CS8792 Unit 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 58

Downloaded From: www.EasyEngineering.

net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t

TM

TECHNICAL PUBLICATIONS - An up thrust for knowledge


Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE Confidentiality

ngi
nee Integrity
Secure
Availability

rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w .Ea
syE
ngi
nee
rin
g .ne
Trusted third
party
t
Sender Receiver

Transformation Transformation

Message + Secret nformation Secret + Message


message Channel message

Secret Opponent Secret


information information
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

Passive attacks
Security
attacks
Active attacks

ww
w.Ea
syE
ngi
nee
rin
g .ne
Opponent Read content of
t
message from sender
to receiver

nternet

Sender Receiver
Downloaded From: www.EasyEngineering.net

hp

Opponent Observe pattern of


messages from sender
to receiver
hp hp

nternet

Sender
Receiver

ww
w .Ea
syE
ngi
nee
rin
hp
g .ne
Opponent Message from opponent
t
that appears to be from sender
hp hp

nternet

Sender Receiver
Downloaded From: www.EasyEngineering.net

hp

ww Opponent
Capture message from
sender to receiver, later
replay message to receiver

whp

.Ea nternet
hp

Sender syE Receiver

ngi
nee
hp

rin
g .ne
hp
Opponent
Opponent modifies
message from sender
to receiver
hp
t
nternet

Sender Receiver
Downloaded From: www.EasyEngineering.net

hp

Disrupts service
provided by server

ww
hp hp

nternet

w.Ea
syE
ngi
nee
Source
system
Server
rin
hp

g
Target
system

.ne
Legitimate connection attempt
TCP SYN packet
t
TCP SYN ACK packet

TCP ACK packet

Syn flood DOS attack


TCP SYN packet

TCP SYN ACK packet

The final TCP ACK packet is never sent


Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

Encipherment

ww Data integrity

w.Ea
Digital signature

syE
Security
mechanisms
Authentication exchange

ngi Traffic padding

nee
Routing control

Notarization rin
Access control
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
OSI Security
architecture
t
Security attacks

Security mechanisms

Security services
Downloaded From: www.EasyEngineering.net

ww Sender Receiver

w .Ea
syE
Plain text
Encryption
Cypher-text
Decryption
Plain text

ngi
Attacker nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

Secret key
shared by
sender and recipients

ww
w .Ea
Plaintext
input
syE
Encryption
algorithm
Decryption
algorithm
Plaintext
output

ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

^
X
Cryptanalyst ^
K

ww
Message
source
X Encryption
algorithm
Y Decryption
algorithm
X
Destination

w .Ea K
Secure channel

syE Key
source

ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne

t
Downloaded From: www.EasyEngineering.net

ww
 w
 C1
 C2
C




 K 11

.Ea
 K 21
K
K 12
K 22
K 32
K 13   P1

K 23   P2
K 33   P3




 3   31 
syE
ngi

nee
rin
 17 17 5 
 
 21 18 21 
g .ne
 2 2 19 
 
t
 17 17 5   15 
   
 21 18 21   0 
 2 2 19   24 
   

 375 
 
 819 
 486 
 

 11 
 
 13 
 18 
 
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

Plaintext (2w bits)


Key

Round 1 L0 w bits w bits R0 K1 Subkey


generation
algorithm
F

ww L1 R1

w
Round i .Ea Ki

syE F

ngi
nee
Li Ri

rin
Round n Kn g .ne
F
t
Ln Rn

Ln+1 Rn+1

Plaintext (2w bits)


Downloaded From: www.EasyEngineering.net

ww
w .Ea
syE
ngi
nee
rin
g .ne
t

LD 0  F( RD 0 , K 16 )


Downloaded From: www.EasyEngineering.net

RE 0 LE 0

ww
w .Ea
syE
ngi
nee
 17 17 5  rin

 2 2 19 


 21 18 21 

g .ne
 17 17 5 
 
t
 21 18 21 
 2 2 19 
 

 15   15   375   11 
       
 0   0   819   13 
 24   24   486   18 
       
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww 

w.Ea
syE
ngi
nee
rin
g .ne

t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
 2 
  rin
 14 
 4 
  g .ne
t
 0 13 14 
 
 19 6 4 
 17 1 25 
 

 0 13 14   2   238  4 
      
 19 6 4   14  mod 26  138  mod 26  8
 17 1 25   4   148   18 
      
Downloaded From: www.EasyEngineering.net

 17 17 5 
 
 21 18 21 
 2 2 19 
 
 17 17 5 
 
 21 18 21 
 2 2 19 
 

ww
 15   15 
  
 0  0 
 375 
 
 819  mod 26
 11 
 
 13 
w
 24   24 
  
 486 

.Ea 
 18 
 

syE
ngi
 0 13 14 
19 6 4 
 
nee
17 1 25
rin
4 4 8 
18 13 0 
 
g .ne
18 19 11


t
 0 13 14  4 4 8 
19 6 4  18 13 0  mod 26
   
17 1 25 18 19 11

486 435 154  18 19 24 


256 230 196  mod 26 22 22 14  mod 26
   
536 556 411 16 10 21 

S T Y
W W D  mod 26
 
 Q K V 
Downloaded From: www.EasyEngineering.net

ww


w .Ea
 syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w .Ea
syE
ngi
b o o nee
i g

u y u b o s n u
rin u t

y r k A
g s

.ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww Steganography
(Covered writing, covert channels)

w .Ea
syE
Protection against detection
(data hiding)
Protection against removal
(document marking)

ngi
nee
Watermarking
(all objects are marked rin
Fingerprinting
(identify all objects, every
in the same way)
g
object is marked specific)

.ne
t
Downloaded From: www.EasyEngineering.net

ww
w .Ea
syE Secret
image

ngi Stego object

Cover
Encoder
nee
image

rin
g .ne
Secret
image Decoder
Key

Communications
t
channel

Original
cover
Downloaded From: www.EasyEngineering.net

~
I
~
I xK xM  I
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
~
I

~
I
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w .Ea
syE
ngi
nee
rin
g .ne
t

2n
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g .ne
t

You might also like