB) oprah 5. Bons Code BOoKKECB) 4. OapatFesnak 01) 5. GomexieTR 1. phe Blak Chaining (CHC) Thesegaoncofexhofte pnt Nock ae gisssin te famafa chin. Inaditiontodat tereis elatirhip ence eis sia exami lok an eae tock sel, Ths, te epesting 1-4 tes Seeker — nerytion Process Tenth of pet? NORGS wih sition Vaan then ase truth enryption agen a ‘race efsbck fearon Then hc emaing cso ipretsate rdacedby NORig Ye revise: ide ereyeing atextand pasing thes ugh ab esr lr. jos ire ery rca er CC Made “Te encpvion ace ca be ern, (ie C=BKIC en) a ‘Where, Coach sips © ~Fachive OR operation 241) Encryption of pits wing hy WARNING: xecePrseng tem CRUNAL ot Arjen yy UAOLE es LEGAL pocnsegs PRES 6 con in sc af bent re fr tac of ithe C; paved hough he dyin slit den KOR wit a HV (tain terepecne dared igure: bergen Process nC ode he sera the receiver mast aow th itshaton Vector (1) tenet or dt ft e iain Vesa (IV) to net fet Voki cqetenet Teka ae matescor el Dae be take dang ide renee se tet tte ie wie at hng eed bf i nk ope a wd aes Ths ses id ew, 7 ese ation (0), DG) DAG =WOR, Poweni tor, B{C)=Deeptio of etarest et i] deotesthe ito e648 gant X ea PIN @ DCL “Aglpng NOK popes, nur enureneyta ner, the pine neato dst bit cnplementton, The bore ntton ents tht if tinue cages 1 is este conepenaing Ps on ese siden abe canes. abate o llowing arth advantages of CBC, (9 (BC male canbe edo fr akevng covet nautica coc made ovis opt cup warts eg ress tat xc he se of tis Ts bm fe teen ed CBC 4. Ginher Feedback (CFB) Inca of Hock sips igs (DES scheme), steam ihe teagan cmp a ovis oy att {i Paling ofthe message st ued — (i) eanperormreltine operations. The cater vets cipher canbe wed ans each emt ctr nmi, es cant sve ining sie “Te requenict of ream ip is tthe phere and plata have egal gs Fresh ncn ihnce tape cack garter be ence ing is Ober, te tassios ay wie was TCH scheme, Sis ae waste, whe SS, Hee, the pats eosin of ements of i er dan ti: Me tment machin hich te cbt fy pana sto of ale cbs Enerypton Process ni Tots mode, asi eptcris nk AUG thsi agiter set tization Vet 1) ad en pond er secon asa Tha be fstsegent ef, NORed wi fines Ss he cue cenren ln Heer te tanonsdiomattcy Tope ic emai uns hee ene SpecTRaM AULsHVONE JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner cae OB Sie SR (CRYPTOGRAPHY AND NETWORK SECURITY [UNTU-HYDERABAg ger Enron Paces BA Deerypion rec re Pe ct tC ns sane as tha fener os heeds i at he ftn iy oh ee prin NOR wih beeen ees Here desta isnt cl neg, Leena sed reante expe! wing the lowing notation, G8, @ SEKI Ea. : Whee, $= Mos sic 0 : ven LC yap igure Decrypt Pes of WARNING: xmoxrnospyactina tot na CRNINAL Anon nd gyn LABLE te LEGAL peed. rr me _symsmete Koy and Asano Koy Cphors cm ee - necokt tubal GH sie Thsume le nil dsp ek — seieisny Gi msemune ach neecnaaliant oral tage ay et ncaa ina ieee ape oo eee cere fore me pantech tne rene ee nor Hef pkne dump been lio poe ope ot earenyrim ol pate ti ee ere ee ae ‘ oa ie igre nryptin Paces of ECB Mae psi PC mc bck of ihe it pase as apt the dso loin to poe respect lock of sitet Same Weegee cpr lone Figure Dorin Process of ECB Mads nto TCD ont rows ole when dng wit ng memes assume ofthe messages canbe wl sued hey may