0% found this document useful (0 votes)
2 views

Network Security and Cryptography Notes Full

The document provides detailed notes on network security and cryptography, covering topics such as security attacks, cryptographic techniques, and various encryption methods like DES and AES. It also discusses cryptanalysis, hash functions, and security standards, along with practical applications in authentication and secure communication. Additionally, it addresses system security measures, intrusion detection, and prevention systems.

Uploaded by

shutupaaryaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Network Security and Cryptography Notes Full

The document provides detailed notes on network security and cryptography, covering topics such as security attacks, cryptographic techniques, and various encryption methods like DES and AES. It also discusses cryptanalysis, hash functions, and security standards, along with practical applications in authentication and secure communication. Additionally, it addresses system security measures, intrusion detection, and prevention systems.

Uploaded by

shutupaaryaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Network Security and Cryptography - Detailed Notes

UNIT 1

1. Introduction to Security Attacks, Services, and Mechanisms

- Security Attacks: Actions that compromise the security of information. Attacks are mainly categorized as:

- Passive Attacks: Aim to learn or make use of information without affecting system resources. Examples:

eavesdropping, traffic analysis.

- Active Attacks: Involve modification of the data stream or creation of false statements. Examples: masquerade,

replay, modification of messages, denial of service (DoS).

- Security Services: Mechanisms to protect data and resources:

- Confidentiality, Integrity, Authentication, Non-repudiation, Access Control, Availability.

- Security Mechanisms: Tools and protocols that implement security services, like encryption, digital signatures,

firewalls, etc.

2. Introduction to Cryptography and Basic Cryptographic Techniques

- Cryptography: Science of protecting data through encoding.

- Basic Techniques:

- Substitution Ciphers: Replace characters (e.g., Caesar Cipher).

- Transposition Ciphers: Rearrange characters (e.g., Rail Fence).

- Symmetric Encryption: Same key for encryption and decryption (e.g., DES).

- Asymmetric Encryption: Uses a public/private key pair (e.g., RSA).

3. Computational Complexity

- Determines the feasibility of solving cryptographic problems using current hardware.

- Cryptographic algorithms rely on problems that are computationally infeasible to solve.

- Many cryptographic schemes are based on NP-hard problems.

4. Finite Fields

- A set with a finite number of elements where arithmetic operations are defined.

- Example: Galois Field GF(2^n) used in AES.

5. Number Theory
- Study of integers, especially prime numbers.

- Important concepts: modular arithmetic, Euclidean algorithm, Euler's theorem, Fermat's Little Theorem.

- Foundation of many public key cryptosystems.

6. DES and AES

- DES: 64-bit block cipher using 56-bit keys and 16 rounds. Vulnerable to brute-force attacks.

- AES: Operates on 128-bit blocks using 128, 192, or 256-bit keys. Highly secure and fast.

7. Public Key Cryptosystems

- Uses public key for encryption and private key for decryption.

- Based on hard mathematical problems like integer factorization (RSA), discrete logarithms (ElGamal), or elliptic curves

(ECC).

8. IDEA Encryption and Decryption

- IDEA: Symmetric cipher operating on 64-bit blocks with a 128-bit key.

- Uses XOR, modular addition, and multiplication to confuse and diffuse the data.

9. Strength of IDEA

- Strong resistance to differential and linear cryptanalysis.

- No successful attacks known against full-round IDEA.

10. Traffic Confidentiality

- Hides metadata like source/destination, message length, frequency, and timing.

- Techniques: Padding, dummy traffic, traffic mixing.

11. Cryptanalysis

- Study of breaking cryptographic algorithms.

- Types: Brute-force, differential, linear, algebraic, side-channel attacks.

12. Intractable (Hard) Problems

- Problems with no efficient solution known.

- Examples: Discrete logarithm problem, integer factorization.


13. Hash Functions

- Produce a fixed-size hash from input data of arbitrary size.

- Properties: One-wayness, collision resistance, fast computation.

