Conventional Encryption Principles - New
Conventional Encryption Principles - New
Conventional Encryption Principles - New
Network Security
Cryptography
Cryptanalysis
Cryptology
Encryption
decryption
Plaintext
Cipher text
Keys
Crypto System
Vulnerabilities
Threat
Exploitation
Risk
Threats exploit the vulnerabilities
to damage security assets
Vulnerabilities
Database(VD)
NVD 2014
7038 (V)
80%
are coming through Third
party application
13% are on OS
4% are on Hardware devices
Ubuntu
39 total vulnerabilities 7 high severity 27 medium
severity 5 low
Red Hat Enterprise
27 total vulnerabilities 6 high severity 17 medium
severity 4 low
openSUSE
20 total vulnerabilities 9 high severity 9 medium
severity 4 low
Fedora
15 total vulnerabilities 3 high severity 9 medium
severity 3 low
Windows
68 total vulnerabilities 47 high severity20 medium
severity 1 low severity
Android
6 total vulnerabilities 4 high severity 1 medium
Internet Security
Threats
1.
2.
3.
Malware Threats
Email- Threats
Social Engineering Threat
(Phishing)
Top 10 Threats
Security
attack
Security Mechanism :
An
action
that
Compromises the security of information system
A process that is
designed to Detect, Prevent and Recover from a
security attacks
security of information system using Security
services
Security services implement Security polices and
are implemented by using security mechanism
Security polices :
Standards :
Procedures
Security Attacks
There are two types of attacks
1. Passive attacks : Attempts to learn
or
make use of information from the system
with out effecting system resources
2. Active
attacks :
Attempts to alter
system resources or effect their operations
Passive Attacks
Passive attacks are in the nature of
eavesdropping
on,
monitoring
of
transmissions. The goal of the opponent is to
obtain information that is being transmitted
There are two types of passive attacks
1. Release of message contents
2. Traffic analysis
Passive attacks are very difficult to detect because they
do not involve alternation of any messages
Active attacks
Active attacks are modification of data stream
or creation of false data stream
There are four categories
1. Masquerade
2. Replay
3. Modification of message
4. Denial of service
Security services
Authentication
Access Control
Data Confidentiality
Data Integrity
Nonrepudiation : Prevent
the receiver
message
Availability
from
either sender or
denying a transmitted
Conventional Encryption
Principles
Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm
Conventional Encryption
Principles
Cryptography
Classical encryption
Techniques
Substitution
techniques
Caesar Cipher
Mono Alphabetic Cipher
Play fair cipher
Hill cipher
Transposition
Techniques
Caesar Cipher
abcdefghIjklmnopqrstuvw
xyz
defghIjklmnopqrstuvwxyz
a b c Encryption Algorithm
c=E (p) = (p+3) mod 26
Decryption Algorithm
p=D (p) = (p-3) mod 26
Drawbacks of Caesar
cipher
Mono Alphabetic
Cipher
abcdefghIjklmnopqrstuvwxyz
befIjacdghtsrqponklmuzyxwv
key : 2 5 6 9 10 1 3 4 7 8 20 19 18 17 16 15 14 11 12 13 21 26 25 24 23 22
Step 1:
Construct 5 * 5 Matrix by using
key value and Alphabetic
key=monarchy
Fill the matrix with key value
from
left to right and top to bottom
and remaining positions fill
with Alphabetic
the letters I/J put into one cell
i/j
Cipher text:
i/j
Plain text:
Hill Cipher
Divide the plaintext into blocks of m characters
m=2
Select the key based on m
select m*m matrix
Multiply each plain text block with m*m matrix
that output is cipher text
Decryption Key
2.
3.
4.
Columnar
Transposition
Step 1: Take the key value
key=4312567
Step 2: Write the plaintext from left to
right and top to bottom
Step 3: read cipher text column wise select
the column which is having minimum
value
Example
Key = 4312567
Plaintext = hello how are u
4312567
he l l o h
ow ar e
u
Cipher text: l la ew houor e h .
Properties of DES
Initial Permutation
INPUT(64Bit)
M1
M2 M3
M4 M5 M6 M7 M8
IP
M58 M50 M42 M34 M26 M18 M10
M2
M60 M52 M44 M36 M28 M20 M12
M4
M62 M54 M46 M38 M30 M22 M14
M6
M64 M56 M48 M40 M32 M24 M16
M8
M57 M49 M41 M33 M25 M17 M9
M1
M59 M51 M43 M35 M27 M19 M11
M3
M61 M53 M45 M37 M29 M21 M13
Inverse Initial
Permutation
40
39
38
37
36
35
34
33
8
7
6
5
4
3
2
1
48
47
46
45
44
43
42
41
16
15
14
13
12
11
10
9
56
55
54
53
52
51
50
49
24
23
22
21
20
19
18
17
64
63
62
61
60
59
58
57
32
31
30
29
28
27
26
25
Expansion Function
32
4
8
12
16
20
24
28
1
5
9
13
17
21
25
29
2
6
10
14
18
22
26
30
3
7
11
15
19
23
27
31
4
8
12
16
20
24
28
32
5
9
13
17
21
25
29
1
Permutation Function
16 7 20
1 15 23
2 8 24
19 13 30
21
26
14
6
29
5
32
22
12
18
27
11
28
31
3
4
17
10
9
25
Permuted Choice1(PC1)
57
1
10
19
63
7
14
21
49
58
2
11
55
62
6
13
41
50
59
3
47
54
61
5
33
42
51
60
39
46
53
28
25
34
43
52
31
38
45
20
17
26
35
44
23
30
37
12
9
18
27
36
15
22
29
4
Permuted Choice2(PC2)
14
15
26
41
51
34
17
6
8
52
45
53
11
21
16
31
33
46
24
10
7
37
48
42
1 5 3 28
23 19 12 4
27 20 13 2
47 55 30 40
44 49 39 56
50 36 29 32
9 18 22 25 35 38 43 54
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
16
112222221 2 2 2 2 2 2 1
Round
numbe
r
bits rotated
Expansion
permutation
S-Box 1 Table
14 4
15 7
15 12 8
3 4
13 1 2
15 11 8
10 6
4 14 2
14 8 13 6
2 4
13 1
10 6
10 11 12 13 14 15
12 5
12 11 9
10 5
11 15 12 9
14 10 0
11 3
13