have Some rely wo elas can aly Assets roftbsmesstescan bine jeing elmer oh pestis pets amie oH he et ay he cpp yng patch ats tana cm maple ks of be sage st Nighi on ay changing eft as : ee pat Feedback (FB) ‘Testo hinder fir fdback mode nhs mode te upto mension sae tee ope Ue CFU whch pees oo sc OF ma opts es beso ict tes ‘sewer : terns Pres ey xin} —-- fener Cor [fx] —Q—$ fore co : fea en SPECTRUM ALAN-ONE JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner EE symm et pnt por = crvprocnaps AND NETWORK SECURITY INTUMYOERADKD | yt 2 fo Tee a Zo teem eemeranciis Ress engen neha a Tesh ower The rocco islprtn chesney, M.Sexnmma.ich, orn) sro cite nm =i Decryption Precens se ucam cinta converts oe character ox symbol |) nlaion et veces eee coeur — [ene fener) | Seat mn achat or Stel of cpbercc Te i) Sovam generation ome Renee =] ietincecronttcoyl ia pia acticin Sasnaecoy, | © aaa of State an Tempra cee Taal eases ten | Astro 0 aad ror a z beaters, ook TMD. eop_| beste dom a be greg He ‘caaee A Tame fom Encryption FSD. Cig) | (3"6V 385} Taking We cloner can OE SY a 0) =|” & [ESSERE Serv onset sche decane sa Sainte tate Toone tenet of cana equi Longs ea - ‘the key and permutations are repeated weil the TV becomey I ‘quale 256 bytes. This pce can be writen ag — ramet] | camirn [tao } —--—[erire tia: Som yn et rer 00255 oles etn apn cam ig arin gecttmetirsahandemiccritaengetcancen | 8 = ne opting ope econ em ern arent | SMITE ee ine oe Ly per eine Or c"" =] C1 =, Senanpttten.T) webu anc oti ie ney atin ae ee ‘can be easily idcatified by the receiver and can be te SV {pis the p* clement of $V ant is be hy cin] | Decpton res Shem — = b am om oorwieir be yop ma Inte mtn evar tly SV am : Fenn ones Siam Cher vihsome ster Sv eihopee Ne vet Det ‘ Meee olol enema fat iste ine | a8 Teepe fr dyin en gen cr Tayptssymil deseo teepon gone | Garp 285 conser [Ee ‘Siteccherensan depen semen tec rr-cre@mnpd CT, 2PF.] a] Reena o ; apt eet me eaten aon eee 4 Thepbii fer peseionison sane SV ins TVin mata sed neat a sede sae lard ee Creve? Mineteroricouachonsioustcuocertwes | Snuptovipt sven ‘penn mathe sce fee am cp Sioaedecen a ee Avene comer [ep Fews], | patranaeseSrem Cipher : 3 eames spp name so peel isn ow which nine he ‘tansmissiog 1s prevented. This Can be proved by refereeing, ve Seeaypane Hany been er CT pata 2. _Niedsentemalcoa hires dnote 1 SS eee a Washer nee eo RE rd Disadvantage Counter n| “Encrypt | ——>{) Plaine oe ey expan the characteris and opera: i ion aoe tate mene iu Daan fone of REA enerypton agen. mpiniiimicce tated mdi | gin arpa shee ane sn tt S$ Counter «CTR riebarireca kl = =a . 7 as ec a In the encryption process, the counter is encrypted fist sxhasih mimes Ianirsouratwa mer | povnc iereat i demas oesomch aeentetn 7 Sage ott teste ame cy acyptan sion able ofan pees a sc I is ma sce of at cul | pam ode cpedcownes Tneoamers | Stara yl eee ssiy heats certain mecca cae tacit | Ge One i cere ct pe, aime erenrahan erie ie Ina the courte igad sy a fened w ay abe vale aed then fetemenid by | fr ener tet Mosk. The ceria and decryption processes shawn low ‘The fest outer valu ia CTR mode shoul be once snd hence T, mut hae aie! ale fr all ie sags ‘ich