Professional Documents
Culture Documents
Cryptography & Network Security
Cryptography & Network Security
SECURITY
1
CRYPTOGRAPHY COMPONENTS
Cryptography, a word with Greek origins, means “secret writing.”
However, we use the term to refer to the science and art of
transforming messages to make them secure and immune attacks.
2
CRYPTOGRAPHY COMPONENTS
the original message, before being transformed, is called plaintext.
After the message is transformed, it is called ciphertext. An
encryption algorithm transforms the plain-text into ciphertext; a
decryption algorithm transforms the ciphertext back into plaintext.
The sender uses an encryption algorithm. And the receiver uses a
decryption algorithm.
Ciphers referred also to encryption and decryption algorithms
3
CATEGORIES OF CRYPTOGRAPHY
All cryptography algorithms (ciphers) divided into two groups:
symmetric-keys (also called secret key) cryptography algorithms
and asymmetric-key (also called public-key) cryptography
algorithms.
4
SYMMETRIC-KEY CRYPTOGRAPHY
In symmetric-key cryptography, the same key is used by the sender
(for encryption) and the receiver (for decryption).
The key is shared. (A key is a number or a set of numbers that the
cipher, as an algorithm, operates on).
5
SYMMETRIC-KEY CRYPTOGRAPHY
Symmetric-key cryptography started thousands of years ago when
people needed to exchange secrets (for example, in a war). We still
mainly use symmetric-key cryptography in our network security.
Traditional ciphers
6
TRADITIONAL CIPHERS
A substitution cipher replaces one symbol with another.
Substitution ciphers can be categorized as either
monoalphabetic or polyalphabetic ciphers
In monoalphabetic, a character ( or a symbol) in the
plaintext is always changed to the same character (or a
symbol) in the ciphertext regardless of its position in the
text.
7
MONOALPHABETIC EXAMPLE
The following shows a plaintext and its corresponding
ciphertext. Is the cipher monoalphabetic?
Solution
The cipher is probably monoalphabetic because both
occurrences of L’s are encrypted as O’s.
8
SUBSTITUTION CIPHER
In a polyalphabetic cipher, each occurrence of a
character can have a different substitute.
For example,
Solution
The cipher is not monoalphabetic because each
occurrence of L is encrypted by a different character. The
first L is encrypted as N; the second as Z.
9
SUBSTITUTION CIPHER
The simplest monoalphabetic cipher is probably the shift
cipher, assume that the plaintext and ciphertext consist
of uppercase letters (A to Z) only. Sometimes referred to
as the Caesar cipher.
Example; Use the shift cipher with key = 15 to encrypt
the message “HELLO.”
Solution
Plaintext : 2 4 1 3
Ciphertext: 1 2 3 4
In encryption, move the character at position 2 to position 1, the character at position
4 to position 2, and so on. In decryption, do the reverse. 11
TRANSPOSITION CIPHERS
Example;
Encrypt the message “HELLO MY DEAR,” using the
above key
Solution
12
SIMPLE MODERN CIPHERS
XOR Cipher
Rotation Cipher
13
ASYMMETRIC-KEY CRYPTOGRAPHY
In asymmetric or public-key cryptography, there are two keys: a
private key and a public key.
The private key is kept by the receiver. The public key is
announced to the public.
Two algorithms used: RSA and Diffie-Hellman
14
COMPARISON BETWEEN TWO
CATEGORIES OF CRYPTOGRAPHY
15
NETWORK SECURITY
16
MESSAGE CONFIDENTIALITY
Message confidentiality or privacy means that the sender and the
receiver expect confidentiality. The transmitted message must make
sense to only the intended receiver. To all others, the message must
be garbage. When a customer communicates with her bank, she
expects that the communication is totally confidential.
The concept of how to achieve message confidentiality or privacy
has not changed for thousands of years. The message must be
encrypted at the sender site and decrypted at the receiver site. This
can be done using either symmetric-key cryptography or
asymmetric-key cryptography.
17
MESSAGE INTEGRITY
Message integrity means that the data must arrive at the receiver
exactly as they were sent. There must be no changes during the
transmission, neither accidentally nor maliciously. As more and
more monetary exchanges occur over the Internet, integrity is
crucial.
For example, it would be disastrous if a request for transferring
$100 changed to a request for $10,000 or $100,000.
The integrity of the message must be preserved in a secure
communication.
Encryption and decryption provide secrecy, or confidentiality, but
not integrity. However, on occasion we may not even need secrecy,
but instead must have integrity.
18
MESSAGE INTEGRITY
To preserve the integrity of a document, both the document and the
fingerprint are needed.
If Alice needs to be sure that the contents of her document will not
be illegally changed, she can put her fingerprint at the bottom of the
document. Eve cannot modify the contents of this document or
create a false document because she cannot forge Alice's fingerprint.
To ensure that the document has not been changed, Alice's
fingerprint on the document can be compared to Alice's fingerprint
on file. If they are not the same, the document is not from Alice.
Message and message digest is example of this one
19
MESSAGE AUTHENTICATION
Message authentication is a service beyond message
integrity. In message authentication the receiver needs to
be sure of the sender's identity and that an imposter has
not sent the message.
20
MESSAGE NONREPUDIATION
Message nonrepudiation means that a sender must not be
able to deny sending a message that he or she, in fact,
did send. The burden of proof falls on the receiver.
For example, when a customer sends a message to
transfer money from one account to another, the bank
must have proof that the customer actually requested this
transaction.
21
ENTITY AUTHENTICATION
In entity authentication (or user identification) the entity
or user is verified prior to access to the system resources
(files, for example).
For example, a student who needs to access her
university resources needs to be authenticated during the
logging process.
This is to protect the interests of the university and the
student.
22