0% found this document useful (0 votes)
8 views32 pages

IS_NIS_Differentiate Between

The document compares and contrasts various concepts in cryptography, cryptology, steganography, and malware, detailing their definitions, applications, and security principles. It highlights the differences between techniques such as substitution and transposition ciphers, as well as various types of malware like viruses and worms. Additionally, it discusses the roles of firewalls and antivirus software in cybersecurity.

Uploaded by

mrpython456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views32 pages

IS_NIS_Differentiate Between

The document compares and contrasts various concepts in cryptography, cryptology, steganography, and malware, detailing their definitions, applications, and security principles. It highlights the differences between techniques such as substitution and transposition ciphers, as well as various types of malware like viruses and worms. Additionally, it discusses the roles of firewalls and antivirus software in cybersecurity.

Uploaded by

mrpython456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Parameters Cryptography Cryptology

Cryptography is the process of Cryptology Is the process of


Defini on conversion of plain text to cipher conversion of plain text to cipher
text. text and vice versa.

Cryptography takes place on the It takes place on the sender and


User Side
sender’s side receiver side

It is also called the study of Cryptography is also called the


Study Focus
encryp on and decryp on. study of encryp on

In Cryptology, both the sender


Message In Cryptography, the sender sends
and receiver send messages to
Exchange the message to the receiver.
each other.

Cryptography can be seen as the Cryptology can be seen as the


Rela onship
subset of Cryptology. superset of Cryptography

Cryptography deals with the


Cryptology deals with the study
Scope techniques of secure
of secure communica on.
communica on.

Cryptology focuses on the


Cryptography focuses on the
Focus theore cal and mathema cal
prac ce of hiding informa on
aspects of informa on security

Cryptography involves encryp on,


Cryptology involves the study of
Components decryp on, and authen ca on
codes, ciphers, and cryptanalysis
techniques
Parameters Cryptography Cryptology

Cryptography is concerned with Cryptology is concerned with


Ac vi es developing algorithms and analyzing and breaking exis ng
protocols encryp on methods

Cryptography is u lized in various Cryptology is u lized in academia


Applica ons fields such as finance, e- and research to understand and
commerce, and na onal security improve encryp on
Transposition Cipher
Substitution Cipher Technique Technique

In substitution Cipher Technique,


In transposition Cipher Technique,
plain text characters are replaced
plain text characters are rearranged
with other characters, numbers and
with respect to the position.
symbols.

Substitution Cipher’s forms are:


Transposition Cipher’s forms are:
Mono alphabetic substitution cipher
Key-less transposition cipher and
and poly alphabetic substitution
keyed transposition cipher.
cipher.

While in transposition Cipher


In substitution Cipher Technique,
Technique, The position of the
character’s identity is changed while
character is changed but character’s
its position remains unchanged.
identity is not changed.

While in transposition Cipher


In substitution Cipher Technique, The
Technique, The Keys which are
letter with low frequency can detect
nearer to correct key can disclose
plain text.
plain text.

The example of transposition


The example of substitution Cipher is
Cipher is Rail Fence Cipher,
Caesar Cipher, monoalphabetic
columnar transposition cipher, and
cipher, and polyalphabetic cipher.
route cipher.

Involves replacing plaintext letters or Involves rearranging the order of


groups of letters with ciphertext the plaintext letters or groups of
letters or groups of letters according letters according to a specific
to a specific algorithm or key. algorithm or key.

The frequency distribution of the


The frequency distribution of the
plaintext letters remains the same,
plaintext letters is typically obscured,
but the order is scrambled, making
but patterns can still be detected
it difficult to detect patterns with
with statistical analysis.
statistical analysis.
Transposition Cipher
Substitution Cipher Technique Technique

Vulnerable to frequency analysis


Less vulnerable to frequency
attacks, where the most commonly
analysis attacks, but still
used letters or letter combinations in
susceptible to attacks such as brute
the language can be identified and
force and known plaintext attacks.
used to deduce the key.

Relatively easy to understand and Can be more difficult to implement


implement, making it suitable for and understand, but can be more
simple applications. secure than substitution ciphers for
certain applications.