are rrp with ie sme key. WARNING: remark CRIMINAL at Ayan od ly LABLE cn LEAL bce fuel hprates hear et very gly at sliae eae i wer 8 to 16 machin operat avd wih a seb: f eu. Figure ing Stead ene a SPECTRUM AULIN-ONE JOURNAL FOR ENGINEERING STUDENTS Scanned with CamScanner i rd Nee UE eh ET “cRYPTOGRAPHY AND NETWORK SECURITY [JNTUHYDERABAg, a. syotte Key and Reet Key Chars = a ways In which Sep a8 wl Wo eye un ey dtbution for | 1 The w The flo 5 TSR | Gor. Demetc encryption canbe achiveg, | A de crag Sam neon «| moot ” ened tom Pvich ag ae Aare scotia of SU Fe cto we 2 andthe a ' sesionty Tstegeacane ae hE oe tan man pe sured) sea cntSNA] wi | Sep Rte sekceaemags| MM atin oh amon ac panes fae | STi gaye ScScrtjewst tnnneiatyre sv sso | comms St get mck ioe | Marana hm won oarc dai | am sane eee, Beppo eras SO) Pe eis waqontin Ete HNaltembeclatugs | event flowing va, 2. AUC oes ae Fleer, give gence patina by, |B peparyesncteseateyantmanatysnditiowe | Eanenaseniontey eet eM Tine ae. re ee pidcaatmbom iceerr,m,, f° rome Sotho he evel e Fl i Ser Sah we Kouniareninpbicacy ene’ | ghia an ey etd ya tind reece fom RDC shoal Whe ine) ‘econ his erpeiatebs, teh | yy Ra whocaneanaly en nb epi. ‘inches th ame ses key ang ra ne ch prine Dmel26 ie dies of Ths mesg bes ek ate + SU pnn26 swap SV SMS te asv Ep] SV fg mod 6 Aesv th ‘The ent ese aber XOK operation 8S eof oy tang nent eof an tex Dssrton hotees OR cpio wo Be portend on wih 9K oF Saat ‘Charatrince of RC Agito, Flsnng a sor oth characteris of Reo rit, 1 serps hey ent ranging fom 102048 i, 2 ts yrcet of ensmpting message quer hm the poe otdenpecn 3. mater cofan waged permeation Ws den 2.2 ASYMMETRIC KEY CIPHERS 2.2.1 Principles of Public Key Cryptosystems. 236, What is Eliptic Curve Cryptography (ECC)? Discuss ECC algortim with neat cigram, newer usm 040) An Eline Curve Cpa (ECO) was roped ‘Die man and fe oe of he popula pa hey ‘Pees hngace These ad he ECC {Sey amore RSAraMlches cron. Binal, Eley (piers Hoon abe oe ie a 3 Ee tounst ECC equa alesstonpesol ass fea artnet and GF ates wate p fend sibel and GF ean be rctened asa antici! ‘obporaas wi coetteet od ‘Therese vances niu fr acne den tatu eliptc canes For cumple apse menage ste Ion sep Be er eer step 4:1 isp he wr peers he sect ey, ok emg SAIC) EE A Sea ig andy Siocon tc msge eo Shey Cie ISK He SK) Sit we dors the iin itso sents so by er fang te fllongtanformtion Das ag? SKI, = (SED) rem era and ate th ameter on lige Ty pon wih era rinreiatehey aciepblc key 1 Tay pacraioa ie Wheer, ites ruber. One ep font Be note betes that the RSA algtiyn can Be sed fet pblicey encryption ad digital senaes. Workag of RSA RSA aolvesapublichey ana privateke wheethe blcdey shoowntoallandisusedtocacnpedormessge. ‘he data oe message which hasbeen ectypted By wing 3 bly cam only be deere by wing ts eonepoeding inatckey. ops. a8) The general format forthe ue ‘the heys at listed below, Alo, ee © Choseay wo Fein ten aad ) Mutipyerantespandy nese 6) len ake pts (Chose sey inter rachr erage and Hn) ie.