SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Question Set No. 1
a. Explain the systematic cipher model with ingredients.
Answer:
Symmetric Encryption
i) Sender and recipient share a common key ii) All classical
encryption algorithms are private-key
iii) It was only type prior to invention of public-key in 1970's
Basic Terminology
i) Plaintext - the original message ii)
Ciphertext - the coded message
iii) Cipher - algorithm for transforming plaintext to ciphertext
iv) Key - info used in cipher known only to sender/receiver v)
Encipher (encrypt) - converting plaintext to ciphertext vi)
Decipher (decrypt) - recovering ciphertext from plaintext vii)
Cryptography - study of encryption principles/methods
viii) Cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext
without knowing key
ix) Cryptology - the field of both cryptography and cryptanalysis
b. What are the two requirements for secure use of conventional encryption?
Answer:
i) Two requirements for secure use of symmetric encryption:
ii) a strong encryption algorithm
iii) a secret key known only to sender / receiver
a. Y = EK(X)
b. X = DK(Y)
iv) Assume encryption algorithm is known
v) Implies a secure channel to distribute key
c. Mention the dimension of cryptography Answer:
Cryptographic systems are characterized along three independent dimensions
1) Type of encryption operations used
□ Substitution: In which each element in the plaintext (bit, letter, group of bits or letters) is
mapped into another element
□ Transposition: In which elements in the plaintext are rearranged
□ Product: Involve multiple stages of substitutions and transpositions
2) Number of keys used
□ Single-key or private: If both sender and receiver use the same key, the system is referred to
as symmetric, single-key, secret-key, or conventional encryption.
□ Two-key or public: If the sender and receiver use different keys, the system is referred to as
asymmetric, two-key, or public-key encryption.
3) Way in which plaintext is processed
□ block / stream
A block cipher processes the input one block of elements at a time, producing an output block
for each input block. A stream cipher processes the input elements continuously, producing
output one element at a time, as it goes along.
d. Briefly explain cryptanalysis and brute-force attack.
Answer:
Cryptanalysis
i) Only have 26 possible ciphers
□ A maps to A, B,...Z ii) Could
simply try each in turn iii) A
brute force search
iv) Given ciphertext, just try all shifts of letters v)
Do need to recognize when have plaintext
e.g. break ciphertext "GCUA VQ DTGCM"
Brute-force attack
i) Always possible to simply try every key ii)
Most basic attack, proportional to key size iii)
Assume either know / recognize plaintext
e. Mention the types of attacks on encrypted messages.
Answer:
i) Ciphertext only
□ only know algorithm / ciphertext, statistical, can
identify plaintext ii) Known plaintext
□ know/suspect plaintext & ciphertext to attack cipher iii)
Chosen plaintext
□ select plaintext and obtain ciphertext to attack cipher iv)
Chosen ciphertext
□ select ciphertext and obtain plaintext to attack cipher
v) Chosen text
□ select either plaintext or ciphertext to en/decrypt to attack cipher
Question Set No. 3
a. Explain the silent features of AES. Answer:
The features of AES are as follows -
i) Private Key symmetric block cipher ii)
128-bit data, 128/192/256-bit keys iii)
Stronger & faster than Triple-DES iv) Active life of 20-30
years (+ archival use)
v) Provide full specification & design details
vi) Both C & Java implementations
vii) NIST have released all submissions & unclassified analyses
b. Mention AES key parameters and the characteristics of Rijndael AES.
Answer:
AES key parameters
i) initial criteria:
a. security - effort for practical cryptanalysis
b. cost - in terms of computational efficiency
c. algorithm & implementation characteristics
ii) final criteria
a. general security
b. ease of software & hardware implementation
c. implementation attacks
d. flexibility (in en/decrypt, keying, other factors)
e.
