0% found this document useful (0 votes)
20 views20 pages

ISS Unit 1

ISS UNIT1

Uploaded by

Vikas Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views20 pages

ISS Unit 1

ISS UNIT1

Uploaded by

Vikas Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Unit-I

Informatiam Security System


In tooduetion to secixik attacks, ser vices
and me cha nisclassical en thtion teehniQues
Encyhtioa.
Substitutim ciphe Qnd trang position ciphers, oybh
anedyi, sheam and block eikhesg
Infosmetim Secuit Vaxioud tzincihles and
þxachices ee mhlyedto Safeguad He Lnfozba in
exising Camhuter mackinei and within Cnfuter
hetwrks
attacks Y accident are encassukke
umde mfo Retiog Securiy
Ava ia bili

Secyiy
Intgris

* Canfidestility iti ensnig piva y and.


Secrely f Cerned date
onnceaned dota ajainsf°all balicious
atauli ad accidentel damag &- storiny data
in an enyh led
Avai labi li i making Hhe Crealed qnd storeed
infochati ina Comsuter hetooxk availak k to
authaized hersons and sexvites on rigbt tibge
eka mble nviding a cus tay ery bask acoynt
inormeion ATM Machine
Teie

Integm I+Hiis gua


qua vanteeing hat
at achages to
Hheinfomali
akh zoþxiale bmechanis withot didaibuting ite
staucture uiliy and lecrey ex- Auto atic
uhdatig of aleaak infoi bauk tantar

Secynity Atacks Amy unau tho zized ace


Monito ig or nishandling et Informa tion with
an inten
in foratim Secuil attacki

TATTACEs

PAsSiVE ATTAks |ACTIVE ATTACks


ntecebto

Release ot Trafc Interrushiosno uclhhaheLE


Messape
-onteit
Aralysis masgyevede

Reblay Attacks A1tereoy


Atacks

Ang aattack on
passive Attacksi- Ang e intorahion.
and lax syskun xeloures without baa kiug any chay
to Hhe Cau heclassiied a bassive
daae
attack intecebti on
A þassive attack attembts to learn or wake
but cloes not
active attack
tfet syaes ryoyceg wbile aM
3)
Heir opesaions
Release
2) MoniBariy nfent
aunyzing
0> Releasef mesioe lanknt is to extract Hs
infosnation fom a fle or taa ic withaet
autthoized access to it
Uamble we Canenwde he messege wing a Code
Jague cndezstrad by the sendisg amd Oreceivi g
2 Taaffic anaysiy attacks: jt include tta attempt,
of analyzing the encaded message in ader to
patexn inoled inametuge tofind a clue and
delode it without te Kno3ledge o He seader
and He receiex bax ies
eAqwhle: Hacking into a netwoxk Connectiom ayl
moni toxig Hl flasoing datea to know Hus
Comnectedsess Hheil Ip addres, syskn negonca
banduidth wdege
Q Active Atacks : All AHacks that exert a diret
0apact OY damape to Ha stauctue, validik qnd
availability f Lntoel ion Cav he q3oupeefundez
the cla active attacky
The active attacky nclude tae wmadificatiog
of Hhe origival wMHefe iy Soge ay tue othe
these
attacks Cen not be baeventeo easily ht they (ay
an
he deteats with alests and effo at
attemtty
Date
Poce

Zn achie attacles,the conknts of He oiiad


axe wodiied in Some Wanex
Thex attacs Can bein focw ofo
() Intenubtim (masQuerade)
(2) Modilicoioa
(3) Faicatisn
) Tnteruttin Masgueraele:. tij an attasg
unauthoized wer who þae temds to be aint
genuine emtiky over ttu netork
entih
CReblay attalla in lule t lasteai of a
Oymitz and rejeneling Hhe to qain unautharized
informetin
systey -
Mesage fom Dah Hhat
pþeaos to be from Bob
Alice
Intesnet or
oher Csmmon
(4) MoS Querade
(Fij-L)

Davth Systey-3
Coptuse mesape foy Bob
to ATice, latey seflay
mesage to 4i
Alice szt

(6) Replag
Date
Pay.

