SlideShare uma empresa Scribd logo
1 de 30
CRYPTOGRAPHY & NETWORK SECURITY
“Security is an illusion. Freedom is real.”
- Philip Brewer
Himanshu Awasthi
B.Tech(VII SEM)
@himanshu230195
2
Contents
1.Introduction to Cryptography
2.Introduction to security attacks
3.Security services and mechanism
4.Classical encryption techniques
5.Substitution ciphers
6.Transposition ciphers
3
My Reaction
When I start learning cryptography?
4
Introduction to Cryptography
Computer data travels from one computer to another, leaving the safety of its
protected physical surroundings. Once the data is out of hand, people with bad
intention could modify or forge your data, either for amusement or for their
own benefit.
Cryptography can reformat and transform our data, making it safer on its
trip between computers.
cryptography is about constructing and analyzing protocols that prevent third
parties or the public from reading private messages; various aspects in
information security such as data confidentiality, data integrity, authentication,
and non-repudiation are central to modern cryptography.
5
Introduction to security attacks
6
Cont..
Any computer connected to a computing network is potentially
vulnerable to an attack.
– An "attack" is the exploitation of a flaw in a computing system
(operating system, software program or user system) for purposes
that are not known by the system operator and that are generally
harmful.
– Attacks are always taking place on the Internet , at a rate of several
attacks per minute on each connected machine. These attacks are
mostly launched automatically from infected machines (by viruses,
Trojan horses, worms, etc.) without their owner's knowledge. In
rarer cases, they are launched by computer hackers.
7
Cont..
Why security attack
??????????????
http://map.norsecorp.com/
8
Cont..
Attacks may be launched for various reasons:
1. to obtain access to the system;
2. to steal information, such as industrial secrets or intellectual property;
3. to gather personal information about a user;
4. to retrieve bank account information;
5. to get information about the organization (the user's company, etc.);
6. to disrupt the proper functioning of a service;
7. to use the user's system as a "bounce" for an attack;
8. to use the resources of the user's system, particularly when the network on
which it is located has a high bandwidth.
9
Ransomware
An application that takes partial or extensive control of a device or data
on a device and demands payment to release control.
Some ransomware apps encrypt data on the device and demand payment
to decrypt data and/or leverage the device administrator features so that
the app cant be removed by the typical user. Examples include:
•Ransomware that locks a user out of their device and demands money to
restore user control.
•Ransomware that encrypts data on the phone and demands payment,
ostensibly to decrypt data again.
•Ransomware that leverages device policy manager features and can-not
be removed by the user.
10
Security services and mechanism
A service that enhances the security of the data processing systems and
the information transfers of an organization. The services are intended to
counter security attacks and they make use of one or more security mechanisms
to provide the service.
Security service is a service, provided by a layer of communicating open
systems, which ensures adequate security of the systems or of data transfers as
defined by ITU-T X.800 Recommendation.
A more general definition is in CNSS Instruction No. 4009 dated 26 April 2010
by Committee on National Security Systems of United States of America:
“A capability that supports one, or more, of the security requirements
(Confidentiality, Integrity, Availability). Examples of security services are key
management, access control, and authentication”
11
Classification of Security Services
The classification of security services are as follows:
Confidentiality: Ensures that the information in a computer system and transmitted
information are accessible only for reading by authorized parties.
E.g. Printing, displaying and other forms of disclosure.
Authentication: Ensures that the origin of a message or electronic document is correctly
identified, with an assurance that the identity is not false.
Integrity: Ensures that only authorized parties are able to modify computer system assets and
transmitted information. Modification includes writing, changing status, deleting, creating and
delaying or replaying of transmitted messages.
Non repudiation: Requires that neither the sender nor the receiver of a message be able to
deny the transmission.
Access control: Requires that access to information resources may be controlled by or the
target system.
Availability: Requires that computer system assets be available to authorized parties when
needed.
12
Cont..
Security mechanism
“A mechanism that is designed to detect, prevent or recover from a security
attack.”
“The process to implement the security properties is known as security
mechanism.”
various type of mechanism :
1. Attack Prevention
2. Attack Avoidance
3. Attack Detection
13
Classical Encryption Technique
Goals:
1. to introduce basic concepts & terminology of encryption
2. to prepare us for studying modern cryptography.
A. Building Blocks
i. Two building blocks of all classical encryption techniques are
substitution and transposition.
ii. Substitution means replacing an element of the plaintext with an
element of ciphertext.
iii. Transposition means rearranging the order of appearance of the
elements of the plain text.
iv. Transposition is also referred to as permutation.
14
Cont..
B. Symmetric Cipher Mode
A symmetric encryption scheme has five ingredients:
1. Plaintext: This is the original intelligible message or data that is fed into the
algorithm as input.
2.Encryption Algorithm: The encryption algorithm performs various substitutions
and transformations on the plain text
3.Secret Key: The secret key is also input to encryption algorithm. The key is
a value independent of the plaintext and of the algorithm. The algorithm will
produce a different output depending on the specific key being used at the time.
