yasser f o mohammad 2010 2 23 reminder 1 active attacks
play

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks - PowerPoint PPT Presentation

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks Masquerade Modification Replay DoS REMINDER 2: Security Services in X.800 Authentication 1. Pear entity authentication Data origin authentication Access Control 2.


  1. Yasser F. O. Mohammad 2010.2.23

  2. REMINDER 1: Active Attacks Masquerade Modification Replay DoS

  3. REMINDER 2: Security Services in X.800 Authentication 1. Pear entity authentication  Data origin authentication  Access Control 2. Data Confidentiality 3. Data Integrity 4. Nonrepudiation 5. Availability 6.

  4. REMINDER 3: Model For Network Security

  5. Basic Terms  Plain Text  Encipher/ciphertext  Cryptography  Cryptanalysis

  6. Operational of Conventional Cryptosystem

  7. Types of Cryptographic Systems  Type of Operation  Substitution  Transposition  Product Systems  Number of Keys  Single (Shared) Key  Two (public) Key  Processing Technique  Block Cipher  Stream Cipher

  8. Types of Cryptanalysis  Intelligence Level  Cryptanalysis (per se)  Brute-Force Attack  Available Information  Ciphertext only  Known plaintext (Full/Partial)  Chosen plaintext (Differential Cryptanalysis)  Chosen ciphertext  Chosen text

  9. Encryption Scheme Security  Unconditional Security  Information is not there in the ciphertext  One-Time Pad  Conditional Security  Cost  Time

  10. Brute-Force Attack

  11. Shared Key Encryption

  12. Public Key Encryption

  13. Classical Cryptosystems Substitution Techniques  Caesar Cipher  Example Plain : meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB  Subtitution Table: plain: abcdefghijklmnopqrstuvwxyz cipher: DEFGHIJKLMNOPQRSTUVWXYZABC  Formula C = E(3, p) = (p + 3) mod 26 p = D(k, C) = (C - k) mod 26 How to do cryptanalysis???

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend