Information Security Handsout
Information Security Handsout
• At rest
• In motion
Basics to Secure Data/Information
• Confidentiality
• Integrity
• Availability
Confidentiality
(b) Privacy:
Assures that individuals control or influence
• what information related to them may be collected and stored
• by whom and to whom that information may be disclosed.
Integrity
(a) Data integrity:
Assures that information and programs are changed only in a specified and
authorized manner.
• Substitution
o substitution, in which each element in the plaintext (bit, letter, group of bits or
letters) is mapped into another element
o It can be monoalphabetic or polyalphabetic
• Transposition
o transposition, in which elements in the plaintext are rearranged. The
fundamental requirement is that no information be lost
• Product
o product systems, involve multiple stages of substitutions and transpositions
ROT 13
• ROT13 is a simple letter substitution cipher that replaces a letter with
the 13th letter after it in the alphabet. It is monoalphabetic cipher.
A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z
➢EXAMPLE
Plain Text: S E C U R I T Y Cipher Text: C Y N L
Cipher Text: F R P H E V G L Plain Text: P L A Y
______________________ ______________________
Encryption Decryption
Rail Fence Cipher
• The rail fence cipher is the simplest transposition cipher.
• The plain text is written as a sequence of diagonals.
• To obtain the cipher text the text is read as a sequence of rows.
➢EXAMPLE
• Plain Text: HOW ARE YOU
H W R Y U
O A E O
• Cipher Text: H W R YU O A E O
Types of Encryption
• The process of converting plain text into cipher text using some
process (algorithm) is known as encryption.
different
Public key key Examples:
Private key
• RSA
• ECC
Plain text Cipher text Plain text • DSA
encryption decryption
Stream Vs Block Cipher
H J
Examples:
O D
Stream cipher
• RC4
L Encryption T
Plain • Caesar
text
I key P cipher
text • playfair
D W
A Z
Y Y
Examples:
• DES
Hello
Block cipher
Example: Convert the given plain text into cipher text with help of
given key using Vigenere method.
Plain Text: H E L L O
Key: A B C D
Note: Key will be repetitive until it becomes equal to length of plain text.
Vigenere Cipher (continue..)
Plain Text: H E L L O
Key: A B C D A
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
N O P Q R S T U V W X Y Z
13 14 15 16 17 18 19 20 21 22 23 24 25
(P1 + k1) mod 26 (P2 + k2) mod 26 (P3 + k3) mod 26 (P4 + k4) mod 26 (P5 + k5) mod 26
(H + A ) mod 26 (E + B ) mod 26 (L + C ) mod 26 (L + D ) mod 26 (O + A ) mod 26
(7+ 0) mod 26 (4+ 1) mod 26 (11+ 2) mod 26 (11+ 3) mod 26 (14+ 0) mod 26
7 mod 26 5 mod 26 13 mod 26 14 mod 26 14 mod 26
7 (H) 5 (F) 13 (N) 14 (O) 15 (O)
Cipher Text: H F N O O
Vigenere Cipher (continue..)
Example: Convert the given cipher text into plain text with help of given key using
Vigenere method.
Cipher Text: X W C F R
Key: T Z C
(C1 - k1) mod 26 (C2 – k2) mod 26 (C3 – k3) mod 26 (C4 – k4) mod 26 (C5 – k5) mod 26
(X - T ) mod 26 (W - Z ) mod 26 (C - C ) mod 26 (F - T ) mod 26 (R - Z ) mod 26
(23 - 19) mod 26 (22 - 25) mod 26 (2 - 2) mod 26 (5 - 19) mod 26 (17 - 25) mod 26
4 mod 26 -3 mod 26 0 mod 26 -14 mod 26 -8 mod 26
4 (E) 23 (X) 0 (A) 12 (M) 18 (S)
Plain Text: E X A M S
Playfair Cipher
➢Convert the given plain text into cipher text using playfair technique.
Plain text: C O M M E R C E
Key: H E L L O
H E L O H E L O A
B C D F G
I/J K M N P
Q R S T U
V W X Y Z
H E L O A H E L O A H E L O A
B C D F G B C D F G B C D F G
I/J K M N P I/J K M N P I/J K M N P
Q R S T U Q R S T U Q R S T U
V W X Y Z V W X Y Z V W X Y Z
Plain text: CO MZ ME R C E X
Cipher text: F E P X K L WK L W
Cipher Text: FEPXKLWKLW
SECURITY ATTACKS
➢Security attacks are classified into two types:
• passive attacks
• active attacks
Passive Attacks
▪ use of information from the system but does not affect system resources.
▪ Two types of passive attacks are the release of message contents and traffic
analysis.
Passive Attack—Release of Message Content
• neither the sender nor receiver is aware that a third party has read the
messages or observed the traffic pattern.
• Thus the emphasis in dealing with passive attacks is on prevention rather than
detection.
Active Attacks
• An active attack attempts to alter system resources or affect their operation.
• It involve some modification of the data stream or the creation of a false stream
and can be subdivided into four categories:
• masquerade
• replay
• modification of messages
• denial of service
Active Attack: Masquerade
• Easy to detect