[ <6 Hl] Chane g teen Site recmten Peete torte ©) Sieteptace eee z distepmacioregenet eta isdiety wig ere wee ata TPM Saye (Gd) sec Abo opacities “Mig ooe ben tenes i sr ch ae Seconpu te ctr ipcaresta epee ge Usd yp ng by wings pkey emma reas Te ere] Forauer ise Us, Qs, Seca ofS ‘A acco ake ‘nee nays 1k, Beatesorce Atak ns apr, atc ue eyo ate HSA din Orton istomscalagshey Tas irspeionentdednes fer anata regi Hone nner show tase of te coupon edna as rag Aap ania nepal 2. Mahemat Cltns Anstey eles inom of tice magn (0) Pacing en negotiating From is ira wee fo) sntdmemod ys Example Say RSA ian (0) Determine ett faction de determining he rine nes lg Fe (Stein de" od Ga. (©) Determine dle dt wit oi eae ten SPECTRUM LAN-OHE JOURNAL FOR ENGINEERING STUDENTS , po Scanned with CamScanner yee TT a 72 7 ene ct ae Re Se = eRvProGRApi AND NETWORK SECURITY INTUNYDERA |g sym nt Arana Cen ‘ IST gin) ny aPMOAShes te equnalem Reams Ta RSA hn Shai Ae HEEL Wee “eres eH u vs in. Kring tom van © = 1% | oy aac mews comity he aon ; ~ar-n-p sin een eattecgatte ase ge 20° 1 leet eaten no setopinemantes | Ne gaa g teen} aah ret it bare aaa , ae Terenas | go rime mn for» Fin ne for) rd Seawall Oy Arwen 639 tee wit be 399, ued pees Totigowc win efradesttices | Se pembesal p= bla 8 june Baie 21 med20~ steed "tv and ex nels be 10-10 Smaller scdeage i Thresbuttcatagepinetarniy-Damsee-0n | SH suet soso einen ter hfce Coe (1 typos a= fea) nega shoo Mme a1 mot 129-1 Tre palp= 1g sod aso mutt « aoe Obering Tne Iie Gnistnonn atts pstintny | pen deo=161- 0-0) moe © emt iw conn he pinata | ERT og SA, hei nord occntte nese Maing RSA lpi, nhs aac, anthro tack fine ten ti a computer dp etgeand ern th pate Xess Thctmin stk machete tack 2 ee the stacker taco entene Swrrve th the maa exponettion alti is tae ty te ingen comps Feriemcdrc oe atch ern darth fea sagen sev fat at a fe csc shes ch re tine an average dlr experince, Te cies Scape href ems, Teter Sloumustt boahnen cern eapts Sapo SLR fs he knon an coer 61 Sepcnteatea be uakaown esesent it seme hoe Stem (d= oymad nar alg il tac He: ctr ipa wil be slow far fe vase ‘sand The hacker che alice. Thc Sack sume th bebe ith abused ecto ine ‘decyl avye sw ben on prieas fenton sm waa Ober, is sued ats itt observed enc anes or ease ft To pce! an atacer fom tacking te astty of SA apc. the following cour messes can we (2) Este ta all expncaiton tine scons, 0) The esporentitica ses shold have theres des So tts cl the she totam he we (0) Before apg he exponentiation fin, ily ‘enter! a random rub. This prevents Be stacker Lnowig wat brs ae big posed inside he corpse G44, Ina RSA system, the publickey ofa given user Is = 31, = 3809. What is the pevatekey of this user? Answer: Given public ofa were 31 and = 3899, We vetoed he prnstekey fr his wet i948) d= 3880 Forth gen pulidcy Le, €= 31 which eg, inet g4e) 480 : wee modo in sash at = fm 3480 ‘Soe yaloe of /=3051 Beau, [HBV 3193961 and 93861 it gi 10 27 = 380 “Therefwe. th pate fortis we 130313899 or enetpton an eryOn g algorithm for the following, pes p=3,q=ttd=7m=5 Gi) p=M,q= 13,08 t1,m=7 as. Answer « Prdgntd=nmes: Given tat, poe clos performing the ener ion ane deseo the soosge te valcy nna @e)ae cused Aceon RSAaizotim, [| ef = ne3eH [e=35] ant m= 9-Da=) *<6-pai-y =e)u0) =20 ‘must be chosen uch that ped) o 47 ods WARING: xenon CRM, nt Anon ty LAE ee LEG, re eae cuban aeons 