Basis Steganography Cryptography

Defini o steganography means covered


cryptography means secret wri ng.
n wri ng.

popularit Steganography is less popular than While cryptography is more popular


y Cryptography. than Steganography.

A ack The a ack’s name in Steganography In cryptography, the A ack’s name


Name is Steganalysis. is cryptanalysis.

Data
In steganography, the structure of While in cryptography, the structure
Altera o
data is not usually altered. of data is altered.
n
Basis Steganography Cryptography

Cryptography
Steganography supports Confiden ality and Authen
Security
supports Confiden ality and Authen ca on security principles as well
Principles
ca on security principles. as Data integrity and Non-
repudia on.

In steganography, the fact that a


While in cryptography only a secret
Visibility secret communica on is taking place
message is hidden.
is hidden.

Mathem
In steganography, not many Cryptography involves the use of
a cal
mathema cal transforma ons are number theory, mathema cs, etc. to
Involvem
involved. modify data
ent

Informa
In Steganography the informa on is In cryptography, the informa on is
on
hidden. transformed.
Handling

Informa
The hidden informa on is not
on Transformed informa on is visible.
visible.
Visibility

Cryptography Provides
Security Steganography Provides
Confiden ality, Integrity, Non-
Services Confiden ality only.
repudia on.

Algorith Steganography doesn’t have specific Cryptography has Various recognized


ms algorithms. and approved algorithms.
Basis Steganography Cryptography

The goal of steganography is to


The main goal of cryptography is to
make the informa on invisible to
Goal keep the contents of the message
anyone who doesn’t know where to
secret from unauthorized access.
look or what to look for

Encryp on Cryptography

It is a process of encoding message or It is study of techniques such as


informa on so that only authorized par es encryp on for secure communica on in
can have access to it. presence of third par es.

It is considered as art of crea ng codes


It is considered as principal applica on
using techniques of encryp on
of cryptography.
and decryp on.

It simply provides methods of protec ng


It simply uses algorithm to encrypt data and
data through encryp on and its related
secret key to decrypt it.
processes.

It is all about mathema cal and algorithmic in It is all about techniques and
nature. technologies in nature.
Encryp on Cryptography

Its main purpose is confiden ality that means Its main purpose is to apply complex
concealing content of message by transla ng mathema cs and logic to design strong
it into code. encryp on methods.

Types of encryp on Types of cryptography


includes symmetric and asymmetric includes symmetric key cryptography
encryp on. and asymmetric key cryptography.

In provides techniques like encryp on


techniques that can guard informa on
It provides security to data all mes,
and communica on, cryptographic
maintains integrity, protects privacy, protects
technique like MAC and digital
data across devices, etc.
signatures to protect informa on
against spoofing and forgeries.

It has symmetric and asymmetric


It follows same approach with some terms
version with concept of shared and non-
like ciphertext, plaintext, and cipher.
shared key.

It is useful to modern data security such as It is useful in electronic commerce,


digital signatures and protect sensi ve military communica ons, chip-based
electronic data such as emails and card payments, digital currencies, me
passwords. stamping, etc.
Cyber Security Cryptography

It is a process of keeping informa on


It is a process of keeping networks, devices,
secret and safe simply by conver ng it
programs, data secret and safe from
into unintelligible informa on and vice-
damage or unauthorized access.
versa.

It is all about managing cyber risks in all It is all about math func ons and can be
aspects such as people, process, technology, applied in technical solu ons for
etc. increasing cybersecurity.

Its main objec ve is to keep plain text


Its main objec ve is to prevent or mi gate
secret from eavesdroppers who are trying
harm or destruc on of computer networks,
to have access to some informa on about
applica ons, devices, and data.
the plain text.

It is generally used for the protec on of


It is generally used for integrity, en ty
internet-connected systems like so ware,
authen ca on, data origin
hardware, and data, risk management,
authen ca on, non-repudia on, etc.
disaster planning, access control, policies.

It protects the system against


It protects authen ca on and data across
viruses, worms, unwanted programs, etc.,
devices, maintains integrity, provides
protects the computer from being hacked,
Cyber Security Cryptography

reduces computer freezing and crashes, privacy to its best, allows two par es to
provides privacy to users, etc. communicate securely, etc.