The characteristics of Rijndael AES is given
below: i) designed by Rijmen-Daemen in Belgium
ii) has 128/192/256 bit keys, 128 bit data iii) an
iterative rather than feistel cipher
a. treats data in 4 groups of 4 bytes
b. operates an entire block in every round
iv) designed to be:
a. resistant against known attacks
b. speed and code compactness on many CPUs
c. design simplicity
v) processes data as 4 groups of 4 bytes (state)
vi) has 9/11/13 rounds in which state undergoes:
a. byte substitution (1 S-box used on every byte)
b. shift rows (permute bytes between groups/columns)
c. mix columns (subs using matrix multiply of groups)
d. add round key (XOR state with key material)
vii) initial XOR key material & incomplete last round
viii)
ix) all operations can be combined into XOR and table lookups - hence very fast
& efficient
c. Briefly explain Triple DES encryption and decryption process.
Answer: Triple
DES
i) Clear a replacement for DES was needed
a. theoretical attacks that can break it
b. demonstrated exhaustive key search attacks
ii) AES is a new cipher alternative
iii) Prior to this alternative was to use multiple encryption with DES implementations iv)
TripleDES is the chosen form
Triple-DES with Two-Keys
i) Hence must use 3 encryptions
a. would seem to need 3 distinct keys
ii) But can use 2 keys with E-D-E sequence
a. C = EK1[DK2[EK1[P]]]
b. nb encrypt & decrypt equivalent in security
c. if K1=K2 then can work with single DES
iii) Standardized in ANSI X9.17 & ISO8732 iv) No current known practical attacks
Triple-DES with Three-Keys
i) Although are no practical attacks on two-key Triple-DES have some indications ii)
Can use Triple-DES with Three-Keys to avoid even these
a. C = EK3[DK2[EK1[P]]]
iii) Has been adopted by some Internet applications, eg PGP, S/MIME
d. Explain the key distribution process.
Answer:
Key Distribution
i) Symmetric schemes require both parties to share a common secret key
ii) Issue is how to securely distribute this key
iii) Often secure system failure due to a break in the key distribution
scheme
- Nonce is also sent
- Nonce includes identities of communicating parties and a unique value
2. KDC sends a response encrypted with A's secret key KA - It includes onetime session key KS
- Original request message, including the nonce
- Message also includes KS and ID of A encrypted with KB intended for B
3. A stores KS and forwards information for B i.e., EKB[KS|| IDA]
4. B sends a nonce to A encrypted with KS
5. A responds by performing some function on nonce like incrementing
The last two steps assure B that the message it received was not a replay
Question Set No. 8
a. Explain MD5 algorithm and mention the strength of MD5 Answer:
MD5
i) designed by Ronald Rivest (the R in RSA)
ii) latest in a series of MD2, MD4
iii) produces a 128-bit hash value
iv) until recently was the most widely used hash algorithm v)
specified as Internet standard RFC1321
MD5 algorithm
1. pad message so its length is 448 mod 512
2. Append a 64-bit length value to message 3.
initialize 4-word (128-bit) MD buffer
(A,B,C,D)
4. process message in 16-word (512-bit) blocks:
- using 4 rounds of 16 bit operations on message block & buffer
- add output to buffer input to form new buffer
value 5. Output hash value is the final buffer value
Strength of MD5
i) MD5 hash is dependent on all message bits
ii) Rivest claims security is good as can be
iii) known attacks are:
a. Berson 92 attacked any 1 round using differential cryptanalysis (but can't extend)
b. Boer & Bosselaers 93 found a pseudo collision (again unable to extend)
c. Dobbertin 96 created collisions on MD compression function (but initial
constants prevent exploit)
iv) Conclusion is that MD5 looks vulnerable soon
b. Mention the comparison between MD5, SHA-1 & RIPEMD-160
Answer:
Comparison of Popular Hash Functions
Hash Func. MD5 SHA1 RMD160 HAS160
Digest size(bits) 128 160 160 160
Block size(bits) 512 512 512 512
No of steps 64(4x16) 80(4x20) 160(5x2x16) 80(4x20)
Boolean func. 4 4(3) 5 4(3)
Constants 64 4 9 4
Endianness Little Big Little Little
Speed ratio 1.0 0.57 0.5 0.94

