Professional Documents
Culture Documents
CS8792 Unit 1
CS8792 Unit 1
CS8792 Unit 1
net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
TM
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE Confidentiality
ngi
nee Integrity
Secure
Availability
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w .Ea
syE
ngi
nee
rin
g .ne
Trusted third
party
t
Sender Receiver
Transformation Transformation
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
Passive attacks
Security
attacks
Active attacks
ww
w.Ea
syE
ngi
nee
rin
g .ne
Opponent Read content of
t
message from sender
to receiver
nternet
Sender Receiver
Downloaded From: www.EasyEngineering.net
hp
nternet
Sender
Receiver
ww
w .Ea
syE
ngi
nee
rin
hp
g .ne
Opponent Message from opponent
t
that appears to be from sender
hp hp
nternet
Sender Receiver
Downloaded From: www.EasyEngineering.net
hp
ww Opponent
Capture message from
sender to receiver, later
replay message to receiver
whp
.Ea nternet
hp
ngi
nee
hp
rin
g .ne
hp
Opponent
Opponent modifies
message from sender
to receiver
hp
t
nternet
Sender Receiver
Downloaded From: www.EasyEngineering.net
hp
Disrupts service
provided by server
ww
hp hp
nternet
w.Ea
syE
ngi
nee
Source
system
Server
rin
hp
g
Target
system
.ne
Legitimate connection attempt
TCP SYN packet
t
TCP SYN ACK packet
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
Encipherment
ww Data integrity
w.Ea
Digital signature
syE
Security
mechanisms
Authentication exchange
nee
Routing control
Notarization rin
Access control
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
OSI Security
architecture
t
Security attacks
Security mechanisms
Security services
Downloaded From: www.EasyEngineering.net
ww Sender Receiver
w .Ea
syE
Plain text
Encryption
Cypher-text
Decryption
Plain text
ngi
Attacker nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
Secret key
shared by
sender and recipients
ww
w .Ea
Plaintext
input
syE
Encryption
algorithm
Decryption
algorithm
Plaintext
output
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
^
X
Cryptanalyst ^
K
ww
Message
source
X Encryption
algorithm
Y Decryption
algorithm
X
Destination
w .Ea K
Secure channel
syE Key
source
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w
C1
C2
C
K 11
.Ea
K 21
K
K 12
K 22
K 32
K 13 P1
K 23 P2
K 33 P3
3 31
syE
ngi
nee
rin
17 17 5
21 18 21
g .ne
2 2 19
t
17 17 5 15
21 18 21 0
2 2 19 24
375
819
486
11
13
18
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww L1 R1
w
Round i .Ea Ki
syE F
ngi
nee
Li Ri
rin
Round n Kn g .ne
F
t
Ln Rn
Ln+1 Rn+1
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
LD 0 F( RD 0 , K 16 )
Downloaded From: www.EasyEngineering.net
RE 0 LE 0
ww
w .Ea
syE
ngi
nee
17 17 5 rin
2 2 19
21 18 21
g .ne
17 17 5
t
21 18 21
2 2 19
15 15 375 11
0 0 819 13
24 24 486 18
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
2
rin
14
4
g .ne
t
0 13 14
19 6 4
17 1 25
0 13 14 2 238 4
19 6 4 14 mod 26 138 mod 26 8
17 1 25 4 148 18
Downloaded From: www.EasyEngineering.net
17 17 5
21 18 21
2 2 19
17 17 5
21 18 21
2 2 19
ww
15 15
0 0
375
819 mod 26
11
13
w
24 24
486
.Ea
18
syE
ngi
0 13 14
19 6 4
nee
17 1 25
rin
4 4 8
18 13 0
g .ne
18 19 11
t
0 13 14 4 4 8
19 6 4 18 13 0 mod 26
17 1 25 18 19 11
S T Y
W W D mod 26
Q K V
Downloaded From: www.EasyEngineering.net
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w .Ea
syE
ngi
b o o nee
i g
u y u b o s n u
rin u t
y r k A
g s
.ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww Steganography
(Covered writing, covert channels)
w .Ea
syE
Protection against detection
(data hiding)
Protection against removal
(document marking)
ngi
nee
Watermarking
(all objects are marked rin
Fingerprinting
(identify all objects, every
in the same way)
g
object is marked specific)
.ne
t
Downloaded From: www.EasyEngineering.net
ww
w .Ea
syE Secret
image
Cover
Encoder
nee
image
rin
g .ne
Secret
image Decoder
Key
Communications
t
channel
Original
cover
Downloaded From: www.EasyEngineering.net
~
I
~
I xK xM I
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
~
I
~
I
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
2n
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t
Downloaded From: www.EasyEngineering.net
ww
w.Ea
syE
ngi
nee
rin
g .ne
t