It makes cryptography one of its subsets and


uses it to design algorithms, ciphers, and It is an automated mathema cal tool that
security measures that usually codify and is used to enhance and improve
keep company and customer data cybersecurity.
protected.

It generally mi gates or reduces cyber-


It generally involves the implementa on of
crime simply by using elaborate design to
specific procedures to keep data safe.
encrypt messages.
Worms Viruses

A Virus is a malicious executable


A Worm is a form of malware that code a ached to another
replicates itself and can spread to executable file that can be
different computers via a Network. harmless or can modify or delete
Defini on data.

The main objec ve of worms is to


eat the system’s resources. It
consumes system resources such as The main objec ve of viruses is to
memory and bandwidth and makes modify the informa on.
the system slow in speed to such an
Objec ve extent that it stops responding.

It doesn’t need a host to replicate It requires a host is needed for


Host from one computer to another. spreading.

Harmful It is less harmful as compared. It is more harmful.

Detec on Worms can be detected and


an virus so ware is used for
and removed by the an virus and
protec on against viruses.
Protec on firewall.

Controlled Viruses can’t be controlled by


Worms can be controlled by remote.
by remote.
Worms Viruses

Worms are executed via weaknesses Viruses are executed


Execu on in the system. via executable files.

Worms generally come from the


Viruses generally come from
downloaded files or through a
shared or downloaded files.
Comes from network connec on.

1. Hampering computer performance 1. Pop-up windows linking to


by slowing down it malicious websites

2. Automa c opening and running of 2. Hampering computer


programs performance by slowing down it

3. Sending of emails without your 3. A er boo ng, star ng of


Symptoms knowledge unknown programs.

Boot sector viruses, Direct


Internet worms, Instant messaging Ac onvirusess,
worms, Email worms, File sharing Polymorphicvirusess, Macro
worms, and Internet relay chat (IRC) viruses, Overwritevirusess, and File
worms are different types of worms. Infector viruses are different types
Types of viruses

Examples of worms include Morris Examples of viruses include


Examples worm, storm worm, etc. Creeper, Blaster, Slammer, etc.

It does not need human ac on to


It needs human ac on to replicate.
Interface replicate.

Its spreading speed is slower as


Its spreading speed is faster.
Speed compared to worms.
Firewall An virus

Firewall is implemented in both hardware An virus is implemented in so ware


and so ware. only.

An virus deals with both external threats


Firewall deals with external threats only.
and internal threats.

In firewall counter a acks are possible such In an virus no counter a acks are
as IP Spoofing and rou ng a acks. possible a er removing the malware.

An virus works on Scanning of infected


Firewall works on monitoring and filtering.
files and so ware.
Firewall An virus

Firewall checks the threat from incoming An virus checks the threat from
packets. malicious so ware.

Firewall saves the system from all kinds of An virus saves the system only from
threats to the system. viruses.

Firewall’s programming is complex than An virus’s programming is simpler as


an virus. comparison to firewall.

S.No. MALWARE TROJAN HORSE

Malware is a file or a code, designed to cause Trojan Horse is a form of malware that capture some
1. damage to a user’s personal computer and important informa on about a computer system or a
network. computer network.

2. Malware is more harmful than trojan horse. Trojan horse is less harmful than Malware.

Malware can be detected and removed by the


3. Trojan horses are detected by the an virus so ware.
an virus program.
Malware can replicate itself and makes
4. While, trojan horse can not self-replicate
duplicate copy of it.

It can destroy data and resources, cause error It also give unauthorized access and control of the syst
5.
and slow down the performance. to the hackers.

Malware covers a lot of different malicious


6. Trojan Horse is one of the type of malware.
so ware.

Viruses, worms, Trojan viruses, spyware,


Back orifice, Rootkit and Beast Trojan are some of the
7. adware, and ransomware are some of the
common Trojan horses.
common malware.

S.No. ROOTKIT VIRUS

Rootkit is set of malicious program that enables A Virus is a malicious executable code a ached to
1. administrator-level access to a computer another executable file which can be harmless or can
network. modify or delete data.