14. OSI Security Architecture Privacy of Data

- OSI model layered security approach.

- Security mechanisms apply at each layer to ensure end-to-end protection.

UNIT 2

1. Cryptanalysis: Linear and Differential Cryptanalysis

- Linear: Uses linear approximations to describe cipher behavior.

- Differential: Analyzes how differences in plaintext affect ciphertext.

2. DES

- 64-bit blocks using 56-bit keys.

- 16 rounds of Feistel network. Vulnerable to brute-force.

3. Triple DES

- Applies DES three times with two/three keys.

- Better security but slower.

4. Message Authentication and Digital Signatures

- Message Authentication: Ensures data authenticity and integrity.

- Digital Signature: Encrypted hash using sender's private key.

5. Attacks on Protocols

- Exploiting protocol weaknesses. Examples: Replay, MITM, session hijacking.

6. Elliptic Curve Architecture and Cryptography

- Uses elliptic curves over finite fields.

- Provides security with smaller key sizes.


7. Public Key Cryptography and RSA

- RSA: Modular exponentiation and large prime factorization.

- Common in SSL/TLS.

8. Evaluation Criteria for AES

- Security, simplicity, flexibility, performance, cost.

9. Key Management

- Generating, distributing, revoking, storing encryption keys securely.

10. Introductory Idea of ECC

- Efficient public key cryptography using elliptic curves.

11. ElGamal Encryption

- Based on discrete logarithm problem.

- Random number used in encryption for added security.

UNIT 3

1. Buffer Overflow Attack

- Overflows memory buffer leading to arbitrary code execution.

2. Distributed Denial of Service (DDoS) Attack

- Many systems flood a target, disrupting services.

3. Weak Authentication

- Insecure methods allowing unauthorized access.

4. Design of Substitution Boxes (SBoxes)

- Used in symmetric ciphers for non-linearity.

5. Hash Functions

- Fixed-length hash values for data integrity verification.


6. Security of Hash Functions

- Must resist pre-image, second pre-image, and collision attacks.

7. Secure Hash Algorithm (SHA)

- SHA-1 (obsolete), SHA-2 (secure), SHA-3 (new structure).

8. Authentication Applications

- Passwords, OTPs, smart cards, biometrics.

9. Kerberos

- Ticket-based authentication using symmetric cryptography.

10. IP Security (IPSec)

- Secure IP communication via AH and ESP protocols.

11. Pretty Good Privacy (PGP)

- Hybrid encryption for email security.

12. S/MIME

- Email encryption using X.509 certificates.

13. Web Security and Lightweight Cryptography

- HTTPS, TLS; lightweight algorithms for IoT/mobile.

14. Side Channel Attacks

- Based on timing, power usage, electromagnetic leaks.

UNIT 4

1. System Security

- Protecting systems through secure boot, access control, patching.


2. Security Standards

- ISO/IEC 27001, NIST standards for cryptography.

3. Intruders and Viruses

- Intruders: Unauthorized users; Viruses: Self-replicating malicious code.

4. Firewalls

- Control traffic using rules. Types: Packet filtering, stateful, proxy.

5. Malicious Software

- Malware includes viruses, worms, trojans, ransomware.

6. Intrusion Detection System (IDS)

- Detects suspicious behavior. Signature and anomaly-based.

7. Intrusion Prevention System (IPS)

- Detects and blocks threats in real time.

8. Trusted Systems

- Secure hardware/software ensuring policy compliance.

9. Virus Countermeasures

- Antivirus, updates, user awareness.

10. Authentication Strategies

- Single, multi-factor authentication methods.

11. Security Architecture, Authentication Header

- AH provides source authentication and integrity.

12. Encapsulating Security Payload (ESP)

- Offers encryption and optional authentication.


13. Combining Security Associations

- Layered IPSec security through SA combinations.

14. Key Management

- Key lifecycle management (generation to destruction).

You might also like