Weitere ähnliche Inhalte

Was ist angesagt?

Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5ijsrd.com
 
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMaitree Patel
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsSam Bowne
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functionsMazin Alwaaly
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authenticationchauhankapil
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).pptGnanalakshmiV
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography AshikAshik Iqbal
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & AnalysisPawandeep Kaur
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
 

Was ist angesagt? (20)

Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
 
Hashing Algorithm: MD5
Hashing Algorithm: MD5Hashing Algorithm: MD5
Hashing Algorithm: MD5
 
Hash Function
Hash FunctionHash Function
Hash Function
 
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
MD5Algorithm
MD5AlgorithmMD5Algorithm
MD5Algorithm
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functions
 
Ch11
Ch11Ch11
Ch11
 
Md5
Md5Md5
Md5
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Cryptography Ashik
Cryptography AshikCryptography Ashik
Cryptography Ashik
 
Hash Function & Analysis
Hash Function & AnalysisHash Function & Analysis
Hash Function & Analysis
 
Hash function
Hash functionHash function
Hash function
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
MD5
MD5MD5
MD5
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 

Ähnlich wie Network Security(MD5)

CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoLuis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.pptwwww63
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 

Ähnlich wie Network Security(MD5) (20)

CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Day5
Day5Day5
Day5
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.ppt
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 

Mehr von United International University

ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)United International University
 
All types of model(Simulation & Modelling) #ShareThisIfYouLike
All types of model(Simulation & Modelling) #ShareThisIfYouLikeAll types of model(Simulation & Modelling) #ShareThisIfYouLike
All types of model(Simulation & Modelling) #ShareThisIfYouLikeUnited International University
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)United International University
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSUnited International University
 

Mehr von United International University (20)

Digital Devices (3rd chapter-2nd part)
Digital Devices (3rd chapter-2nd part)Digital Devices (3rd chapter-2nd part)
Digital Devices (3rd chapter-2nd part)
 
Network Topology (partial)
Network Topology (partial)Network Topology (partial)
Network Topology (partial)
 
Corona prediction from symptoms v1.4
Corona prediction from symptoms v1.4Corona prediction from symptoms v1.4
Corona prediction from symptoms v1.4
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
 
Wireshark lab ssl v7 solution
Wireshark lab ssl v7 solutionWireshark lab ssl v7 solution
Wireshark lab ssl v7 solution
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Oracle installation
Oracle installationOracle installation
Oracle installation
 
IEEE 802.11 Project
IEEE 802.11 ProjectIEEE 802.11 Project
IEEE 802.11 Project
 
SONET-Communication Engineering
SONET-Communication EngineeringSONET-Communication Engineering
SONET-Communication Engineering
 
Security Issues for Cellular Telephony
Security Issues for Cellular TelephonySecurity Issues for Cellular Telephony
Security Issues for Cellular Telephony
 
All types of model(Simulation & Modelling) #ShareThisIfYouLike
All types of model(Simulation & Modelling) #ShareThisIfYouLikeAll types of model(Simulation & Modelling) #ShareThisIfYouLike
All types of model(Simulation & Modelling) #ShareThisIfYouLike
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)System imolementation(Modern Systems Analysis and Design)
System imolementation(Modern Systems Analysis and Design)
 
Making Complex Decisions(Artificial Intelligence)
Making Complex Decisions(Artificial Intelligence)Making Complex Decisions(Artificial Intelligence)
Making Complex Decisions(Artificial Intelligence)
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Overview of Computer Graphics
Overview of Computer GraphicsOverview of Computer Graphics
Overview of Computer Graphics
 
Keyboard & Mouse basics
Keyboard & Mouse basics Keyboard & Mouse basics
Keyboard & Mouse basics
 
Organization of a computer
Organization of a computerOrganization of a computer
Organization of a computer
 