Modifiatin il Fyxthex clasified into r¢flay


altacks amd altexafion of wete)
I+ imyoleg making Scme chenyed to the
oxigiuad mesage
utity eXamkle
it
validiy
Cas tuziy a a fumd 4%amfer
mese fsxogh a nehuo k and changig it
into a

Dayh wodifes mesag


Fromy Bot to Aice
|Bob [Alice
I nternet o Sys y

(3) Fabzicatin ox denial of services (stofping a


Sexuicestemhuraily
to prevent Sess aclesiing Some
Sexvices fo which tey are eligible i an
authexized. mai nex Hfgd an illeged echanius
ekamble
top

hetwah taa fie and deng ottr legaly


tu netask fuilihes
Dervh disrupts Service
þrovide hË Serve
|Bob Server
(d) Denied of Service

fecunit Services :
Sexvicehat is bovided hy 4 syuky to iue
a sheciic kind f paoducim to Sysky eute
Secuilh Serie imjleameut Securihy holicies and
isaslesseated by secuiby Mekaniabs
Tlhe set standasdi Hhat emiye
Tufaaatiag ajaigt all kinde of unauthized
accessand atidentad es well a interhatione
damageg Can be Coveed under Hue cla t
Seavices

securiy Seyvices

Authentiahom
Genfidenieliky Access
Dala ategri Nonrehudiaho
clesifiahn secusil Serviat
9) Data Comfidemtiadit! the Safs Confidentialit
date Cariexs in Such a manner Sa agto baoteet
He elata any intermediate dsclo Suse
ate

Cmfideat isliy
anayai, attacles
bata Tntegri Thi dak nkgiy sequices
modificah,Insextim, deletim amd tehlayig
by am unauthurized haaty It haay heet a
The authentic hg seavie
hoeuides cuthemtiatnef te (oanynicathiog
baxties af ofluy ed of H liw In Conestie
oxiente Commnicati I provicde authentiation
of He sender Y rcelvex duzi the Connetion
authentiatin
4) Nanebudiatim:: The nMrehudiatig ser vice

o eeeis frf
No denia ef the edie breof ombol
onhol:- the acees segvice
G) Acce unauthaized 9cces
paovides poteetom ajanst
definiion is wey
to data The tem ácless in ts
bzad and inolei redinpwritigmadify ing
exelutig fangx4mg and s& an
Fage

Secuily Mechani us
Coaplete
inonaa tion agaise all kindy of unautha zized
acces an aidemal as well as inmterna ihal
danazei Cau he Covescd unales te elass f seLu

Encibhermemtl
Date

tuthentahon echp
Secuny Meelonns Taic þadding
Routig Gnb|
NDtazain

|. Énciph emment'- The Encihhernent hidiny o


Covesin daa Can þnvide (mfidentiallG to
d be wed to (omblesaesat othey
to bovide othes nfogtim Sexuices meclanisd
2. Data bntegih Data Înkgaiky icchanijy ng
a Seeret Coe seaka by a "he cife fmce fpena
the data ikelf The eeeivey at Hu otheyed f
th line neceies H at al He chekalue
Daiz
Parg.
3.
Dijikt sighafoe The Dig1ad Siqnatus ija
Mediu by thich te sedia Can elechonically
Hhedata and ge ceives Can clectnically
ijnatue
Hhat Oinvolvei shawing He dw nexshik of asaivek
Key
4. Authenti catim exchayel- Hae authenticahen eAch
us
wes to entities to eAchanpe Some Messege to
rove teir jdenhk to each o ther
s Trafic Paddigi The to«fis badding means
in sen fing Same bass guhhih dat in t
data toic to eent He adesayle attemht

Routiug ntol Canl denteg


Qvaile outes betyen
cagiy difkrent
between He Senale anl He
Yeceive to boeNent He oh honent haoly Bom
eaves doopbig ana þaahcusy goite fa selak
taffic node
tousteo
tai þart to Combo t Cammy nicatiy hehuey

to lmfm thet a wser hes Suflicient actess


igdt to acleis and Jox aaclif tu dats
Puqe

Stuely af Aidig infocgtion.

