c&ss -Module1-1
c&ss -Module1-1
Security
module*1
in 4 main area
Symmetric Encryption :Only one key eg. Caeser’s
cipher
Asymmetric Encryption: Two cryptographic keys
◦ passive
◦ active
Prof. Uma Ade
Categorization of passive and active attacks
Hi, I am Bob
Hi, I am Bob
Meet me at Meet me
Cinemax at
Cinemax
Phhw ph dw
flqhpda
• RFC 2828:
“a processing or communication service provided by
a system to give a specific kind of protection to
system resources”
1. Congruence property:
2. modular Operation on Negative numbers:
3. modular Addition:
4. modular Subtraction:
5. modular Multiplication:
6. modular Inverse:
7. Prime Number
8. Co*Prime Number/coprime/relatively
prime/mutually prime:
9. Euclid's algo (Euclidean algorithm)
(GCD(Greatest common Divisor):
10. Extended euclids algorithm(for
multiplicative inverse)
• -9 mod 2
– -9 +(2 * ? )= +ve no
-9 +(2 *5)= 1
– 9 ≡ 5(mod 2)
–i.e (-9 mod 2)=(5mod 2)
1. A1,A2,A3<-- (1,0,m)
B1,B2,B3<-- (0,1,b)
2. IF B3=0-->GCD(m,b)=A3 (no inverse exist)
3. IF B3=1-->GCD(m,b)=B3 ,B -1=B2
4. Q=A3/B3
5. (T1,T2,T3)=((A1-(Q*B1),((A2-(Q*B2)),((A3-(Q*B3)))
6. (A1,A2,A3)=(B1,B2,B3)
7. (B1,B2,B3)=(T1,T2,T3)
8. Goto Step2
1 0 26 0 1 3 8 1 -8 2
1 0 26 0 1 3 8 1 -8 2
0 1 3 1 -8 2 1 -1 9 1
1 0 26 0 1 3 8 1 -8 2
0 1 3 1 -8 2 1 -1 9 1
1 -8 2 -1 9 1
1 0 26 0 1 3 8 1 -8 2
0 1 1 -8 2 1 -1 9 1
1 -8 2 -1 9 1
1 0 3 0 1 35 0 1 0 3
1 0 3 0 1 35 0 1 0 3
0 1 35 1 0 3 11 -11 1 2
1 0 3 0 1 35 0 1 0 3
0 1 35 1 0 3 11 -11 1 2
1 0 3 -11 1 2 1 12 -1 1
1 0 3 0 1 35 0 1 0 3
0 1 35 1 0 3 11 -11 1 2
1 0 3 -11 1 2 1 12 -1 1
-11 1 2 12 -1 1
1 0 49 0 1 37 1 1 -1 12
0 1 37 1 -1 12 3 -3 4 1
1 -1 12 -3 4 1
2-1
ø(49)=(7 X(7-1)
=7 X6
=42
-1
ø(343 )=(73 X(7-1)
=49 X6
=294
Prof. Uma Ade
Euler's Theorem