Kürzlich hochgeladen

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 

Kürzlich hochgeladen (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 

Network Security(MD5)

  • 1. Question Set No. 1 a. Explain the systematic cipher model with ingredients. Answer: Symmetric Encryption i) Sender and recipient share a common key ii) All classical encryption algorithms are private-key iii) It was only type prior to invention of public-key in 1970's Basic Terminology i) Plaintext - the original message ii) Ciphertext - the coded message iii) Cipher - algorithm for transforming plaintext to ciphertext iv) Key - info used in cipher known only to sender/receiver v) Encipher (encrypt) - converting plaintext to ciphertext vi) Decipher (decrypt) - recovering ciphertext from plaintext vii) Cryptography - study of encryption principles/methods viii) Cryptanalysis (codebreaking) - the study of principles/ methods of deciphering ciphertext without knowing key ix) Cryptology - the field of both cryptography and cryptanalysis b. What are the two requirements for secure use of conventional encryption? Answer: i) Two requirements for secure use of symmetric encryption: ii) a strong encryption algorithm iii) a secret key known only to sender / receiver
  • 2. a. Y = EK(X) b. X = DK(Y) iv) Assume encryption algorithm is known v) Implies a secure channel to distribute key c. Mention the dimension of cryptography Answer: Cryptographic systems are characterized along three independent dimensions 1) Type of encryption operations used □ Substitution: In which each element in the plaintext (bit, letter, group of bits or letters) is mapped into another element □ Transposition: In which elements in the plaintext are rearranged □ Product: Involve multiple stages of substitutions and transpositions 2) Number of keys used □ Single-key or private: If both sender and receiver use the same key, the system is referred to as symmetric, single-key, secret-key, or conventional encryption. □ Two-key or public: If the sender and receiver use different keys, the system is referred to as asymmetric, two-key, or public-key encryption. 3) Way in which plaintext is processed □ block / stream A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along. d. Briefly explain cryptanalysis and brute-force attack. Answer: Cryptanalysis i) Only have 26 possible ciphers □ A maps to A, B,...Z ii) Could simply try each in turn iii) A brute force search iv) Given ciphertext, just try all shifts of letters v) Do need to recognize when have plaintext
  • 3. e.g. break ciphertext "GCUA VQ DTGCM" Brute-force attack i) Always possible to simply try every key ii) Most basic attack, proportional to key size iii) Assume either know / recognize plaintext e. Mention the types of attacks on encrypted messages. Answer: i) Ciphertext only □ only know algorithm / ciphertext, statistical, can identify plaintext ii) Known plaintext □ know/suspect plaintext & ciphertext to attack cipher iii) Chosen plaintext □ select plaintext and obtain ciphertext to attack cipher iv) Chosen ciphertext □ select ciphertext and obtain plaintext to attack cipher v) Chosen text □ select either plaintext or ciphertext to en/decrypt to attack cipher Question Set No. 3 a. Explain the silent features of AES. Answer: The features of AES are as follows - i) Private Key symmetric block cipher ii) 128-bit data, 128/192/256-bit keys iii) Stronger & faster than Triple-DES iv) Active life of 20-30 years (+ archival use) v) Provide full specification & design details vi) Both C & Java implementations