ij af liafed clarely wit inforwsin Hhing


Cmguty Seluniy andenginerig
Can he bbadly clatified into tzey
Cagtgag
tic
(3)
Hashig
Sigl keg Cyhtagahly) an entik Cas sangsik
over a Ce mmai(aioa CRanhel by
Seeset key f botl encypho9 and
deoyitisn
2. Asymn ctic key Cybtog2ably' n ay nefaic
Cayasly Insteod of ne key, en Coyphiom
ano
keys one hud lis key amd anatter hoivek Key
J Haihing
3.
Inpoduce
hashing
di_est tom variatle legtt
Message biece This jessofl is enesly but
shter Hhay
tien misSion bo ty Hhe messae amd the msee
digest
þlayteat
plain teat
DEcybhis
plain tet' Thi; i; the oriii ked mese le tht
is to be trans femed thoougl tue nehuok wbile.
Main teniy it selseey and brivay . All the
encodiug teehnigues ane imhlesnentedpm tee

origiual luiakát le Contejig tue nfanating

6zigined þTaintt messap into the


eibhertest wiesce fo emsyne it secuaih ano
integoiy in a netwark tatfic
4- Dech, Re- tans fey matig of tu received
originadBlejn text he to exbact the benyfre
decoghtiom.
S Cgbtanasiyi Aaalyal and brcaking fay
eniyha ftext f deodiy it withoue
Kuowledge of itz inihad oaesiag mechaniuy

Cata nalysi ae Jointl alleol tolgy


Date
Page
12)

DLerene betem Symnetic and aymmetic Ena


Coybtagaahhic mecha ni,kkna Can be hroadly' claeitie
in to wo majn Catgoxies

Synmetric key coghtjy


encyhion and decyhn Booe botH. J+ is ae
Known a Conential enckhm sinple kag
Asy'a e fric Key Cyblizafkg
Oa d in cyhtajzafhic
neKey

public
* Conventian Encnybtin madeli
Symmetic enyti elis knouy as Canentionel
encaybtian
enCpho techsta in hth a siple Cemnm
key emhlged
dembtim f He jlain test tobe secured befere
ba miss lan th aa
hetwk
as Conven hional
ennhtim m Sile
Datz

(3
Sender Recejver
Plaintet
Plaintet

shared Seet ky shavet


Seret
Cipherfet 0 Cgher keat
Symyetic key éncatig bnccha nËgug
A
ASgmnetnc encybier schene
eheue has flloig
bleintex undessendable

A. inhut if penfermsvaxios
Encybtin' algoxitm
Sudstithtisns and faansfoming
data
3. Secret key i- The Secet
seaek Key , also fed an

cbon th blaintet andHe seesct key e


LihhereetF 0s actually a tandom and
inComfoehensible sheaa dat
He
nreres
l'oge

oYder accebts Hae ihhesetE


with the Seeset Key gemeaates tbe aiina
akt baik

The classe of Symmetzic encoyhhiag techifua


aclordlin to which encoyhig ef dats Can he
done wth a shard ke
classic encyha tehniQues

Susstituthy Cibher Transhosihy Cibhe


|Mono tþhasefic
aly Alhkadehe Kgless

Subsitutien cibhez Asbstitutim cihhes iA a


kMe aac enyptin hy whichShall unity of
hlajn te4 ae elaled witta cihherteat alndiy
o a shecific Sykn Tle unity my be
a
single
xe Ceinee deikhis the test by þerfming ay
0nvese suhtitutin over the cibhertest
Date.
Pag
LA)
(4) monodhhabeic ciþheaz:
cibhegi - A Chaasctey Y a Sybhel
f the
lajnteet alays ehlaced by the saue
is
chazactea r Sywn bal in he cipherteat epet
f ite þoSiim n ay weight age in te tezt
ve

Additiemanoelbkasetic ihhes
cibheos o shift ci7her
(2) Casex Cibhex
(3) mutbli Co tive cihhes
(92 Afine Cibhex
polyaphabebetic
fic chhery: A me thod to Jmhanue
h
H Simhle manoalbha betic mechamiß wn o
encnybtin is to se mible dieont mono -
albha betic subsitutis to þrocej tu hl&iy text
nedefl Thij ahbrach is Known aas þolyalbhabete
Sutbstttin cibher
* Tramsþosiim cihhesg
4
toamsþositi ciphes Aa4
enybim mechamig wm by which tha kositim held
ynits of þlainkat are shifkd acleading to
þermata tion of Hu blain text
(A)
cipher, teat is arranyed in g fask in a Columy -
fot
xangle. Railfence cibhey in which tr hlo'y text
Shue tune
and taniaiHed a
Poge

