20MCA33C-U1
20MCA33C-U1
SECURITY
[20MCA33C]
UNIT-I
Introduction to Cryptography
Faculty:
Dr.R.A.Roseline, M.Sc.,M.Phil.,Ph.D.,
Associate Professor and Head,
Post Graduate and Research Department of Computer Applications,
Government Arts College(Autonomous),Coimbatore-641 018.
SYLLABUS
Unit - I
Introduction to Cryptography – Security Attacks – Security Services – Security Algorithm – Stream cipher and
Block cipher – Symmetric and Asymmetric-key Cryptosystem Symmetric Key Algorithms: Introduction – DES –
Triple DES – AES – IDEA – Blowfish – RC5.
Unit - II
Public-key Cryptosystem: Introduction to Number Theory – RSA Algorithm – Key Management – Diffie-Hell man
Key exchange – Elliptic Curve Cryptography Message Authentication and Hash functions – Hash and Mac
Algorithm – Digital Signatures and Authentication Protocol.
Unit – III
Network Security Practice: Authentication Applications – Kerberos – X.509 Authentication services and Encryption
Techniques. E-mail Security – PGP – S / MIME – IP Security.
Unit – IV
Web Security – Secure Socket Layer – Secure Electronic Transaction. System Security – Intruders and Viruses –
Firewalls– Password Security
Unit - V
Case Study: Implementation of Cryptographic Algorithms – RSA – DSA – ECC (C / JAVA Programming). Network
Forensic – Security Audit – Other Security Mechanism: Introduction to: Stenography – Quantum Cryptography –
Water Marking – DNA Cryptography.
Computer Security
theprotection afforded to an automated
information system in order to attain the
applicable objectives of preserving the
integrity, availability and confidentiality of
information system resources (includes
hardware, software, firmware,
information/data, and telecommunications)
Key Security Concepts
Examples of Security
Requirements
confidentiality – student grades
integrity – patient information
availability – authentication service
OSI Security Architecture
ITU-T X.800 “Security Architecture for OSI”
defines a systematic way of defining and
providing security requirements
for us it provides a useful, if abstract,
overview of concepts we will study
Aspects of Security
consider 3 aspects of information security:
security attack
security mechanism
security service
note terms
threat – a potential for violation of security
attack – an assault on system security, a
deliberate attempt to evade security services
Passive Attacks
Active Attacks
Security Service
enhance security of data processing systems
and information transfers of an organization
intended to counter security attacks
using one or more security mechanisms
often replicates functions normally associated
with physical documents
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
Security Services
X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
Security Services (X.800)
Authentication - assurance that communicating
entity is the one claimed
have both peer-entity & data origin authentication
Access Control - prevention of the
unauthorized use of a resource
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is
as sent by an authorized entity
Non-Repudiation - protection against denial by
one of the parties in a communication
Availability – resource accessible/usable
Security Mechanism
feature designed to detect, prevent, or
recover from a security attack
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
hence our focus on this topic
Security Mechanisms (X.800)
specific security mechanisms:
encipherment, digital signatures, access
Key Size (bits) Number of Alternative Time required at 1 Time required at 106
Keys decryption/µs decryptions/µs
32 232 = 4.3 109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2 1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation)
Feistel Cipher Structure
Horst Feistel devised the feistel cipher
based on concept of invertible product cipher
partitions input block into two halves
process through multiple rounds which
perform a substitution on left data half
based on round function of right half & subkey
then have permutation swapping halves
implements Shannon’s S-P net concept
Feistel Cipher Structure
Feistel Cipher Design Elements
block size
key size
number of rounds
subkey generation algorithm
round function
fast software en/decryption
ease of analysis
Data Encryption Standard (DES)