Professional Documents
Culture Documents
CN 6
CN 6
Network Security
By,
Prof. Pradnya K. Bachhav
Outline
SSL, HTTPS
SSL, HTTPS
SSL, HTTPS
X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data transfers”
RFC 2828:
“a processing or communication service provided by a
system to give a specific kind of protection to system
resources”
Security Services (X.800)
Authentication - assurance that the
communicating entity is the one claimed
Access Control - prevention of the unauthorized
use of a resource
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is as
sent by an authorized entity
Non-Repudiation - protection against denial by
one of the parties in a communication
Security Mechanism
SSL, HTTPS
• Types:
– Cipher : cipher is a character-for-character or bit-for-bit
transformation, without regard to the linguistic structure of the
message.
– Code : a code replaces one word with another word or symbol.
Cryptography
• Used with U.S. Armed forces during World War II in Pacific against
Japan.
• U.S broke Japanese code but the Japanese never broke Navajo code(
Cipher and Code) which played a crucial role in American victories in
Pacific.
• Four group of people contributed to cryptography: the military, the
diplomatic corps, diarists, and lovers.
Cryptography
• The messages to be encrypted, known as the plaintext, are
transformed by a function that is parameterized by a key.
• The output of the encryption process, known as the cipher-text, is then
transmitted, often by messenger or radio.
• We assume that the enemy, or intruder, hears and accurately copies
down the complete cipher-text.
• But, he does not know what the decryption key is and so cannot
decrypt the ciphertext easily.
• Intruder is needed to break this code.
• The art of breaking ciphers, called cryptanalysis, and the art devising
them (cryptography) is collectively known as cryptology.
Cryptography
• What is the relation between plaintext, cipher text, and keys? See next
fig.
• We will use C = EK(P) to mean that the encryption of the plaintext P
using key K gives the ciphertext C.
• Similarly, P = DK(C) represents the decryption of C to get the plaintext
again.
Dk(Ek(P)) = P
Cryptography components
Sender
Receiver
Plaintext
Cipher text
Encryption
Decryption
Categories of cryptography
Symmetric-key cryptography
Solution
The cipher is probably monoalphabetic because both
occurrences of L’s are encrypted as O’s.
Example
The following shows a plaintext and its corresponding
ciphertext. Is the cipher monoalphabetic?
Solution
The cipher is not monoalphabetic because each
occurrence of L is encrypted by a different character.
The first L is encrypted as N; the second as Z.
Note
Solution
We encrypt one character at a time. Each character is
shifted 15 characters down. Letter H is encrypted to W.
Letter E is encrypted to T. The first L is encrypted to A.
The second L is also encrypted to A. And O is encrypted to
D. The cipher text is WTAAD.
Example
Solution
We decrypt one character at a time. Each character is
shifted 15 characters up. Letter W is decrypted to H.
Letter T is decrypted to E. The first A is decrypted to L.
The second A is decrypted to L. And, finally, D is
decrypted to O. The plaintext is HELLO.