(B) keyed tognbosi tiog cibhess'.


ashosiiog cihhess the available blain tex! i
divided into blocKs o edeterained Size ant
a key is scd tohermute the chase tegs in ea
block individualy

CrgttanalysisAad the scËemce


analyzing a cibhextest
de coypt it and eshac? H hidedeninfoa
Melhani_ w Know a
Caytanalyi is H clas s
mehod scd to obtasy HaSource blajn text
o enypkd inforweio, wilhot acces to t
Seeset afoctiom whichi; norhally eqused
to dujo.
atteht to by bads nbyeak the Secunily offaofhe

* oyptognphic hateyi - Cyptanalysin Can be


heafarw)ed i humhez assumbion that
hous muth Can be obseaved or foyad oet ebaut
tue Syskus cenedea attack.
) cipherteat only! the Cyptanalyt has acesst
Calleetion
Code tes oihhextut or
Dare
Page

Crybtanalghie Attacks
Kyow
cibher teat þlainat
chopen
Chofey ciphereat
tontet
CgbtanalyHe Attacks
2) Knouw-}lajntexti- the atackess hai a sef cd
cibhes test to cwhich he Knous Hhe
pleintext Corrlponli
(3) choren plaintat i- the attacke Can obtaln the
cibhes texts (hlainkats) Csnjpandig to an
asblhray fet flajnteat of his bn chooslug
B) Adastie chegenhlaintest like aLchoien
blajn et attack, except Ha
attackes Can
Choase subseg uent hlain kat based ominfrstiog.
learnd om preuiews encyphiod
) Related Key attacki- Ot# is am attack Slila
to the chegen þlaineat attack, exce7t the aacke
Can obtein cihheskat encybeod ycler ts alifast
keys. Th u keys coe Unknown,but tae 2elatiashib'
between temi known
Date
Poge

Sycces:
Crgptanelysi
Gnalysis
pher Las knudsen (199) classifd
bs vaaouy hubesr
ts
dh attack on block cibhes pCLodiug ta
( ) Toad heak
e2 glbba deduetim
Instance deducicn
(4) Infocug in deduchen
(6) Distinquisbiug algenth
* Cenmblexity of Cybta nalysisi
Chaxoctezize by tae
Cam ako he

This Can he in th faml


the nuabex o pximi tive opeabos
which must be exfosmed Hai is Quite loose
þxiaifiwe oheasthnd (uld be hasic (omputer
primitine
iitucios such as addifim o entire
enybtiaM methuds.
Has amount of storae seqinegfo
a Haek

cibhestex seqired
Prge

stream ciphes stxegy cihhe ii a


encpiM ayeithwd in which cihhextutSymugelaic
cthut
strea dh plaiteat inht
shaved Key
Plainteat cibhes tut sre
Shen Enybfies. DECrybtig
Streqn ciþher en CMy phy
A stoeam cibhexi one Hhat encyta
dat streaa ne bit digubd
bit or one hy te at a tne
ciþhex whese blan teat hit
bita qe (ombined wit
hitShean
Streamcihhess are fester than block cib hes
e) the hasdwae mhlesaenta tiog aa shey cihker
amd taawmissiog oh bi
bitz i reguire ata ostant ak streauy
hhes hetteg Choice to wse
ase abeHex
2 stregm cibhess Coe aso moe resis fant
tasisSim
Date

(20

BloLk ciþhe Block Cibhey i G Symgebig


encyhtiaagezitha
whole jnto cibhexteat blolk of the Sa me

whiclaoperates cm
Hexned blocuss witth a

share y Giphertut
Bloch

plainteat De Cyhtin plajntest


Enugbtisa Bloc.

Block Ciþher emayþh

Advavtages df Block eibhes:


The bit
a steaa ciphe (an behig?ly
4plia hem
Bloch cihhezsat moé bobukaa and
Comuaaly

You might also like