4.Ciphertext: This is the scrambled message produced as output. It depends on the
plaintext and secret key.
5.Decryption Algorithm: This is essentially the encryption algorithm run in reverse. It
takes the cipher text and the secret key and produces the original plaintext
15
Cont..
c. Cryptography
Cryptographic systems are characterized along three independent dimensions:
- type of encryption operations used
1. substitution
2. Transposition
3. product
- number of keys used
1. single-key or private
2. two-key or public
- way in which plaintext is processed
1. block
2. stream
16
Cont..
D. Cryptanalysis
Objective: to recover the plaintext of a ciphertext or, more typically, to recover
the secret key.
Kerkhoff’s principle: the adversary knows all details about a cryptosystem except
the secret key.
Two general approaches:
brute-force attack
non-brute-force attack (cryptanalytic attack)
17
Substitution Cipher
Substitution cipher: replacing each element of the
plaintext with another element.
Their are some techniques in Substitution Cipher:
1. Caeser Cipher
2. Monoalphabetic Ciphers
3. Polyalphabetic Ciphers
- Playfair Cipher
- Vigenere Cipher
18
Caesar cipher
The Caesar cipher, also known as a shift cipher, is one of the simplest forms of
encryption. It is a substitution cipher where each letter in the original message
(called the plaintext) is replaced with a letter corresponding to a certain number
of letters up or down in the alphabet.
For example, here's the Caesar Cipher encryption of a message, using a right
shift of 3
Plaintext:
THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG
Ciphertext:
QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD
19
Cont..
The Caesar Cipher can be expressed in a more mathematical form as follows:
In plain terms, this means that the encryption of a letter *x* is equal to a shift of *x + n*, where
n is the number of letters shifted. The result of the process is then taken under modulo division,
essentially meaning that if a letter is shifted past the end of the alphabet, it wraps around to the
beginning.
Decryption of the encrypted text (*ciphertext*) would be defined similarly, with instead a
subtraction of the shift amount.
First used by Julius Caesar, the Caesar Cipher is one of the more well known older historical
encryption methods.
20
Monoalphabetic Ciphers
A monoalphabetic substitution cipher, also known as a simple substitution
cipher, relies on a fixed replacement structure. That is, the substitution is fixed
for each letter of the alphabet. Thus, if "a" is encrypted to "R", then every time
we see the letter "a" in the plaintext, we replace it with the letter "R" in the
ciphertext.
A simple example is where each letter is encrypted as the next letter in the
alphabet: "a simple message" becomes "B TJNQMF NFTTBHF". In general, when
performing a simple substitution manually, it is easiest to generate the
ciphertext alphabet first, and encrypt by comparing this to the plaintext
alphabet. The table below shows how one might choose to, and we will, lay them
out for this example.
21
Polyalphabetic Substitution Ciphers
Polyalphabetic Cipher is a substitution cipher in which the
cipher alphabet for the plain alphabet may be different at
different places during the encryption process. Best example
of polyalphabetic ciphers are as follows:
1. Playfair
2. Vigenere Cipher
22
Playfair Cipher
1. Not even the large number of keys in a monoalphabetic cipher
provides security.
2. One approach to improving security is to encrypt multiple letters
at a time.
3. The Playfair Cipher is the best known such cipher.
4. Invented by Charles Wheatstone in 1854, but named after his
friend Baron Playfair.
23
Playfair Key Matrix
1. Use a 5 x 5 matrix.
2. Fill in letters of the key (w/o duplicates).
3. Fill the rest of matrix with other letters.
E.g., Plaintext = MONARCHY.
MM OO NN AA RR
CC HH YY BB DD
EE FF GG I/JI/J KK
LL PP QQ SS TT
UU VV WW XX ZZ
24
Encrypting and Decrypting
1. Plaintext is encrypted two letters at a time.
2. If a pair is a repeated letter, insert filler like 'X’.
3. If both letters fall in the same row, replace each with the
letter to its right (circularly).
4. If both letters fall in the same column, replace each with the
the 5. letter below it (circularly).
6. Otherwise, each letter is replaced by the letter in the same
row but in the column of the other letter of the pair.
25
Security of Playfair Cipher
1. Equivalent to a monoalphabetic cipher with an
alphabet of 26 x 26 = 676 characters.
2. Security is much improved over the simple
monoalphabetic cipher.
3. Was widely used for many decades
eg. by US & British military in WW1 and early WW2
4. Once thought to be unbreakable.
5. Actually, it can be broken, because it still leaves
some structure of plaintext intact.
26
Vigenere Cipher
This scheme of cipher uses a text string (say, a word) as a key, which is
then used for doing a number of shifts on the plaintext.
For example, let’s assume the key is ‘point’. Each alphabet of the key is
converted to its respective numeric value: In this case,
p 16, o 15, i 9, n 14, and t 20.→ → → → →
Thus, the key is: 16 15 9 14 20.
27
Process of Vigenere Cipher
1. The sender and the receiver decide on a key. Say ‘point’ is the key. Numeric
representation of this key is ‘16 15 9 14 20’.
2. The sender wants to encrypt the message, say ‘attack from south east’. He
will arrange plaintext and numeric key as follows −
3. He now shifts each plaintext alphabet by the number written below it to
create ciphertext as shown below −
28
Cont..
1. Here, each plaintext character has been shifted by a different amount – and
that amount is determined by the key. The key must be less than or equal to the
size of the message.
2. For decryption, the receiver uses the same key and shifts received ciphertext
in reverse order to obtain the plaintext.
29
Variants of Vigenere Cipher
There are two special cases of Vigenere cipher −
1. The keyword length is same as plaintext message. This case is called
Vernam Cipher. It is more secure than typical Vigenere cipher.
2. Vigenere cipher becomes a cryptosystem with perfect secrecy, which is
called One-time pad
30
●
–
●
●
●
●
● Thank you!
● Follow me @himanshu230195
● https://himanshuawasthi95.github.io

