Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
27 views
CNS Assignment 1
Uploaded by
bhargava ns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CNS Assignment 1 For Later
Download
Save
Save CNS Assignment 1 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
27 views
CNS Assignment 1
Uploaded by
bhargava ns
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CNS Assignment 1 For Later
Carousel Previous
Carousel Next
Save
Save CNS Assignment 1 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 24
Search
Fullscreen
ENS ai Y Weck gs Unth-a2 Ss halse D Gtve_Mfller-Rabrn Alforstbm + problem on 1 Galme:! My rahe ts \ Mfller="Ralen Algovttrs “7 preally used “to. besba lavge number rmaltby. Z _ pe - «Foxcany Hverodd toleger N23) Can be - expreseed as weiss [ness | poilh k>0,4 add 00 properties Of Prfere NOt naa Dot Pi -prime fa te a ive Inbeger lcs Hay, p» then a? mod p=t. tf etther mod p= 1 or aAmod p= g-t bes. wats i) Lop P be a pyrfme_ourber freater pan 2+ b9e can wribe p-2-=2'¢ Lott kro 4g ps add. Leh be any fabkegar_fn_fhe b4a-p-4 _ np pe ge Fee > Teer(n) 46 Pind Pere M4 oll 70,4 odd, 60 hat 2006 Cn-4. 9wD, o elect a vandem tobeger a,t 4a<0-4; 3. aimod-n= 2. then itil C* “treondlusve'); ne for f eC bo K-4.-do.. ba a: 4 mod n=n-2 then cadoxn Cenconelusy'd: pecrthurn (! ‘conopostte') ; tt inte nas Ypr srlinene the: repult ik paso tt‘? 96 nokiacpring. + reberns. the result feeaecluaner tt ony ena or may nek bé prime. 4 Exp latin. p 4 prove Euler's in 4 Farate m _ 10%th ames ' , ~ Guler’ Theoven- . _elabes Hab_for_evers a ee - _Yelatrvely prone ; Latirad nad np. Proof Above 24? 95 true PFO fs pee ’ A= =O-L _ __fxen feemat's theorem. beldé 7. > Wek T gfnd=No. nk tees tnlepers Leesan ‘0’ tha ave yelabtve pene bn > Considering: & sacks fap any XL, 04. ---- yer] 2006 : Prohie, cach element vx OF Re fo a_volgue. -és greg: Less phan. §? Poe, acd (tpyn) =4 | > oN goat Ply each. elenelsb Mp ete Js ze liseitadln) Casi) he 8+ Permulatton of 2 eae “ot 85 velattve ly ae Tee th be £5 velabeve priné- bo. ah -axtn #5. aléo welabively pine fon A\L_membere * she aes Hann nt ae wtlabively pt . id -? There_aw cedeg joe ryt! Rams LF axe mod n= naxpmed Hen Ly = Lp 7) eee SH Sat a TP caxrnredn) = Fieen eab dndl aby i , fre eS) ‘anal: a. we wale _— \ apie tv rae fa] wffSimdo. beg — ahr is 4.mod(n Wf | Vy Alkernate ; | gMerrs! = amodn ial 2006Week 45 * Beoblem: gh — *" ass, n=40 Sad fe = tmod 10 ge = mi Sotner eb 21 modjo' °° “6 Ealers theorem elds god for value | a=3,n=10 * a-2, nett gl 24 mod 22 gene =< Que? Cr- 0), 2 2 4 mod 14", _ _J02H = 1 mod 414 “Kulers Heovem holde pe Sor value a=2;n=17 uleve “Tohenk = - "SY fe. seatien 2 i of "2b PS Ped as No! Ses fr bas. n_ &_ velabel me ton Liecga sr + a “Py conventidn, Bl)=4... Foto Pai) ‘Dumber Pe Jip )= p-a * Phen 10 hane to pre mas pkg Ap ps al#q then 98 can shor. thabsfov P=pg PLO) py ) ~ sp) x lq) Dh_bonars 3 “opt fox Gy) Saar (GG) =a gla)-6.. olan £5 mo sete C2008 . oh Ol Fermal's theovem'- Lt olales that pf ime Fa fe ate inbeger nok settee by {bets : Peoot: Consider the Get of sve tnkegens less tan P Pi hia. ----P-14 f thst avale reply each Hasyn by ia. to fe the Seb x Pita’
