Network and Cybersecurity 10
Network and Cybersecurity 10
Security Mechanisms are techniques to implement these services: Encryption, Digital Signatures,
MACs, Access Control Lists.
Service Mechanism
Confidentiality Encryption
Conclusion: CBC is more secure, suitable for large and sensitive data.
Example:
Process:
Example:
Advantages:
Definition: When more data is written to a buffer than it can hold, overwriting adjacent memory.
Consequences:
Program crash.
Example:
char buffer[10];
gets(buffer);
Prevention:
Input validation.
Stack canaries.
ASLR.
Steps:
2. Calculate N = p*q.
Answer:
\u03d5(N) = 160
Private key d = 23
Ciphertext = 143
3. Role of S-box:
o Provides non-linearity.
5. Possible Attacks:
o Differential Cryptanalysis.
o Linear Cryptanalysis.
Conclusion: Although old, DES laid the foundation for modern encryption standards.
Goals:
Data Integrity.
MD5:
Use:
Steps:
Impact:
Server crash.
Service unavailability.
Example:
Why Required:
Confidentiality:
Authentication:
Working:
Rules:
Examples:
\u03c6(11) = 10
\u03c6(49) = 49 - 7 = 42
\u03c6(240) = 240*(1-1/2)(1-1/3)(1-1/5) = 64
Kerberos:
Working:
SSL Protocols:
End of Document