Mais conteúdo relacionado

Mais procurados (19)

SMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad CipherSMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad Cipher
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Presentation1
Presentation1Presentation1
Presentation1
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 

Semelhante a Crpto unit1

Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfAdiseshaK
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsDamien Magoni
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jhaManishaJha43
 

Semelhante a Crpto unit1 (20)

Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
Cns 1
Cns 1Cns 1
Cns 1
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 

Mais de Himanshu Awasthi

Mais de Himanshu Awasthi (9)

RoadMap to Cyber Certs.pdf
RoadMap to Cyber Certs.pdfRoadMap to Cyber Certs.pdf
RoadMap to Cyber Certs.pdf
 
Introduction to web design
Introduction to web designIntroduction to web design
Introduction to web design
 
Data analysis using python
Data analysis using pythonData analysis using python
Data analysis using python
 
Kanpur Python Users Group
Kanpur Python Users GroupKanpur Python Users Group
Kanpur Python Users Group
 
Python basics
Python basicsPython basics
Python basics
 
Intro to python
Intro to pythonIntro to python
Intro to python
 
Software unit4
Software unit4Software unit4
Software unit4
 
Software design
Software designSoftware design
Software design
 
DomainNameSystem
DomainNameSystemDomainNameSystem
DomainNameSystem
 

Último

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Último (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Crpto unit1

