Professional Documents
Culture Documents
Unit 1
Introduction
The art of war teaches us to rely not on the likelihood of the enemy's
not coming, but on our own readiness to receive him; not on the
chance of his not attacking, but rather on the fact that we have made
our position unassailable.
The Art of War, Sun Tzu
Introduction
Hidden writing
Increasingly used to protect information
Can ensure confidentiality
Integrity and Authenticity too
What is Cryptography?
Cryptography is the science of using mathematics to encrypt and
decrypt data.
cryptanalysis is the science of analyzing and breaking secure
communication.
Cryptology embraces both cryptography and cryptanalysis
Outline
History
Terms & Definitions
Symmetric and Asymmetric Algorithms
Hashing
PKI Concepts
Attacks on Cryptosystems
Scytale
Atbash
Caesar
Vigenre
Ka Ta Pa Ya di Sutra
For eg. The sutra:
Dara Bhagya
Shoolasyaargala
Nidhyayathu
From the table
Da=8 ra=2, reverse and
divide by 12 gives the
house in question
28 (mod 12) = 4
Similarly for Bhagya=41 ,
14 mod 12 = 2
Shoola = 5 la = 3
35 mod 12 = 11
National Institute of Engineering at Mysuru
10
11
13
Cryptosystem Services
Confidentiality
Integrity
Authenticity
Nonrepudiation
Access Control
14
Types of Cryptography
Stream-based Ciphers
One at a time, please
Mixes plaintext with key stream
Good for real-time services
Block Ciphers
Amusement Park Ride
Substitution and transposition
15
Encryption Systems
Substitution Cipher
Convert one letter to another
Cryptoquip
Transposition Cipher
Change position of letter in text
Word Jumble
Monoalphabetic Cipher
Caesar
16
Encryption Systems
Polyalphabetic Cipher
Vigenre
Modular Mathematics
Running Key Cipher
One-time Pads
Randomly generated keys
17
17
Jason's supervisor decides to go through his email and finds a number of emails that were sent to the competitors that ended up with the
marketing material. The only items in the emails were attached jpg files, but nothing else. Jason's supervisor opens the picture files, but
cannot find anything out of the ordinary with them. What technique has Jason most likely used?
18
Steganography
Hiding a message within another medium, such as an
image
No key is required
Example
Modify color map of JPEG image
19
Cryptosystem Services
Confidentiality
Integrity
Authenticity
Nonrepudiation
Access Control
20
Security Services
X.800 defines it as: a service provided by a protocol layer of
communicating open systems, which ensures adequate security of the
systems or of data transfers
RFC 2828 defines it as: a processing or communication service
provided by a system to give a specific kind of protection to system
resources
X.800 defines it in 5 major categories
21
22
23
Continued
1.24
1.25
1.27
1.28
Security services
1.29
Security mechanisms
Encipherment
Security Mechanisms
Data Integrity
Digital Signature
Authentication
exchange
Traffic Padding
Routing Control
Notarization
Access Control
30
31
Security Mechanism
Data confidentiality
Data Integrity
Authentication
Nonrepudiation
Access Control
32
Types of Attacks
33