03.3) pecrption tn oder 1 decrypt eo conser this ciftentieto inet ing SA, the formal, onan (€= 26 and prnatekey =n )=63,7) = 26 (mod 33) = (26! mod 33 +26 mod 39) mod 33 (486916 mot 33 «17576 mod 33) mod 33 = (2520)med33 = 500mod 33, Mes {Stree yet mee, gi peilg=13,e 1 and? ‘We ned to find 4 and noes ne conition need w be stsfed ie, 30m Gea We Tindn= 183.50 Men ine ee ‘To enerypt the mess, Fe rl, Websow tat, M = Tad public hey =(6.m)=(11 13} c= Tmo 1 (trad 13+ 7a 182 15) (0d 17+ 7 nad 19) mod 18 = (Q401 wo 139 «385 mad 10) mad 3 =A" ST) mo 1 = 3 mod 1 Decryption ‘To decrypt be message he om C= 106 sed private ey = 0) =(1L 1) A= 106% mod 18 = Qe ma 10a 107 een (106 mod 143) 106 od 149) 0d U9 (250m 1 to LS Gh 11D mos 1 = 1008 ned 3 Aer dering the ened mesg, te gist mesaeeis Gl [SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS 4 Scanned with CamScanner Fr ore > r — 3 -CURITY JNTU-HYDERA Ker mhsyeen « CRYPTOGRAPHY AND NETWORK SE ee hey Cates ts 7 Guonswo prime numbers P= BaN8a= 1. ae | ioe = (046, We Eigamal aigortvn. O47. Given hayes Tanivetbedecrypbontor | O°" ans or dcp ps tN a en a oncTesipsginmg soln eae item nt meg ol Senge a Ra ge nan sino Dttat inet nua petee eile ned | anwmer ont) eT etches ce aa Sa se a, peter 0.85) ss teeta ipantyen ree ant cr buco ec wd : couple da hactay oc erte Spe anda NT poster tee28 eer eed Ss ‘ scam one a mame te, ‘Aer Acacreomneiecunrinantdecnrtonyg, | =I mass (crndenotnortcto newly Tnisdauahaa a 1. Gaba robe Element Tintin” Meare denise Aeonagy| sauna zor amiss | etic ii ra, er ay gant imine Inlet a prefab. rorya ocr poate a8 PE 2 Key Generation Now ser 4st ape he 4, remus pce 9,8 lo Wren A= pate of qc, epbicke of Sin thr sr enctateshispuc hey Yan nse ey dependent A Cer ASignsa Mesage Aedus stop ener performs encryption of plinetAF ‘jond for wer Bath llming a9, (a) KeQymodg 0) (CChviere ? rah mot g and C= KM mot % The €, and, weetr make wp te igre osu Hartke) 6-1-0) “4810 aa Non howe sue that Dewel¥n)=1 fo Timed 401 With hoe valu selon i ot ose So consi “ervalueas3 (d= 3)mot40=1 wae21, 273) mod.0. 81 mod 40 = 1-5 T= rerypton nord toenryptnmesage A wig KSA alr, Ae following sondston be aiafed Asis kn tha, so DMankn $5 Therefore mi re Tocorytthe message the flowing oma a "soasto Frm ier teu'C, mada] #28 mod» = a8 mod ss = {User Vries te Signature In ahi tp, aserB can perfor vericaton ofthe ienatare roo cing th pantet Min the following was © Compute, (Cd Comput, = (C,K9modg ere, mabiplctive incre of SCE) madg = kUK) moby MK mag = armed WARNING: xerxPrtocnying es bck A CRRANAL oct. ESTES ame Anyone ond gy LABLE bee LEGAL poems eee apni erred ee 323 Dife Hellman Key Exchange Knapsack Algorithm, wumerate Dit os ome Spe Explain how key exchangeis dane using ite. Fitiman key exchange ae (Mesa arr O86 Agr, Ou he pein oy ens pay ape sgt Te pup te pease og eS ten exchange see nae mane, aero en teunlt acypte nega eee, “he ile linas lord er een eee siney acl o clea det losin The oes toa dfn 2s lis, For pie number pa pinitve rt ofp is efit tore powes ae the ings fom I top I. Leta bea ‘Ect root often he numbers ert ae, eed pyc map pn ep, ‘The iret lopaitin fo ay integer manda ite otwofaprime number piscalesed ss ned p whete,05/< (9-1), 