  • 1. CRYPTOGRAPHY & NETWORK SECURITY “Security is an illusion. Freedom is real.” - Philip Brewer Himanshu Awasthi B.Tech(VII SEM) @himanshu230195
  • 2. 2 Contents 1.Introduction to Cryptography 2.Introduction to security attacks 3.Security services and mechanism 4.Classical encryption techniques 5.Substitution ciphers 6.Transposition ciphers
  • 3. 3 My Reaction When I start learning cryptography?
  • 4. 4 Introduction to Cryptography Computer data travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could modify or forge your data, either for amusement or for their own benefit. Cryptography can reformat and transform our data, making it safer on its trip between computers. cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.
  • 6. 6 Cont.. Any computer connected to a computing network is potentially vulnerable to an attack. – An "attack" is the exploitation of a flaw in a computing system (operating system, software program or user system) for purposes that are not known by the system operator and that are generally harmful. – Attacks are always taking place on the Internet , at a rate of several attacks per minute on each connected machine. These attacks are mostly launched automatically from infected machines (by viruses, Trojan horses, worms, etc.) without their owner's knowledge. In rarer cases, they are launched by computer hackers.
  • 8. 8 Cont.. Attacks may be launched for various reasons: 1. to obtain access to the system; 2. to steal information, such as industrial secrets or intellectual property; 3. to gather personal information about a user; 4. to retrieve bank account information; 5. to get information about the organization (the user's company, etc.); 6. to disrupt the proper functioning of a service; 7. to use the user's system as a "bounce" for an attack; 8. to use the resources of the user's system, particularly when the network on which it is located has a high bandwidth.
  • 9. 9 Ransomware An application that takes partial or extensive control of a device or data on a device and demands payment to release control. Some ransomware apps encrypt data on the device and demand payment to decrypt data and/or leverage the device administrator features so that the app cant be removed by the typical user. Examples include: •Ransomware that locks a user out of their device and demands money to restore user control. •Ransomware that encrypts data on the phone and demands payment, ostensibly to decrypt data again. •Ransomware that leverages device policy manager features and can-not be removed by the user.
  • 10. 10 Security services and mechanism A service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the service. Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X.800 Recommendation. A more general definition is in CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America: “A capability that supports one, or more, of the security requirements (Confidentiality, Integrity, Availability). Examples of security services are key management, access control, and authentication”
  • 11. 11 Classification of Security Services The classification of security services are as follows: Confidentiality: Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties. E.g. Printing, displaying and other forms of disclosure. Authentication: Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false. Integrity: Ensures that only authorized parties are able to modify computer system assets and transmitted information. Modification includes writing, changing status, deleting, creating and delaying or replaying of transmitted messages. Non repudiation: Requires that neither the sender nor the receiver of a message be able to deny the transmission. Access control: Requires that access to information resources may be controlled by or the target system. Availability: Requires that computer system assets be available to authorized parties when needed.
  • 12. 12 Cont.. Security mechanism “A mechanism that is designed to detect, prevent or recover from a security attack.” “The process to implement the security properties is known as security mechanism.” various type of mechanism : 1. Attack Prevention 2. Attack Avoidance 3. Attack Detection
  • 13. 13 Classical Encryption Technique Goals: 1. to introduce basic concepts & terminology of encryption 2. to prepare us for studying modern cryptography. A. Building Blocks i. Two building blocks of all classical encryption techniques are substitution and transposition. ii. Substitution means replacing an element of the plaintext with an element of ciphertext. iii. Transposition means rearranging the order of appearance of the elements of the plain text. iv. Transposition is also referred to as permutation.
  • 14. 14 Cont.. B. Symmetric Cipher Mode A symmetric encryption scheme has five ingredients: 1. Plaintext: This is the original intelligible message or data that is fed into the algorithm as input. 2.Encryption Algorithm: The encryption algorithm performs various substitutions and transformations on the plain text 3.Secret Key: The secret key is also input to encryption algorithm. The key is a value independent of the plaintext and of the algorithm. The algorithm will produce a different output depending on the specific key being used at the time. 4.Ciphertext: This is the scrambled message produced as output. It depends on the plaintext and secret key. 5.Decryption Algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text and the secret key and produces the original plaintext
