null (9)
null (9)
security- 18ITE008T
Unit-I
UNIT I 26/12/2024 1
Unit-I
Services, Mechanisms and attacks, the OSI security
architecture, Network security model- Classical Encryption
techniques- Finite Fields and Number Theory : Groups, Rings,
Fields - Modular arithmetic-Euclid's algorithm-Finite fields-
Prime Numbers-Fermat's and Euler's theorem- The Chinese
remainder theorem
INTRODUCTION
UNIT I 26/12/2024 3
OSI SECURITY ARCHITECTURE
To assess effectively the security needs of an organization
and to evaluate and choose various security products and
policies.
systematic way of defining the requirements for security
UNIT I 26/12/2024 4
OSI SECURITY ARCHITECTURE
Cryptography can reformat and transform our data, making
it safer on its trip between computers.
The technology is based on the essentials of secret codes,
UNIT I 26/12/2024 5
Threats and Attacks (RFC 2828)
Threat
A potential for violation of security, which exists when there is
vulnerability.
Attack
An assault on system security that derives from an intelligent
threat;
An intelligent act that is a deliberate attempt to evade
security:
UNIT I 26/12/2024 7
Security attack – Any action that compromises the
security of information owned by an organization.
Passive Attacks and Active Attacks
UNIT I 26/12/2024 8
SECURITY SERVICES
UNIT I 26/12/2024 9
Security Services (X.800)
AUTHENTICATION
◦ The assurance that the communicating entity is the one that it
claims to be.
Peer Entity Authentication
◦ Used in association with a logical connection to provide confidence
in the identity of the entities connected.
Data Origin Authentication
◦ In a connectionless transfer, provides assurance that the source of
received data is as claimed.
UNIT I 26/12/2024 10
Security Services (X.800)
ACCESS CONTROL
◦ The prevention of unauthorized use of a resource (i.e., this
service controls who can have access to a resource, under what
conditions access can occur, and what those accessing the
resource are allowed to do).
DATA CONFIDENTIALITY
◦ The protection of data from unauthorized disclosure.
Connection Confidentiality
◦ The protection of all user data on a connection.
Connectionless Confidentiality
◦ The protection of all user data in a single data block
UNIT I 26/12/2024 11
Security Services (X.800)
AUTHENTICATION
The confidentiality of selected fields within the user data
UNIT I 26/12/2024 14
SECURITY MECHANISMS
UNIT I 26/12/2024 15
SECURITY ATTACKS
There are four general categories of attack which are listed below: Interruption, Interception,
Modification and Fabrication.
Interruption
An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on availability.
e.g., destruction of piece of hardware, cutting of a communication line or disabling of file management
system.
Sender Receive
Interception
An unauthorized party gains access to an asset. This is an attack on confidentiality. Unauthorized party could
be a person, a program or a computer.
e.g., wire tapping to capture data in the network, illicit copying of files .
UNIT I 26/12/2024 16
Modification
An unauthorized party not only gains access to but tampers with an asset. This is an attack on integrity.
e.g., changing values in data file, altering a program, modifying the contents of messages being transmitted in a
network.
Sender R eceiver
Eavesdropper or forger
Fabrication
An unauthorized party inserts counterfeit objects into the system. This is an attack on
authenticity.
Sender
Eavesdropper or forger
Traffic analysis: If we had encryption protection in place, an opponent might still be able to
observe the pattern of the message. The opponent could determine the location and identity of
communication hosts and could observe the frequency and length of messages being
exchanged. This information might be useful in guessing the nature of communication that
was taking place.
UNIT I 26/12/2024 18
SECURITY ATTACKS
Active attacks
These attacks involve some modification of the data stream or the
creation of a false stream.
These attacks can be classified in to four categories:
Masquerade – One entity pretends to be a different entity.
Replay – involves passive capture of a data unit and its subsequent transmission to produce
an unauthorized effect.
Modification of messages – Some portion of message is altered or the messages are
delayed or recorded, to produce an unauthorized effect.
Denial of service – Prevents or inhibits the normal use or
management of communication facilities. Another form of service
denial is the disruption of an entire network, either by disabling the
network or overloading it with messages so as to degrade performance
UNIT I 26/12/2024 19
Network security model
UNIT I 26/12/2024 20
Classical Encryptions
techniques
Symmetric and public key algorithms
Encryption/Decryption methods fall into two categories.
