Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

2016

-differential cryptanalysis
-message authentication (attacks addressed-2017)
-hash function (2017)
-triple DES and Double DES
DOUBLE DES:
- Data encryption standard (DES) uses 56-bit key to encrypt any plain text which can be easily
be cracked by using modern technologies. To prevent this from happening double DES and
triple DES were introduced which are much more secured than the original DES because it
uses 112 and 168-bit keys respectively. They offer much more security than DES.
- Double DES is an encryption technique which uses two instances of DES on same plain text.
In both instances it uses different keys to encrypt the plain text. Both keys are required at
the time of decryption. The 64-bit plain text goes into first DES instance which then
converted into a 64-bit middle text using the first key and then it goes to second DES
instance which gives 64-bit cipher text by using second key.
- Double DES uses 112-bit key but gives security level of 2^56 not 2^112 and this is because of
meet-in-the middle attack which can be used to break through double DES.
TRIPLE DES:
-

-software forensics
-Security Services /Key features of Security -2022
1) Confidentiality: The degree of confidentiality determines the secrecy of the information.
The principle specifies that only the sender and receiver will be able to access the
information shared between them. Confidentiality compromises if an unauthorized
person is able to access a message.
2) Authentication: Authentication is the mechanism to identify the user or system or the
entity. It ensures the identity of the person trying to access the information. The
authentication is mostly secured by using username and password. The authorized
person whose identity is preregistered can prove his/her identity and can access the
sensitive information.
3) Integrity: Integrity gives the assurance that the information received is exact and
accurate. If the content of the message is changed after the sender sends it but before
reaching the intended receiver, then it is said that the integrity of the message is lost.
- System Integrity: System Integrity assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the
system.
- Data Integrity: Data Integrity assures that information (both stored and in transmitted
packets) and programs are changed only in a specified and authorized manner.
4) Non-Repudiation: Non-repudiation is a mechanism that prevents the denial of the
message content sent through a network. In some cases, the sender sends the message
and later denies it. But the non-repudiation does not allow the sender to refuse the
receiver.
5) Access control: The principle of access control is determined by role management and
rule management. Role management determines who should access the data while rule
management determines up to what extent one can access the data. The information
displayed is dependent on the person who is accessing it.
-cryptographer vs cryptanalyst

-active vs passive attack (2017,2022)


On the basis Active attack Passive attack
of
Definition In active attacks, the attacker intercepts In passive attacks, the attacker observes the
the connection and efforts to modify the messages, then copy and save them and can use
message's content. it for malicious purposes.

Modification In an active attack, the attacker modifies In passive attacks, information remains
the actual information. unchanged.

Victim In active attacks, the victim gets notified Unlike active attacks, in passive attacks, victims
about the attack. do not get informed about the attack.

System In active attacks, the system resources can In passive attacks, the system resources remain
resources be changed. unchanged.

Dangerous for They are dangerous for the integrity and They can be dangerous for confidentiality of the
availability of the message. message.

Emphasis on In active attacks, attention is on detection. In active attacks, attention is on prevention.

Types Active attacks involve Masquerade, It involves traffic analysis, the release of a
Modification of message, Repudiation, message.
Replay, and Denial of service.

Prevention Active attacks are tough to restrict from Unlike active attacks, passive attacks are easy to
entering systems or networks. prohibit.

-symmetric vs asymmetric encryption algo /public and private key (2017,2018,2022)

Symmetric Cryptography/Private or Secret key crypt Asymmetric Cryptography/Public key

It only requires a single key for both encryption and It requires two keys, a public key and a private key,
decryption. one to encrypt and the other one to decrypt.
The encryption process is very fast and less complex. The encryption process is slow.