The main objec ve of rootkit is to steal the


2. iden ty informa on, o en to gain control of a The main objec ve of virus is to modify the informa o
system.

Detec ng and removing a rootkit is a complex


An virus so ware are used for protec on against
3. process and typically requires the use of
viruses.
specialized tools.

4. Rootkit is one of the type of malware. Virus is one of the type of malware.
It give unauthorized access and control of the It can control data and resources, cause error, destroy
5.
system to the a acker. system and slow down the performance.

6. It is more harmful. It is less harmful as compared.

TDSS, ZeroAccess, Alureon and Necurs are some Resident and Non -resident viruses are two types of
7.
of the common rootkit. Virus.

S.No. ROOTKIT WORMS

Rootkit is set of malicious program that enables A Worm is a form of malware that replicates itse
1.
administrator-level access to a computer network. and can spread to different computers via Netwo

The main objec ve of rootkit is to steal the iden ty The main objec ve of worms to eat the system
2.
informa on, o en to gain control of a system. resources.

Detec ng and removing a rootkit is a complex


Worms can be detected and removed by the
3. process and typically requires the use of specialized
An virus and firewall.
tools.

4. Rootkit is one of the type of malware. Worms is one of the type of malware.

5. It is more harmful as compared. It is less harmful as compared.

It give unauthorized access and control of the system It can give unauthorized access and control of th
6.
to the a acker. system to the hackers.

TDSS, ZeroAccess, Alureon and Necurs are some of Morris Worm, Storm Worm and SQL Slammer ar
7.
the common rootkit. some of the examples of worms.
Worms Trojan Horse

A Worm is a form of malware that Trojan Horse is a form of malware that capture
replicates itself and can spread to some important informa on about a
different computers via Network. computer system or a computer network.

The main objec ve of worms to eat the The main objec ve of the trojan horse is to
system resources. control the ac vity of the system.

Worms can be detected and removed Trojan horses are detected by the an virus
by the An virus and firewall. so ware.

Worms are self replica ng. Trojan horse are not self replica ng.

It doesn’t need a host to replicate from


It require host is needed for spreading.
one computer to another.

It can give unauthorized access and It also give unauthorized access and control of
control of the system to the hackers. the system to the hackers.

It is less harmful as compared. It is more harmful as compared.

Morris Worm, Storm Worm and SQL


Back orifice, Rootkit and Beast Trojan are
Slammer are some of the examples of
some of the common Trojan horses.
worms.

Worms are executed via weaknesses in Trojan horse executes through a program and
system. interprets as u lity so ware.
S.No. VIRUS SPYWARE

A Virus is a malicious executable code a ached to another


Spyware is a form of malware designed t
1. executable file which can be harmless or can modify or delete
collect your personal informa on.
data.

The main objec ve of the spyware is to


2. The main objec ve of virus is to modify the informa on.
monitor the ac vity of the system.

Spyware can be detected and removed b


3. An virus so ware are used for protec on against viruses.
the an -spyware program.

It provides profit to the third party by


It can control data and resources, cause error, destroy system
4. collec ng data of user without his
and slow down the performance.
awareness.

5. It is more harmful. It is less harmful as compared.

6. Virus replicates itself. Spyware does not replicate itself.

Bonzibuddy, Cydore and Downloadware


7. Resident and Non-resident viruses are two types of Virus.
some examples of spyware.
Authen ca on Authoriza on

In the authe ca on process, the While in authoriza on process, a the person’s


iden ty of users are checked for or user’s authori es are checked for accessing
providing the access to the system. the resources.

In the authen ca on process, users or While in this process, users or persons are
persons are verified. validated.

It is done before the authoriza on While this process is done a er the


process. authen ca on process.

While it needs the user’s privilege or security


It needs usually the user’s login details.
levels.

Authen ca on determines whether the While it determines What permission does


person is user or not. the user have?

Generally, transmit informa on through Generally, transmit informa on through an


an ID Token. Access Token.

The OpenID Connect (OIDC) protocol is


an authen ca on protocol that is The OAuth 2.0 protocol governs the overall
generally in charge of user system of user authoriza on process.
authen ca on process.

