SlideShare ist ein Scribd-Unternehmen logo
1 von 19
IT346 Information
System Security

Week 3-2: Symmetric Key
Cryptography

Faculty of Information Technology

Page

1
Block Cipher
 Block Cipher

block

‣

block
encrypt
block
block
ciphertext
block
encryption

‣

full
encrypt

encrypt
Exrw

Faculty of Information Technology

time

part
encrypt

vjyo

gMsQ

time
encrypt
vjyo

Page

2
Block Cipher


‣ Ciphertext

plaintext
block
‣ Encryption
block

Faculty of Information Technology

ciphertext

plaintext
block cipher
block

block

probabilistic
output

plaintext
input

Page

3
Block Cipher
 Mode
Block Cipher
‣ Electronic Code Book (ECB)
‣ Cipher Block Chaining (CBC)
 Mode
Block Cipher

Stream Cipher

‣ Cipher Feedback (CFB)
‣ Output Feedback (OFB)

Faculty of Information Technology

Page

4
Electronic Code Book
(ECB) mode





block
block
block
block

Faculty of Information Technology

encrypt

Page

5
Electronic Code Book
(ECB) mode

Faculty of Information Technology

Page

6
Cipher Block Chaining
(CBC) mode


ciphertext

Encryption
‣ Chain

Block

‣ Block
Faculty of Information Technology

plaintext
Input
plaintext
block
Initial Vector (IV)
IV
IV
key
XOR
encrypt

ciphertext
key

block
Page

7
Cipher Block Chaining
(CBC) mode
Decryption



‣ Ciphertext

key
encryption

block

decrypt

XOR
IV
plaintext
block
‣ Decrypt Ciphertext
block
Ciphertext
block
plaintext
block
‣

block
Faculty of Information Technology

XOR

decrypt
plaintext
Page

8
Cipher Block Chaining
(CBC) mode
C0 = IV
Ci = EK(Pi XOR Ci-1)

C0 = IV
Pi = DK(Ci) XOR Ci-1

Faculty of Information Technology

Page

9
Cipher Feedback
(CFB) mode


‣

encrypt

‣

block

Faculty of Information Technology

Page

10
Cipher Feedback
(CFB) mode
 Encryption
‣ IV
encrypt
bits

shift register
cipher IV
bit

‣

cipher IV
XOR
j
plaintext block
ciphertext block
‣
ciphertext block
‣
IV
shift bit
j
ciphertext block

j

‣

Faculty of Information Technology

IV

j

plaintext

Page

11
CFB Mode
Encryption

Decryption

Faculty of Information Technology

Page

12
Output Feedback
(OFB) mode
CFB



‣

IV
‣

Faculty of Information Technology

CFB
ciphertext
encryption
OFB
ciphertext
IV

IV

Page

13
Output Feedback
(OFB) mode

Faculty of Information Technology

Page

14
Symmetric Key Cryptography
Symmetric Key
Cryptography
key
Encryption
Decryption
?
 Alice
Bob
Alice
Bob
Bob
Alice
Symmetric Key


Faculty of Information Technology

Page

15
Diffie-Hellman
 Diffie-Hellman

(Exponential)
(Logarithm)

Secret Key



Primitive
Modulo p)

Faculty of Information Technology

g

p

g<p
g
p (Primitive Root
Page

16
Diffie-Hellman
(Example)

g = 3, p = 5
Primitive


‣
‣
‣
‣
‣
‣

g1 mod 5 = 3 mod 5 = 3
g2 mod 5 = 9 mod 5 = 4
g3 mod 5 = 27 mod 5 = 2
g4 mod 5 = 81 mod 5 = 1
g5 mod 5 = 243 mod 5 = 3
g6 mod 5 = 729 mod 5 = 4



Faculty of Information Technology

3

primitive

5

Page

17
Diffie-Hellman
Secret Key



Alice



g

a

Bob
p


A = ga
mod p

g, p, A
Bob


B

Faculty of Information Technology

Bob

g, p,
A

B



b

p


g, p, A
B = gb mod

Alice

K=

Page

18
Diffie-Hellman
 g = 3 and p = 5

Alice


g=3
p=5
g=3, p

a=2
=5, A

A = 32 mod =4
5=4
B

g=3, p=5, A=4
Bob
Faculty of Information Technology

Bob

g=3, p=5, A=4

b=3

B = 33 mod 5
=2
Alice

K = 43
Page

19

Weitere ähnliche Inhalte

Ähnlich wie Information system security wk3-2

amrapali builders@@sub way hacking.pdf
amrapali builders@@sub way hacking.pdfamrapali builders@@sub way hacking.pdf
amrapali builders@@sub way hacking.pdf
amrapalibuildersreviews
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
ceng
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
Information Security
Information SecurityInformation Security
Information Security
raxosz
 

Ähnlich wie Information system security wk3-2 (20)

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Encryption
EncryptionEncryption
Encryption
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc -	ashutosh ahelleyaBit flipping attack on aes cbc -	ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
amrapali builders@@sub way hacking.pdf
amrapali builders@@sub way hacking.pdfamrapali builders@@sub way hacking.pdf
amrapali builders@@sub way hacking.pdf
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
Block cipher modes of operations
Block cipher modes of operationsBlock cipher modes of operations
Block cipher modes of operations
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
4. algorithm modes (1)
4. algorithm modes (1)4. algorithm modes (1)
4. algorithm modes (1)
 
Rapport ICO Rating
Rapport ICO RatingRapport ICO Rating
Rapport ICO Rating
 
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2
 
SymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdfSymmetricCryptography-Part3 - Tagged.pdf
SymmetricCryptography-Part3 - Tagged.pdf
 
Stream versus block ciphers Stream versus block ciphers .pptx
Stream versus block ciphers  Stream versus block ciphers  .pptxStream versus block ciphers  Stream versus block ciphers  .pptx
Stream versus block ciphers Stream versus block ciphers .pptx
 
Information Security
Information SecurityInformation Security
Information Security
 

Mehr von Bee Lalita (12)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authentication
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 

Kürzlich hochgeladen

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Information system security wk3-2