The size of cipher text is the same or smaller than the The size of cipher text is the same or larger than the
original plain text. original plain text.
It is used when a large amount of data is required to It is used to transfer small amounts of data.
transfer.
It only provides confidentiality. It provides confidentiality, authenticity, and non-
repudiation.
Security is less as only one key is used for both encryption It is more secure as two keys are used here- one for
and decryption purpose. encryption and the other for decryption.
In symmetric key encryption, resource utilization is low as In asymmetric key encryption, resource utilization is
compared to asymmetric key encryption. high.
Examples: 3DES, AES, DES and RC4 Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA

-RSA Algo with example: 2017(+num), 2018


-DES (2017 ,2018 block diagram,2022) vs AES (2019) :(2017)
DES:
- DES is a block cipher and encrypts data in blocks of size of 64 bits each, which means 64 bits
of plain text go as the input to DES, which produces 64 bits of ciphertext. The same
algorithm and key are used for encryption and decryption, with minor differences. The key
length is 56 bits.
- Data Encryption Standard (DES) is a block cipher with a 56-bit key length that has played a
significant role in data security. However, due to vulnerabilities, its popularity has declined.
- The initial key consists of 64 bits. However, before the DES process even starts, every 8th bit
of the key is discarded to produce a 56-bit key. That is bit positions 8, 16, 24, 32, 40, 48, 56,
and 64 are discarded. Thus, the discarding of every 8th bit of the key produces a 56-bit key
from the original 64-bit key.
Steps:
- In the first step, the 64-bit plain text block is handed over to an initial Permutation (IP)
function. The IP replaces the first bit of the original plain text block with the 58th bit of the
original plain text, the second bit with the 50th bit of the original plain text block, and so on.
- The initial permutation is performed on plain text.
- Next, the initial permutation (IP) produces two halves of the permuted block; saying Left
Plain Text (LPT) and Right Plain Text (RPT).
- During the expansion permutation, the RPT is expanded from 32 bits to 48 bits. Bits are
permuted as well hence called expansion permutation
- Now each LPT and RPT go through 16 rounds of the encryption process.
- In the end, LPT and RPT are rejoined and a Final Permutation (FP) is performed on the
combined block
- The result of this process produces 64-bit ciphertext.

2017
-cyber forensics
-Playfair cipher (+num):2019
-security challenges in wireless network/mobile devices
- various cryptographic technique
- linear vs differential cryptanalysis: (2019)
-Block vs stream cipher:(2018,2022)

S.N Block Cipher Stream Cipher


O
1. Block Cipher Converts the plain text into Stream Cipher Converts the plain text
cipher text by taking plain text’s block at a into cipher text by taking 1 byte of plain
time. text at a time.

2. Block cipher uses either 64 bits or more While stream cipher uses 8 bits.
than 64 bits.

3. The complexity of block cipher is simple While stream cipher is more complex
and slow as compared to a stream cipher. and is fast in comparison to block cipher.

4. Block cipher Uses confusion as well as While stream cipher uses only confusion
diffusion ( hides relationship between (hides relationship between cipher text
cipher text and plain text). and key).

5. In block cipher, reverse encrypted text is While in-stream cipher, reverse


hard. encrypted text is easy.

6. The algorithm modes which are used in The algorithm modes which are used in
block cipher are ECB (Electronic Code stream cipher are CFB (Cipher Feedback)
Book) and CBC (Cipher Block Chaining). and OFB (Output Feedback).

7. Block cipher works on transposition While stream cipher works on


techniques like rail-fence technique, substitution techniques like Caesar
columnar transposition technique, etc. cipher, Polygram substitution cipher, etc.

-digital signature
-Elliptic curve cryptography (2019)
-various cryptographic schemes (symmetric, asymmetric)