Symmetric key
Public key
In symmetric key algorithms, the encryption and decryption keys are known both to
sender and receiver. The encryption key is shared and the decryption key is easily
calculated from it. In many cases, the encryption and decryption keys are the same.
UNIT I 26/12/2024 21
CLASSICAL CRYPTO SYSTEMS
CONVENTIONAL ENCRYPTION
referred conventional / private-key / single-key
sender and recipient share a common key
all classical encryption algorithms are private-key
was only type prior to invention of public-key in 1970
plaintext - the original message
UNIT I 26/12/2024 22
Symmetric Encryption
UNIT I 26/12/2024 23
Symmetric Encryption
◦ Two requirements for secure use of symmetric encryption:
a strong encryption algorithm
a secret key known only to sender / receiver
Y = EK(X) symmetric cryptosystem
X = DK(Y)
UNIT I 26/12/2024 24
Cryptography
Cryptographic systems are generally classified along 3 independent dimensions:
◦ Type of operations used for transforming plain text to cipher text
All the encryption algorithms are abased on two general principles: substitution, in which each
element in the plaintext is mapped into another element, and transposition, in which elements in the
plaintext are rearranged.
◦ The number of keys used
If the sender and receiver uses same key then it is said to be symmetric key (or) single key (or)
conventional encryption.
If the sender and receiver use different keys then it is said to be public key encryption.
◦ The way in which the plain text is processed
A block cipher processes the input and block of elements at a time, producing output block for each
input block.
A stream cipher processes the input elements continuously, producing output element one at a time,
as it goes along.
UNIT I 26/12/2024 25
Cryptanalysis
The process of attempting to discover X or K or both is known as cryptanalysis.
The strategy used by the cryptanalysis depends on the nature of the encryption
scheme and the information available to the cryptanalyst.
◦ Chosen plaintext – The cryptanalysts gains temporary access to the encryption machine.
They cannot open it to find the key, however; they can encrypt a large number of suitably
chosen plaintexts and try to use the resulting cipher texts to deduce the key.
◦ Chosen cipher text – The cryptanalyst obtains temporary access to the decryption machine,
uses it to decrypt several string of symbols, and tries to use the results to deduce the key.
UNIT I 26/12/2024 26
Brute- force attack
The attacker tries every possible key on a piece of cipher
text until an intelligible translation into plaintext is
obtained.
On average ,half of all possible keys must be tried to
achieve success.
UNIT I 26/12/2024 27
CLASSICAL ENCRYPTION TECHNIQUES (SUBSTITUTION
TECHNIQUES )
There are two basic building blocks of all encryption techniques: substitution and
transposition.
SUBSTITUTION TECHNIQUES
A substitution technique is one in which the letters of plaintext are replaced by other
letters or by numbers or symbols.
If the plaintext is viewed as a sequence of bits, then substitution involves replacing
Caesar. The Caesar cipher involves replacing each letter of the alphabet with the
letter standing 3 places further down the alphabet.
e.g., Plain text : pay more money
UNIT I 26/12/2024 28
Problem
UNIT I 26/12/2024 29
Playfair cipher
Playfair cipher
The best known multiple letter encryption cipher is the playfair, which treats diagrams in the plaintext as
single units and translates these units into cipher text digrams.
The playfair algorithm is based on the use of 5x5 matrix of letters constructed using a keyword. Let the
keyword be „monarchy‟. The matrix is constructed by filling in the letters of the keyword (minus
duplicates) from left to right and from top to bottom, and then filling in the remainder of the matrix with
the remaining letters in alphabetical order.
The letter i and j count as one letter. Plaintext is encrypted two letters at a time according to the following
rules:
Repeating plaintext letters that would fall in the same pair are separated with a filler letter such as „x‟.
Plaintext letters that fall in the same row of the matrix are each replaced by the letter to the right, with the first element
of the row following the last.
Plaintext letters that fall in the same column are replaced by the letter beneath, with the top element of the column
following the last.