Popular Authen ca on Techniques- Popular Authoriza on Techniques-


 Password-Based Authen ca on  Role-Based Access Controls (RBAC)
 Passwordless Authen ca on  JSON web token (JWT) authoriza on
 2FA/MFA (Two-Factor  SAML Authoriza on
Authen ca on / Mul -Factor
Authen ca on)  OpenID Authoriza on
Authen ca on Authoriza on

 Single-Sign-On(SSO)  OAuth 2.0 Authoriza on

 Social authen ca on

The authoriza on permissions cannot be


The authen ca on creden als can be
changed by user as these are granted by the
changed in part as and when required
owner of the system and only he/she has the
by the user.
access to change it.

The user authen ca on is visible at user The user authoriza on is not visible at the
end. user end.

The user authen ca on is iden fied


The user authoriza on is carried out through
with username, password, face
the access rights to resources by using roles
recogni on, re na scan, fingerprints,
that have been pre-defined.
etc.

Example: Employees in a company are Example: A er an employee successfully


required to authen cate through the authen cates, the system determines what
network before accessing their informa on the employees are allowed to
company email. access.

DOS DDOS

DDOS Stands for Distributed Denial of


DOS Stands for Denial of service a ack.
service a ack.

In Dos a ack single system targets the In DDoS mul ple systems a acks the vic ms
vic m system. system..
DOS DDOS

Vic m PC is loaded from the packet of Vic m PC is loaded from the packet of data
data sent from a single loca on. sent from Mul ple loca on.

Dos a ack is slower as compared to


DDoS a ack is faster than Dos A ack.
DDoS.

It is difficult to block this a ack as mul ple


Can be blocked easily as only one system
devices are sending packets and a acking
is used.
from mul ple loca ons.

In DOS A ack only single device is used In DDoS a ack, The volumeBots are used to
with DOS A ack tools. a ack at the same me.

DOS A acks are Easy to trace. DDOS A acks are Difficult to trace.

DDoS a acks allow the a acker to send


Volume of traffic in the Dos a ack is less
massive volumes of traffic to the vic m
as compared to DDos.
network.

Types of DOS A acks are: 1. Buffer


Types of DDOS A acks are: 1. Volumetric
overflow a acks 2. Ping of Death or ICMP
A acks 2. Fragmenta on A acks 3.
flood 3. Teardrop A ack 4. Flooding
Applica on Layer A acks 4. Protocol A ack.
A ack

ymmetric Key Encryp on Asymmetric Key Encryp on

It requires two keys, a public key and a


It only requires a single key for both
private key, one to encrypt and the other
encryp on and decryp on.
to decrypt.
ymmetric Key Encryp on Asymmetric Key Encryp on

The size of ciphertext is the same or smaller The size of ciphertext is the same or larger
than the original plaintext. than the original plaintext.

The encryp on process is very fast. The encryp on process is slow.

It is used when a large amount of data


It is used to transfer small amount of data.
needs to be transferred.

It provides confiden ality, authen city,


It only provides confiden ality.
and non-repudia on.

The length of key used is 128 or 256 bits The length of key used is 2048 or higher

In symmetric key encryp on, resource


In asymmetric key encryp on, resource
u liza on is low compared to asymmetric
u liza on is high.
key encryp on.

It is efficient as it is used for handling large It is compara vely less efficient as it can
amount of data. handle a small amount of data.

Security is higher as two keys are used,


Security is lower as only one key is used for
one for encryp on and the other for
both encryp on and decryp on purposes.
decryp on.

The Mathema cal Representa on is as


The Mathema cal Representa on is as
follows-
follows-
P = D(Kd, E (Ke,P))
P = D (K, E(K, P))
where Ke –> encryp on key
where K –> encryp on and decryp on key
Kd –> decryp on key
P –> plain text
D –> Decryp on
ymmetric Key Encryp on Asymmetric Key Encryp on

D –> Decryp on E(Ke, P) –> Encryp on of plain text using


E(K, P) –> Encryp on of plain text using K encryp on key Ke. P –> plain text

Examples: Diffie-Hellman, ECC, El Gamal,


Examples: 3DES, AES, DES and RC4
DSA and RSA

S.No AES DES

DES stands for Data Encryp on


AES stands for Advanced Encryp on Standard
1. Standard

2. The date of crea on is 2001. The date of crea on is 1977.

3. Byte-Oriented. Bit-Oriented.

Key length can be 128-bits, 192-bits, and 256-


The key length is 56 bits in DES.
4. bits.