[Ctxex 3-- Athens R | ce =Cp-3M (med B) vi nn e ites abt 4 (med P) 1D itajeal tsp . Sunday eh ee ‘ NOVEMBER | Fy —— ep lf . Wey S$ \NC Te ia f SOME, a yeti $s 4 sa treeid 14) “yet, ayo. Le RG 49 2 :4Crm0d. 49x \ PEL 1 (mod 19) | 9°: simed 9) (very snc! te ala a Rint iAn _alternabtve form of. fermabs heoren ts_alSo useful SF Pte: prime £ a roa re we then, >: = ‘a? atmod®)| He a B pes (45 ail Asse, Pas - : oh 3k vol! ge = t0e0000 hic ans £08 = £0 mod 5°. a e af 21g mod 6 S Ont 4 Boe i leat Dy whele a” breef note: on: of secuvth -ablacks () Passtve Ablack > ype iy ‘A Passive attack plnogia 1. learn or vse_of tap from th veel” ishem bub does not odfeck 6 il em vesources [40 (e2] ; , é ar plese oF message, ton benks: ome Phone convd_ Should be: confroko al hence prevent tt drom-an opponent: Learnt @ivaktie a aa RS. © A wal sting dhe. conlinks of regs 2006 Ene a abWeek 46 +A common Fechnty, ue of macktn ory Buk sbfll_ can. be. Fut out by obser vin: poten FP nahure: Yok He. m: Passive attacs one dpffic Oy to. 0. delet “Davirion t5. bebe oe Ack ve AHacks \ “An_actrve atback abtempts to silos on *RGOUY CES oy atteth thet 1 optelton ifito ¥ “h cabegortes — Masquer =? Fakes place when one : cety pn ‘fo be ’ 09 Peplay ently : © ee be a page caphie. of aclale oot 2 16 Sobeequerlreransmtesion Jo» Leo ee Te _umWhor ized edfech See © wmodttreabten of aaa ~~ Some ‘Povtton _of itera resee alkeved, ov that messages Mae layed Pod ko pyoduce_An. unawhortzol @. eat of GerwPce ss veveNnts orm InbPbtts jhe normal use ‘or. management of cormmunftabton. Lach lifes. 20% 1«pfrcult beeper Acteve Atbacks = » goal fs to ot 4. xecover hoe an disvept ron Lad avart caused bp bern V lect 4 oxplarn daa Securty cervicech mech. chankn “ty 7 iiihenit cian, fey) Seu gowetcts. “pate oh deal Hy) Tae Paka. roar, = 8 ae iS nloneapat guetta aot aicle 4 403 Sou Fonastve eeush To F Pt ger Ser L ) Ptscuea evil ak aba secur! tte pola “a neat fag iam, “h Arie bo be bineParddl from One| bo: anofhey across some sort of t Uolaknel benviee. a aa? Parpes are prfr fpals robbie brarsn afta nfo chontel Pe esbablte hed fr trp: Oe woke oi ae Fate. a OY fe dest’Fable 1.2 Security Services (X.800) AUTHENTICATION ‘The assurance that the communicating entity is the one that it claims to be. Peer Entity Authentication Used in association with a logical connection to provide confidence in the identity of the entities connected Authentication In a connectionless transfer, provides assurance that the source of received data is as claimed. ACCESS CONTROL The prevention of unauthorized use of a resource (ie., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). DATA CONFIDENTIALITY ‘The protection of data from unauthorized disclosure. Connection Confidentiality The protection of all user data on a connection Connectionless Confidentiality ‘The protection of all user data in a single data block. Selective-Field Confidentiality The confidentiality of selected fields within the user data on a connection or in a single data block. ‘Traffic-Flow Confidentiality ‘The protection of the information that might be derived from observation of traffic flows. DATA INTEGRITY “The assurance that data received are exactly as sent by anvauthorized entity (ie., contain no modi fication, insertion, deletion, or replay). Connection Integrity with Recovery Provides for the integrity of all user data on a connec. tion and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted. Connection Integrity without Recovery ‘As above, but provides only detection without recovery, Selective-Field Connection Integrity Provides for the integrity of selected fields within the user data of a data block transferred over a connec- tion and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed. Connectionless Integrity Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided. Selective-Field Connectionless