2K (yemmdp = (aod 9)" mo = calty andy andy =e")! aap = (and 9)" op = (rp map Simiy, user 8 cleats the shred secret ey, Kas k= (1 mod, 1. Selctaprine nunberp and apne ofp thta sp. Thee umber epee PMH ‘oppose ht too wets Aa wish to excange secre hey scr. User Ascendo integer, ait pte < plaabconpatestcorependog pkey Ta, 3. Simi wer B select andor nee X, as raekey GY, Tumeancomanent canbe pes cope ine bg. “This pobem coins either Oor | antec tise 01 hsp pena i awit te pean ngpsack, ‘Seppse thatthe Knpsack caries 2, 91, Land 17.ANock fit ou egw rept trent eae whch eae the phn et (and. The orespedig inert canbe Bc a es ng Freteplain tetas allows. Kup 2-9 BIST UIST Pointer: 10110 10101 Ciphers 24134189300 203417 Inpro Kapa Agritn : ‘ie importane of apc rin nou ly essa tons, Leste optating pte to allocate rues ta mamkr of wks hak ris eee) _stoachiee matin cen 2 ets the wes ining the amber vbr his when iy esi oh 3. eau ps be tie to mami he pot | Scanned with CamScanner 78 CRYPTOGRAPHY AND NETWORK SECURITY [JNTU-HYDERAg, 7 SHORT QUESTIONS Q1. Discuss about Blowfish. (important Question | May-17(R39 Anat Por answer ref Xe H.O4. Q2. Define Stream ciphers? oy sedi 02 Cimportant Question 1May-17°R9) a2 For answer refer Unit Q3. List out the advantages of RCA algorithm. (mportant Question | Dee.-19(R4 Ans: Vor answer refer Unit-ll, QS. on Ph Q4. Differentiate conventional and public key encryption. é ‘et aes eet {important Question | APrILtO(RI5 was:_For answer refer Unit-ll, QU. ESSAY QUESTIONS Q5, Enumerate in detail al aneat diagram. bout the steps in Blow Fish Algorithm and explain the process of each roung),, Anst_Foranswer refer Unit, Q25. (Ove. -19(Rt6), 05 | Apri-46(R18). 5 | Dee-17(R13), 04) ER Q6. Write a short note on RC4. E 2 (ttay-17(R19), 5(b) | OctINOw-16(R19), 5) ‘Ans: For answer refer Unit-Il, Q35, Q7. Explain RSA algorithm with suitable examples. Fz Anst_For answer refer Unit-ll, Q43. (May-19(R16), A5(a) | May-47(R13), As(a)) Ew 8. Enumerate Diffie-Hellman Key exchange for encryption and decryption with suitable examples. Ff > Ans: For answer refer Unit-ll, Q48, {Dee.-19(R16), 4(0) | Apr-18(R15), Qs(a) [Pe Q9. Explain block cipher design principles. Ans: For answer refer Unit Il, QI. (Important Question | Oct/Nov.-16(R12), a6, Q10. Enumerate in detail the steps in Data Encryption Standard Algorithm and explain the process involy, in each round with a neat diagram. Ans: For answer refer Unitll, QI. {Important Question | NoviDee.-20(R6 Q11. Explain the AES algorithm. Ans: For answer refer Unit-ll, Q22. {important Question | May-t6(R13)c¢ Q12.. Explain the process of encryption and decryption in RCS algorithm. 1, Q28. the encryption process in IDEA algorithm with a neat sketch. Ans: Foranswer refer Unit, Q31. ; Ans: _ For answer refer Uni Q13. Des: Important Quests important Question | Nov/Dee.-20(R6), a7 14, ae the public key cryptographic principles. Explain RSA algorithm for given example, whet P=3andq=11. Ans: For answier refer Unit-l, Q41. {Important Question | Dec.-19(R16), Qt WARNING: xerouPhotocopying of this book sa CRIMINAL act. Anyone found gully s LIABLE fo face LEGAL proceedings. ~~ Scanned with CamScanner

You might also like