Professional Documents
Culture Documents
Cryptography and Network Security: Dr. R.K.Mugelan
Cryptography and Network Security: Dr. R.K.Mugelan
Cryptography and Network Security: Dr. R.K.Mugelan
ECE 4013
Dr. R.K.Mugelan,
Assistant Professor (Sr),
SENSE, VIT
Course Objectives
MODULE-1
Topics
Introduction
This rule became a key to retrieve the message back from the
garbled message.
Cryptography
Cryptanalysis
Cryptology
Cryptography Cryptanalysis
Note:
Cryptography concerns with the design of cryptosystems, while cryptanalysis
studies the breaking of cryptosystems.
To be secured,
Information needs to be hidden from unauthorized access. Confidentiality
Security Goals
Plaintext
It is the data to be protected during transmission.
Ciphertext
It is the scrambled version of the plaintext produced by the encryption
algorithm using a specific the encryption key.
The ciphertext is not guarded. It flows on public channel.
It can be intercepted or compromised by anyone who has access to the
communication channel.
Encryption Key
It is a value that is known to the sender.
The sender inputs the encryption key into the encryption algorithm along
with the plaintext in order to compute the ciphertext.
Traffic analysis
refers to obtaining some other type of information (other than
data) by monitoring online traffic.
Can guess the type of data based on the nature of transactions.
Snooping
Traffic analysis
Modification
means that the attacker intercepts the message and changes it.
Masquerading or spoofing
happens when the attacker impersonates somebody else.
Replaying
means the attacker obtains a copy of a message sent by a user and
later tries to replay it.
Modification
Masquerading or spoofing
Replaying
Snooping
Passive Confidentiality
Traffic Analysis
Modification
Masquerading
Active Integrity
Replaying
Repudiation
Digital Signature
The sender electronically sign the data and the receiver
electronically verify the signature.
Authentication exchange
The two entities exchange some messages to prove identity of each
other.
Traffic padding
It inserts some bogus data into the data traffic to thwart the
adversary’s attempt to use traffic analysis