Integrity Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified. NONREPUDIATION Provides protection against denial by one of the entities involved in a communication of having pat- ticipated in all or part of the communication. Nonrepudiation, Origin Proof that the message was sent by the specified party. Nonrepudiation, Destination Proof that the message was received by the specified party.Table 1.3. Security Mechanisms (X.800) SPECIFIC SECURITY MECHANISMS May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services. Encipherment The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys. tal Signature Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery (e.g., by the recipient). Access Control A variety of mechanisms that enforce access rights to resources, Data Integrity A variety of mechanisms used to assure the integrity of a data unit or stream of data units. PERVASIVE SECURITY MECHANISMS Mechanisms that are not specific to any particular OSI security service or protocol layer. Trusted Functionality ‘That which is perceived to be correct with respect to some criteria (¢.g., as established by a security Policy). Security Label ‘The marking bound to a resource (which may be a data unit) that names or designates the security attri- butes of that resource, Event Detection Detection of security-relevant events. Security Audit Trail Data collected and potentially used to facilitate a security audit, which is an independent review and examination of system records and activities. Security Recovery Deals with requests from mechanisms, such as event handling and management functions, and takes recovery actions.SPECIFIC SECURITY MECHANISMS Authentication Exchange ‘A mechanism intended to ensure the identity of an entity by means of information exchange. Traffic Padding The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts, Routing Control Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected, Notarization The use of a trusted third party to assure certain properties of a data exchange.os ioc Ep aspecks come: tes Plagiedeen ft fo_ptce 65a oe "Os cecal neponenks sit 2 (©) foo of Yh the. meg . ny uid bre ‘On cbt j_needt-d; Fon. t05 nsthi oiehre bul? 2. slave} tafo fa oy " there are HI basic hasks. th: Pers a; aio Securt ty SOVvice oF n. ‘Algorithm. \ 2 enbeaie sect tofo ban Biba ane ifthe! pith i oeaop “methods- for distributton. 4 ches ate acreb. fodo. gos Pe) peobeol 1 be 5001 toes b | Mele Pepe of eecurtiy siga’ Pr pe re _ —Figere. 4.< TB ge he AY Discuss at aby mode) of egret Eocnplh> ! yolth neat ragon, | A a yenmebrte en eypiten Scheme has 67 tng redients | hex b: thee the actgtog fnbellf ie wat a dala that tb fed. Inlo. the cael a8 input —Trusted third party (eg., arbiter, distributer of secret information) Sender Recipient Information channel ‘Sccurity-related Security-related transformation i transformation il Secret Secret information information Opponent Figure 1.5 Model for Network Security| = ony pion ts Un Ho tla, performs varrfous Bertil ites 4 Panslotmabtons on the Week 46 Plat nbext- * Goexet keys 7 EE 1s \albo" an: Yp to. te te pov thn. | = s hy 1S as Yahi indeperabnt. os ae ofthe. algorfibm. ' Cipherbext: Sco at PS the Sevombled. resoag pra ass depend a panda an te, PTL. siediele aya Lat 5 The. cf Pphevtext _ 9s_an_apy parently Phelan as. Py: Blane, hs. tp Hon Al age fs “yy J dhe “eroryphtin_a vilhm TWP fr_ as Pome St ee = maa oT + 5k Pr. = y, " Faguce id TB % Problems: “age eh gM en Cipher, Pape, He, Ipegtoue aye 223Secret key shared by Secret key shared by sender and recipient er Encryption algorithm Decryption algorithm iors: (eg., AES) (reverse of encryption algorithm) Figure 3.1 Simplified Model of Symmetric Encryption.