  • 15. 15 Cont.. c. Cryptography Cryptographic systems are characterized along three independent dimensions: - type of encryption operations used 1. substitution 2. Transposition 3. product - number of keys used 1. single-key or private 2. two-key or public - way in which plaintext is processed 1. block 2. stream
  • 16. 16 Cont.. D. Cryptanalysis Objective: to recover the plaintext of a ciphertext or, more typically, to recover the secret key. Kerkhoff’s principle: the adversary knows all details about a cryptosystem except the secret key. Two general approaches: brute-force attack non-brute-force attack (cryptanalytic attack)
  • 17. 17 Substitution Cipher Substitution cipher: replacing each element of the plaintext with another element. Their are some techniques in Substitution Cipher: 1. Caeser Cipher 2. Monoalphabetic Ciphers 3. Polyalphabetic Ciphers - Playfair Cipher - Vigenere Cipher
  • 18. 18 Caesar cipher The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet. For example, here's the Caesar Cipher encryption of a message, using a right shift of 3 Plaintext: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG Ciphertext: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD
  • 19. 19 Cont.. The Caesar Cipher can be expressed in a more mathematical form as follows: In plain terms, this means that the encryption of a letter *x* is equal to a shift of *x + n*, where n is the number of letters shifted. The result of the process is then taken under modulo division, essentially meaning that if a letter is shifted past the end of the alphabet, it wraps around to the beginning. Decryption of the encrypted text (*ciphertext*) would be defined similarly, with instead a subtraction of the shift amount. First used by Julius Caesar, the Caesar Cipher is one of the more well known older historical encryption methods.
  • 20. 20 Monoalphabetic Ciphers A monoalphabetic substitution cipher, also known as a simple substitution cipher, relies on a fixed replacement structure. That is, the substitution is fixed for each letter of the alphabet. Thus, if "a" is encrypted to "R", then every time we see the letter "a" in the plaintext, we replace it with the letter "R" in the ciphertext. A simple example is where each letter is encrypted as the next letter in the alphabet: "a simple message" becomes "B TJNQMF NFTTBHF". In general, when performing a simple substitution manually, it is easiest to generate the ciphertext alphabet first, and encrypt by comparing this to the plaintext alphabet. The table below shows how one might choose to, and we will, lay them out for this example.
  • 21. 21 Polyalphabetic Substitution Ciphers Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain alphabet may be different at different places during the encryption process. Best example of polyalphabetic ciphers are as follows: 1. Playfair 2. Vigenere Cipher
  • 22. 22 Playfair Cipher 1. Not even the large number of keys in a monoalphabetic cipher provides security. 2. One approach to improving security is to encrypt multiple letters at a time. 3. The Playfair Cipher is the best known such cipher. 4. Invented by Charles Wheatstone in 1854, but named after his friend Baron Playfair.
  • 23. 23 Playfair Key Matrix 1. Use a 5 x 5 matrix. 2. Fill in letters of the key (w/o duplicates). 3. Fill the rest of matrix with other letters. E.g., Plaintext = MONARCHY. MM OO NN AA RR CC HH YY BB DD EE FF GG I/JI/J KK LL PP QQ SS TT UU VV WW XX ZZ
  • 24. 24 Encrypting and Decrypting 1. Plaintext is encrypted two letters at a time. 2. If a pair is a repeated letter, insert filler like 'X’. 3. If both letters fall in the same row, replace each with the letter to its right (circularly). 4. If both letters fall in the same column, replace each with the the 5. letter below it (circularly). 6. Otherwise, each letter is replaced by the letter in the same row but in the column of the other letter of the pair.
  • 25. 25 Security of Playfair Cipher 1. Equivalent to a monoalphabetic cipher with an alphabet of 26 x 26 = 676 characters. 2. Security is much improved over the simple monoalphabetic cipher. 3. Was widely used for many decades eg. by US & British military in WW1 and early WW2 4. Once thought to be unbreakable. 5. Actually, it can be broken, because it still leaves some structure of plaintext intact.
  • 26. 26 Vigenere Cipher This scheme of cipher uses a text string (say, a word) as a key, which is then used for doing a number of shifts on the plaintext. For example, let’s assume the key is ‘point’. Each alphabet of the key is converted to its respective numeric value: In this case, p 16, o 15, i 9, n 14, and t 20.→ → → → → Thus, the key is: 16 15 9 14 20.
  • 27. 27 Process of Vigenere Cipher 1. The sender and the receiver decide on a key. Say ‘point’ is the key. Numeric representation of this key is ‘16 15 9 14 20’. 2. The sender wants to encrypt the message, say ‘attack from south east’. He will arrange plaintext and numeric key as follows − 3. He now shifts each plaintext alphabet by the number written below it to create ciphertext as shown below −
  • 28. 28 Cont.. 1. Here, each plaintext character has been shifted by a different amount – and that amount is determined by the key. The key must be less than or equal to the size of the message. 2. For decryption, the receiver uses the same key and shifts received ciphertext in reverse order to obtain the plaintext.
  • 29. 29 Variants of Vigenere Cipher There are two special cases of Vigenere cipher − 1. The keyword length is same as plaintext message. This case is called Vernam Cipher. It is more secure than typical Vigenere cipher. 2. Vigenere cipher becomes a cryptosystem with perfect secrecy, which is called One-time pad
  • 30. 30 ● – ● ● ● ● ● Thank you! ● Follow me @himanshu230195 ● https://himanshuawasthi95.github.io