2018
-cryptography vs cryptanalysis
-Ciphertext-only attacks
-Various Security goals (CIA)
The CIA triad is a security model that is designed to guide policies for information security
within the premises of an organization or company.
1) Confidentiality: It involves the protection of data, providing access for those who are
allowed to see it while disallowing others from learning anything about its content. It
prevents essential information from reaching the wrong people while making sure that
the right people can get it. Data encryption is a good example to ensure confidentiality.
Tools for confidentiality are:
- Encryption is a method of transforming information to make it unreadable for
unauthorized users by using an algorithm. The transformation of data uses a secret
key (an encryption key) so that the transformed data can only be read by using
another secret key (decryption key).
- Access control defines rules and policies for limiting access to a system or to physical
or virtual resources. It is a process by which users are granted access and certain
privileges to systems, resources or information. In access control systems, users need
to present credentials before they can be granted access such as a person's name or
a computer's serial number.
- An authentication is a process that ensures and confirms a user's identity or role that
someone has.
- Authorization is a security mechanism which gives permission to do or have
something. It is used to determine a person or system is allowed access to resources,
based on an access control policy, including computer programs, files, services, data
and application features
- Physical security describes measures designed to deny the unauthorized access of IT
assets like facilities, equipment, personnel, resources and other properties from
damage. It protects these assets from physical threats including theft, vandalism, fire
and natural disasters.
2) Integrity: Integrity refers to the methods for ensuring that data is real, accurate and
safeguarded from unauthorized user modification. It is the property that information has
not be altered in an unauthorized way, and that source of the information is genuine.
Tools for integrity are:
- Backup is the periodic archiving of data. It is a process of making copies of data or
data files to use in the event when the original data or data files are lost or
destroyed. Many applications especially in a Windows environment, produce backup
files using the .BAK file extension.
- A checksum is a numerical value used to verify the integrity of a file or a data
transfer. In other words, it is the computation of a function that maps the contents of
a file to a numerical value.
- Data Correcting Codes is a method for storing data in such a way that small changes
can be easily detected and automatically corrected.

3) Availability: Availability is the property in which information is accessible and modifiable


in a timely fashion by those authorized to do so. It is the guarantee of reliable and
constant access to our sensitive data by authorized people.
Tools:
- Physical safeguard means to keep information available even in the event of physical
challenges. It ensures sensitive information and critical information technology are
housed in secure areas.
- Computational redundancies: It is applied as fault tolerant against accidental faults. It
protects computers and storage devices that serve as fallbacks in the case of failures.

-modern block cipher


-Feistel ciphers
Feistel Cipher model is a structure or a design used to develop many block ciphers such as DES.
Same encryption as well as decryption algorithm is used. Each round uses a different key for
encryption, and that same key is used for the decryption process.
(diagram)

Step 1 – The first step involves the plain text being divided into blocks of a fixed size, with only
one block being processed at a time. The encryption algorithm input consists of a plain text
block and a key K.
Step 2 – The plain text block is divided into two halves. The left half of the plain text block will
be represented as LE0, and the right half of the block will be RE0. Both halves of the plain text
block (LE0 and RE0) will go through numerous rounds of processing plain text to produce the
ciphertext block.
For every round, the encryption function is applied on the right half REi of the plain text block
plus the key Ki. The function results are then XORed with the left half LEj. XOR is a logical
operator used in cryptography that compares two input bits and produces one output bit. The
XOR function results become the new right half for the next round RE i+1. The previous right
half REi becomes the new left half LEi+1 for the next round.
Feistel cipher structure has the following five components:
 Number of rounds: The greater the number of rounds, n, used for the
encryption/decryption process, the higher the complexity; hence, the security of the
block cipher.
 Sub key generation algorithm: Complex algorithms make it difficult for intruders to crack
the key.
 Encryption function: Complex functions enhance the security of the block cipher,
making them difficult to crack.
 Block size: The larger the size of the block, the more secure and complex the block
cipher is. However, a larger block size reduces the execution speed of the encryption and
decryption process.
 Key size: A large size key increases the security of the block cipher. However, it also
makes the encryption and decryption process slow.

-Kerckhoff's principle
- types of cryptanalysis attack
2019
-Steganography
-Rail fence cipher numerical
-number theory numerical
-monoalphabetic vs polyalphabetic key cipher
-triple DES with two keys vs three keys
-Diffie-Hellman Algo
-Mobile Forensics
-S-Box and P-Box in DES

2022
-Replay attacks
-How can Caesar Cipher be cracked
-Phishing, Explain how cookies can be used to invade people's privacy
-Cryptanalysis vs network attack
-plain text, cipher text, transformation of plain text into cipher text
-How can same key to reuse in triple DES

You might also like