  • 4. vii) NIST have released all submissions & unclassified analyses b. Mention AES key parameters and the characteristics of Rijndael AES. Answer: AES key parameters i) initial criteria: a. security - effort for practical cryptanalysis b. cost - in terms of computational efficiency c. algorithm & implementation characteristics ii) final criteria a. general security b. ease of software & hardware implementation c. implementation attacks d. flexibility (in en/decrypt, keying, other factors) e. The characteristics of Rijndael AES is given below: i) designed by Rijmen-Daemen in Belgium ii) has 128/192/256 bit keys, 128 bit data iii) an iterative rather than feistel cipher a. treats data in 4 groups of 4 bytes b. operates an entire block in every round iv) designed to be: a. resistant against known attacks b. speed and code compactness on many CPUs c. design simplicity v) processes data as 4 groups of 4 bytes (state) vi) has 9/11/13 rounds in which state undergoes: a. byte substitution (1 S-box used on every byte) b. shift rows (permute bytes between groups/columns) c. mix columns (subs using matrix multiply of groups) d. add round key (XOR state with key material)
  • 5. vii) initial XOR key material & incomplete last round viii) ix) all operations can be combined into XOR and table lookups - hence very fast & efficient c. Briefly explain Triple DES encryption and decryption process.
  • 6. Answer: Triple DES i) Clear a replacement for DES was needed a. theoretical attacks that can break it b. demonstrated exhaustive key search attacks ii) AES is a new cipher alternative iii) Prior to this alternative was to use multiple encryption with DES implementations iv) TripleDES is the chosen form Triple-DES with Two-Keys i) Hence must use 3 encryptions a. would seem to need 3 distinct keys ii) But can use 2 keys with E-D-E sequence a. C = EK1[DK2[EK1[P]]] b. nb encrypt & decrypt equivalent in security c. if K1=K2 then can work with single DES iii) Standardized in ANSI X9.17 & ISO8732 iv) No current known practical attacks Triple-DES with Three-Keys i) Although are no practical attacks on two-key Triple-DES have some indications ii) Can use Triple-DES with Three-Keys to avoid even these a. C = EK3[DK2[EK1[P]]] iii) Has been adopted by some Internet applications, eg PGP, S/MIME
  • 7. d. Explain the key distribution process. Answer: Key Distribution i) Symmetric schemes require both parties to share a common secret key ii) Issue is how to securely distribute this key iii) Often secure system failure due to a break in the key distribution scheme
  • 8. - Nonce is also sent - Nonce includes identities of communicating parties and a unique value 2. KDC sends a response encrypted with A's secret key KA - It includes onetime session key KS - Original request message, including the nonce - Message also includes KS and ID of A encrypted with KB intended for B 3. A stores KS and forwards information for B i.e., EKB[KS|| IDA] 4. B sends a nonce to A encrypted with KS 5. A responds by performing some function on nonce like incrementing The last two steps assure B that the message it received was not a replay
  • 9. Question Set No. 8 a. Explain MD5 algorithm and mention the strength of MD5 Answer: MD5 i) designed by Ronald Rivest (the R in RSA) ii) latest in a series of MD2, MD4 iii) produces a 128-bit hash value iv) until recently was the most widely used hash algorithm v) specified as Internet standard RFC1321 MD5 algorithm 1. pad message so its length is 448 mod 512 2. Append a 64-bit length value to message 3. initialize 4-word (128-bit) MD buffer (A,B,C,D) 4. process message in 16-word (512-bit) blocks: - using 4 rounds of 16 bit operations on message block & buffer - add output to buffer input to form new buffer value 5. Output hash value is the final buffer value
  • 10. Strength of MD5 i) MD5 hash is dependent on all message bits ii) Rivest claims security is good as can be iii) known attacks are: a. Berson 92 attacked any 1 round using differential cryptanalysis (but can't extend) b. Boer & Bosselaers 93 found a pseudo collision (again unable to extend) c. Dobbertin 96 created collisions on MD compression function (but initial constants prevent exploit) iv) Conclusion is that MD5 looks vulnerable soon
  • 11. b. Mention the comparison between MD5, SHA-1 & RIPEMD-160 Answer: Comparison of Popular Hash Functions Hash Func. MD5 SHA1 RMD160 HAS160 Digest size(bits) 128 160 160 160 Block size(bits) 512 512 512 512 No of steps 64(4x16) 80(4x20) 160(5x2x16) 80(4x20) Boolean func. 4 4(3) 5 4(3) Constants 64 4 9 4 Endianness Little Big Little Little Speed ratio 1.0 0.57 0.5 0.94