=P potis a brief nole on broreposition Technigue ‘ypbograp [matl fence] ’ a A tes Tha ne kend of map 4 13 achteved she Ke ricg Sore Sort of wr taditon on He letters.” Thts technique. ¥2 5 vederrtd 10 a5: a “Fyangposttfon cipher. | * Tre kinds | (2 Rael Pence 2 Plarnt ext rotten dovon as sage of di —_— _k ead of a6 sequence OF ro.28:. he - cote me_adker =e PT Do - _ Vg ul ee LD hy |: ee EL i oe GO. 3 sajhe vO, | oT 6- MMTETEFEEAR Sunday tc, : Week 46, * NOVEMBER | WO Rovs- column | = Lovpie rncecage In ntceg gla; seo1e by 08 ead dhe rai Column Poon, odes . wDoader el pokenteita ae = tgs “Meek me afl : Frege te ‘he a: b Be 4 : i Pn “msope te wa bm 7 om aviat Fe 2 ood tor pat et gage tl! Pe gk OO OM garish Beis Ger h “A Pe BARTFZEEEMMT | . key i- 4 38 £4 & ‘W @ art Bs or8 obfon Fees hs Tes Ae ga @ Orci 81 aya BPOF . Co rp.my$ sans oe an ny eT fe REM TET AZMEPE _ B\jorthe 4 a neab _dlagvam 4 oy plat DES shes Epen cigbrin theo jae rks oe, B yp ten in Figured, nF TB * thet awe 2 fo oe he. aka dont (DPR ep Be: ws aD » KAY ‘PL es pela: bi 64 bide. bet Ht ‘ x —{—_ LE: othe _ai Hy cris tng OF phe Pr eraoved te 3 phases | 2006 /64-bit plaintext 64-bit key 64-bit ciphertext Figure 4.5. General Depiction of DES Encryption Algorithmwre) 6u bite PT passes thu an tnitfal perrutalley thal vearvenged the bil to produce the ‘Perenited top foput (DIG Younds of Same Sun? rohtch_pnvelves — Pumubalton # supstfhubion sfoncrs 2O/p_of He last Yound consishs Of 6h bits tab ave a func? of He yp PT + dhe ke bey > The left 4 sight halves oe He ofp: are. _6roapped 10 produce 2 esd (thé preoutput 1s pased’ thru te perentabiin LrP?] Phat 8S Inverse a # Inf tal’ peYmutalto> Func? rohith produces 64-bib oT, Rs hk hard portions Shows fp oy 90. 2cbtch Ps crstol 56-bit sothtay nal ey fe passed Aru. a petmulabtor func" ermutatton foner 15 tre Same. for cach 29h, noord bub a PFE. Subp. be productd Coz of He repeated chtfts 0 Ihe iy bths, Abe) ths OF DES Sage of $6 -Bib keys ' ie Nabe Of the Dis al ovithm, , Thing ablacks+) Oxp ene differents Sobebtbutfon. nen Bbbe btutten Tech nfgues Honea ae 5 babel ge =e atogle. cf a is oi. —platn_a “pat bo. cipher
) Sopuk bo. He 15: "the: XOR- OR Hoe, next 15 pe Pl # preceedtng: Dlecte. te ee 2006
You might also like
CNS New Unit 1
PDF
No ratings yet
CNS New Unit 1
31 pages
CSS Assignment - 1
PDF
No ratings yet
CSS Assignment - 1
10 pages
NW & SC Printout
PDF
No ratings yet
NW & SC Printout
17 pages
2024 USA24 CRYP-T09 01 Homomorphic-Encryption 1713559044896001asqd
PDF
No ratings yet
2024 USA24 CRYP-T09 01 Homomorphic-Encryption 1713559044896001asqd
35 pages
Cns Assignment 4
PDF
No ratings yet
Cns Assignment 4
6 pages
Prime Number Encryption Copy
PDF
No ratings yet
Prime Number Encryption Copy
24 pages
RSA Encryption
PDF
No ratings yet
RSA Encryption
4 pages
Cryptology
PDF
No ratings yet
Cryptology
18 pages
Introduction Lecture13-14 - Slides PDF
PDF
No ratings yet
Introduction Lecture13-14 - Slides PDF
44 pages
ISS.f
PDF
No ratings yet
ISS.f
29 pages
CNS New Unit 1
PDF
No ratings yet
CNS New Unit 1
31 pages
16 Digital Signature 08-03-2022
PDF
No ratings yet
16 Digital Signature 08-03-2022
223 pages
Student Slides Full Crypto-1
PDF
No ratings yet
Student Slides Full Crypto-1
19 pages
CNS Mod 3
PDF
No ratings yet
CNS Mod 3
13 pages
Lecture 4++
PDF
No ratings yet
Lecture 4++
33 pages
CYRPTO Model QP Solutions
PDF
No ratings yet
CYRPTO Model QP Solutions