Otherwise, each plaintext letter is replaced by the letter that lies in its own row and the column occupied by the other
plaintext letter. UNIT I 26/12/2024 30
Playfair cipher Plaintext = meet me at the school
M O N A R house
UNIT I 26/12/2024 32
Polyalphabetic ciphers
UNIT I 26/12/2024 33
Vigenere cipher
In this scheme, the set of related mono alphabetic substitution rules consisting of 26
caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter. e.g.,
Caesar cipher with a shift of 3 is denoted by the key value 'd‟ (since a=0, b=1, c=2 and
so on). To aid in understanding the scheme, a matrix known as vigenere tableau is
constructed.
Each of the 26 ciphers is laid out horizontally, with the key letter for each cipher to its
left. A normal alphabet for the plaintext runs across the top. The process of encryption is
simple: Given a key letter X and a plaintext letter y, the cipher text is at the intersection
of the row labeled x and the column labeled y; in this case, the ciphertext is V.
To encrypt a message, a key is needed that is as long as the message. Usually, the key is
a repeating keyword.
UNIT I 26/12/2024 34
Vigenere cipher
Strength of Vigenere cipher
There are multiple cipher text letters for each plaintext letter
Letter frequency inforamiton is obscured.
e.g., plaintext = 0 0 1 0 1 0 0 1
Key =10101100
ciphertext = 1 0 0 0 0 1 0 1
UNIT I 26/12/2024 35
Vigenere cipher
Advantage:
◦ Encryption method is completely unbreakable for a ciphertext only attack.
Disadvantages
◦ It requires a very long key which is expensive to produce and expensive to transmit.
◦ Once a key is used, it is dangerous to reuse it for a second message; any knowledge on the first message
would give knowledge of the second.
UNIT I 26/12/2024 36
Vigenere cipher - problem
UNIT I 26/12/2024 37
Cond.,
UNIT I 26/12/2024 38
Vigenere cipher method 2
UNIT I 26/12/2024 39
UNIT I 26/12/2024 40
UNIT I 26/12/2024 41
TRANSPOSITION TECHNIQUES
All the techniques examined so far involve the substitution of a cipher text
symbol for a plaintext symbol. A very different kind of mapping is achieved by
performing some sort of permutation on the plaintext letters. This technique is
referred to as a transposition cipher.
1.Rail fence
Rail fence is simplest of such cipher, in which the plaintext is written down as
follows:
meat eco lo s
e t th sHohue
The encrypted message is
MEATECOLOSETTHSHOHUE
UNIT I 26/12/2024 42
Row Transposition Ciphers
2.Row Transposition Ciphers-A more complex scheme is
to write the message in a rectangle, row by row, and read the
message off, column by column, but permute the order of
the columns. The order of columns then becomes
Key = 4 3
the
1
key
2 5
of6 7
the algorithm. PT = m e e t a t t
e.g., plaintext = meet at the school house h e s c h o o
CT = ESOTCUEEHMHLAHSTOETO l h o u s e
A pure transposition cipher is easily recognized because it
has the same letter frequencies as the original plaintext. The
transposition cipher can be made significantly more secure
by performing more than one stage of transposition. The
result is more complex permutation that is not easily
reconstructed.
UNIT I 26/12/2024 43
INTRODUCTION TO NUMBER THEORY
multiplicative inverse
Modular Arithmetic
modular arithmetic is 'clock arithmetic'
a congruence a = b mod n says when divided by n that a and b have the
same remainder
100 = 34 mod 11
o
usually have 0<=b<=n-1
-12mod7 = -5mod7 = 2mod7 = 9mod7
b is called the residue of a mod n
can do arithmetic with integers modulo n with all results between 0 and n
Addition
a+b mod n
Subtraction
a-b mod n = a+(-b)
Multiplication
a.b mod n
derived from repeated addition
can get a.b=0 where neither a,b=0
◦ eg 2.5 mod 10
mod n
Division
a/b mod n
is multiplication by inverse of b: a/b = a.b -1 mod n
if n is prime b-1 mod n exists s.t b.b-1 = 1 mod n
o eg 2.3=1 mod 5 hence 4/2=4.3=2 mod 5
integers modulo n with addition and multiplication form a
m(x) operations
Polynomial Arithmetic with Mod 2 Coefficients
◦ All coefficients are 0 or 1, e.g.,
let f(x) = x3 + x2 and g(x) = x2 + x + 1
f(x) + g(x) = x3 + x + 1
f(x) x g(x) = x5 + x2