Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks - - PowerPoint PPT Presentation

yasser f o mohammad 2010 2 23 reminder 1 active attacks
SMART_READER_LITE
LIVE PREVIEW

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks - - PowerPoint PPT Presentation

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks Masquerade Modification Replay DoS REMINDER 2: Security Services in X.800 Authentication 1. Pear entity authentication Data origin authentication Access Control 2.


slide-1
SLIDE 1

Yasser F. O. Mohammad 2010.2.23

slide-2
SLIDE 2

REMINDER 1: Active Attacks

Masquerade Replay Modification DoS

slide-3
SLIDE 3

REMINDER 2: Security Services in X.800

1.

Authentication

Pear entity authentication

Data origin authentication

2.

Access Control

3.

Data Confidentiality

4.

Data Integrity

5.

Nonrepudiation

6.

Availability

slide-4
SLIDE 4

REMINDER 3: Model For Network Security

slide-5
SLIDE 5

Basic Terms

 Plain Text  Encipher/ciphertext  Cryptography  Cryptanalysis

slide-6
SLIDE 6

Operational of Conventional Cryptosystem

slide-7
SLIDE 7

Types of Cryptographic Systems

 Type of Operation

 Substitution  Transposition  Product Systems

 Number of Keys

 Single (Shared) Key  Two (public) Key

 Processing Technique

 Block Cipher  Stream Cipher

slide-8
SLIDE 8

Types of Cryptanalysis

 Intelligence Level

 Cryptanalysis (per se)  Brute-Force Attack

 Available Information

 Ciphertext only  Known plaintext (Full/Partial)  Chosen plaintext (Differential Cryptanalysis)  Chosen ciphertext  Chosen text

slide-9
SLIDE 9

Encryption Scheme Security

 Unconditional Security

 Information is not there in the ciphertext  One-Time Pad

 Conditional Security

 Cost  Time

slide-10
SLIDE 10

Brute-Force Attack

slide-11
SLIDE 11

Shared Key Encryption

slide-12
SLIDE 12

Public Key Encryption

slide-13
SLIDE 13

Classical Cryptosystems

Substitution Techniques

 Caesar Cipher

 Example

Plain : meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB

 Subtitution Table:

plain: abcdefghijklmnopqrstuvwxyz cipher: DEFGHIJKLMNOPQRSTUVWXYZABC

 Formula

C = E(3, p) = (p + 3) mod 26 p = D(k, C) = (C - k) mod 26 How to do cryptanalysis???