58 pages
CNS Unit-2
PDF
No ratings yet
CNS Unit-2
47 pages
Security Tutorial: NETW1002
PDF
No ratings yet
Security Tutorial: NETW1002
17 pages
Cryptography: Public Key Systems
PDF
No ratings yet
Cryptography: Public Key Systems
39 pages
Overview of Public-Key Cryptography: Vitaly Shmatikov
PDF
No ratings yet
Overview of Public-Key Cryptography: Vitaly Shmatikov
24 pages
Lecture 05 - Public-Key Cryptography and RSA
PDF
No ratings yet
Lecture 05 - Public-Key Cryptography and RSA
29 pages
An Exploration of Mathematical Applications in Cryptography
PDF
No ratings yet
An Exploration of Mathematical Applications in Cryptography
55 pages
CO-1 ppt 3
PDF
No ratings yet
CO-1 ppt 3
73 pages
Crypto
PDF
No ratings yet
Crypto
41 pages
Asymmetric Key Cryptography
PDF
No ratings yet
Asymmetric Key Cryptography
27 pages
Applications of Pailliers Cryptosystem
PDF
No ratings yet
Applications of Pailliers Cryptosystem
152 pages
C4-Public Key Cipher
PDF
No ratings yet
C4-Public Key Cipher
28 pages
Encryption Notes
PDF
No ratings yet
Encryption Notes
11 pages
Pub Crypt
PDF
No ratings yet
Pub Crypt
24 pages
CH 06
PDF
No ratings yet
CH 06
49 pages
Crypto Midterms
PDF
No ratings yet
Crypto Midterms
16 pages
A Course in Cryptography PDF
PDF
No ratings yet
A Course in Cryptography PDF
204 pages
Homework Solutions Cryptography
PDF
No ratings yet
Homework Solutions Cryptography
3 pages
Cryp 06
PDF
No ratings yet
Cryp 06
90 pages
End Notes
PDF
No ratings yet
End Notes
34 pages
CENG413 - Lec05
PDF
No ratings yet
CENG413 - Lec05
20 pages
unit 5
PDF
No ratings yet
unit 5
26 pages
15cs434e Unit-2
PDF
No ratings yet
15cs434e Unit-2
74 pages
RSA Algorithm
PDF
No ratings yet
RSA Algorithm
22 pages
css qb
PDF
No ratings yet
css qb
17 pages
Information and Network Security: Ms. Hansa Vaghela
PDF
No ratings yet
Information and Network Security: Ms. Hansa Vaghela
77 pages
CNS Unit - 3
PDF
No ratings yet
CNS Unit - 3
16 pages
Nis 6-16
PDF
No ratings yet
Nis 6-16
54 pages
Cns Full Unit 2marks
PDF
No ratings yet
Cns Full Unit 2marks
6 pages
Unit 1
PDF
No ratings yet
Unit 1
45 pages
Lecture-04 Euler Fermat
PDF
No ratings yet
Lecture-04 Euler Fermat
26 pages
Cryptography I: General Concepts and Some Classical Ciphers
PDF
No ratings yet
Cryptography I: General Concepts and Some Classical Ciphers
60 pages
crypto 1 to 5
PDF
No ratings yet
crypto 1 to 5
136 pages
CNS UNIT-3
PDF
No ratings yet
CNS UNIT-3
19 pages
Chapter 8. Network Security
PDF
No ratings yet
Chapter 8. Network Security
87 pages
Lab02 - Public-Key Cryptography
PDF
No ratings yet
Lab02 - Public-Key Cryptography
9 pages
BCT Unit 1
PDF
No ratings yet
BCT Unit 1
80 pages
c05 Crypto Publickeycrypto10
PDF
No ratings yet
c05 Crypto Publickeycrypto10
87 pages
Cryptology
PDF
No ratings yet
Cryptology
7 pages
Lecture-1-print
PDF
No ratings yet
Lecture-1-print
20 pages
Number Theory and RSA Attacks: A Brief Overview of Attack On RSA
PDF
No ratings yet
Number Theory and RSA Attacks: A Brief Overview of Attack On RSA
54 pages
Cns Test 3 Answers
PDF
No ratings yet
Cns Test 3 Answers
27 pages
3rd Inernal
PDF
No ratings yet
3rd Inernal
20 pages
CNS Unit 1 N
PDF
No ratings yet
CNS Unit 1 N
17 pages
Cognitiveclass PY0101EN Certificate - Cognitive Class
PDF
No ratings yet
Cognitiveclass PY0101EN Certificate - Cognitive Class
1 page
Cognitiveclass PY0101EN Certificate - Cognitive Class
PDF
No ratings yet
Cognitiveclass PY0101EN Certificate - Cognitive Class
1 page
BhargavaN S-PCAP Programming-Certificate
PDF
No ratings yet
BhargavaN S-PCAP Programming-Certificate
1 page