Number of rounds depends on key length: DES involves 16 rounds of


5. 10(128-bits), 12(192-bits), or 14(256-bits) iden cal opera ons

The structure is based on a subs tu on- The structure is based on


6. permuta on network. a Fiestel network.

The design ra onale for DES is


The design ra onale for AES is open.
7. closed.
S.No AES DES

The selec on process for this is secret but The selec on process for this is
8. accepted for open public comment. secret.

DES can be broken easily as it has


AES is more secure than the DES cipher and is known vulnerabili es. 3DES(Triple
the de facto world standard. DES) is a varia on of DES which is
9. secure than the usual DES.

The rounds in DES are: Expansion,


The rounds in AES are: Byte Subs tu on, Shi
XOR opera on with round key,
Row, Mix Column and Key Addi on
10. Subs tu on and Permuta on

DES can encrypt 64 bits of


AES can encrypt 128 bits of plaintext.
11. plaintext.

It can generate Ciphertext of 128, 192, 256


It generates Ciphertext of 64 bits.
12. bits.

AES cipher is derived from an aside-channel DES cipher is derived from Lucifer
13. square cipher. cipher.

AES was designed by Vincent Rijmen and Joan


DES was designed by IBM.
14. Daemen.

No known cryptanaly cal a acks against AES


but side channel a acks against AES Known a acks against DES include
implementa ons possible. Biclique a acks Brute-force, Linear crypt-analysis,
have be er complexity than brute force but and Differen al crypt-analysis.
15. s ll ineffec ve.

16. It is faster than DES. It is slower than AES.


S.No AES DES

17. It is flexible. It is not flexible.

It is efficient with both hardware and


It is efficient only with hardware.
18. so ware.

Categories Plaintext Cleartext

The unencrypted data is used as an The data is unencrypted and is


input for the encryp on process or as not intended for the encryp on
Defini on the output for the decryp on process. process.

Windows stores passwords in


A browser, word processor, or email cleartext such as autologin
Applica ons username and password.

Used by various higher


As they are so easy to work with, they authori es so that others can
can all be stored in the same folder. not interfere in their private
Advantages affairs.

No standard way to specify the data It is too complicated for a


Disadvantages format. human to understand.
Categories HIDS NIDS

Defini on Host IDS Network IDS

Type It doesn’t work in real- me Operates in real- me

HIDS is related to just a single NIDS is concerned with the


system, as the name suggests it is en re network system;
Concern only concerned with the threats NIDS examines the
related to the Host ac vi es and traffic of all
system/computer, the systems in the network.

HIDS can be installed on each and NIDS being concerned with


Installa on the network is installed at
every computer or server i.e.,
Point places like routers or
anything that can serve as a host.
servers as these are the
Categories HIDS NIDS

main intersec on points in


the network system

HIDS operates by taking the


snapshot of the current status of
NIDS works in real- me by
the system and comparing it against
Execu on closely examining the data
some already stored malicious
flow and immediately
Process tagged snapshots stored in the
repor ng anything
database, this clearly shows that
unusual.
there is a delay in its opera on and
ac vi es

As the network is very large


making it hard to keep
HIDS are more informed about the
Informa on track of the integra ng
a acks as they are associated with
About A ack func onali es, they are
system files and processes.
less informed of the
a acks

Ease of As it needs to be installed on every Few installa on points


host, the installa on process can be make it easier to install
Installa on resome. NIDS
Categories HIDS NIDS

Response
Response me is slow Fast response me
Time

Subs tu on Cipher Technique Transposi on Cipher Technique

In subs tu on Cipher Technique, plain In transposi on Cipher Technique, plain text


text characters are replaced with other characters are rearranged with respect to the
characters, numbers and symbols. posi on.

Subs tu on Cipher’s forms are: Mono


Transposi on Cipher’s forms are: Key-less
alphabe c subs tu on cipher and poly
transposi on cipher and keyed transposi on cipher.
alphabe c subs tu on cipher.
Subs tu on Cipher Technique Transposi on Cipher Technique

In subs tu on Cipher Technique, While in transposi on Cipher Technique, The


character’s iden ty is changed while its posi on of the character is changed but character’s
posi on remains unchanged. iden ty is not changed.

In subs tu on Cipher Technique, The While in transposi on Cipher Technique, The Keys
le er with low frequency can detect which are nearer to correct key can disclose plain
plain text. text.

The example of subs tu on Cipher is The example of transposi on Cipher is Rail Fence
Caesar Cipher, monoalphabe c cipher, Cipher, columnar transposi on cipher, and route
and polyalphabe c cipher. cipher.

Involves replacing plaintext le ers or


Involves rearranging the order of the plaintext
groups of le ers with ciphertext le ers
le ers or groups of le ers according to a specific
or groups of le ers according to a
algorithm or key.
specific algorithm or key.

The frequency distribu on of the The frequency distribu on of the plaintext le ers
plaintext le ers is typically obscured, remains the same, but the order is scrambled,
but pa erns can s ll be detected with making it difficult to detect pa erns with sta s cal
sta s cal analysis. analysis.

Vulnerable to frequency analysis


a acks, where the most commonly Less vulnerable to frequency analysis a acks, but
used le ers or le er combina ons in s ll suscep ble to a acks such as brute force and
the language can be iden fied and known plaintext a acks.
used to deduce the key.

Rela vely easy to understand and


Can be more difficult to implement and understand,
implement, making it suitable for
but can be more secure than subs tu on ciphers for
simple applica ons.
certain applica ons.
Subs tu on Cipher Technique Transposi on Cipher Technique

A ribute Firewall Ids

Monitors and controls


Monitors network traffic
incoming and outgoing
for suspicious ac vity or
Func on network traffic based on
pa erns that may indicate
predetermined security
a security threat
rules

Can be deployed as a Can be deployed as a


hardware appliance, hardware appliance,
Deployment
so ware applica on, or so ware applica on, or
cloud-based service cloud-based service

Primarily focuses on Primarily focuses on


Focus blocking unauthorized detec ng and responding
access to a network to security incidents

May generate alerts based Generates alerts based on


Alerts on predefined rules for anomalous behavior or
network traffic known a ack signatures

Can block or allow network Can alert administrators to


Response traffic based on predefined take ac on in response to
rules detected threats
Cryptographic Error Ini aliza on Key Applica on in Real
Nature Offering
Mode Propaga on Vector Life

Basic encryp on for small


Confiden alit
ECB Block No No data sets, o en found in
y
database cells

Widely used for data


Confiden alit
CBC Block Yes Yes encryp on in protocols
y
like TLS

Confiden alit Stream cipher, o en used


CFB Stream Yes Yes
y in protocols like OpenPGP

Confiden alit Stream cipher, used in


OFB Stream No Yes
y VPNs and disk encryp on

DES AES
Cryptographic Low High
Strength
Key Size 56-Bit 128,192 and 256
bit
Block Size 64- Bit 128-Bit
Rounds 16 10,12,14-based on
key size
Usage Obsolete-Not used Currently used
industry standard

Feature Digital Signature Digital Cer ficate

Basics / A digital signature secures Digital cer ficate is a file


Defini on the integrity of a digital that ensures holder’s
document in a similar way iden ty and provides
as a fingerprint or security.
a achment.
Process / Hashed value of original It is generated by CA
Steps data is encrypted using (Cer fying Authority)
sender’s private key to that involves four steps:
generate the digital Key Genera on,
signature. Registra on,
Verifica on, Crea on.

Security Authen city of It provides security


Services Sender, integrity of the and authen city of
document and non- cer ficate holder.
repudia on.
Standard It follows Digital Signature It follows X.509
Standard (DSS). Standard Format

You might also like