SlideShare ist ein Scribd-Unternehmen logo
1 von 22
IT346 Information
System Security

Week 4-1: Stream Cipher
& Asymmetric Key
Cryptography
Faculty of Information Technology

Page

1
Symmetric Key
Cryptography

Cryptography



Symmetric Key
Plaintext

(Block Cipher)
‣
• DES:
• 3DES:
• AES:

1

1 Data Block = 64 bits
1 Data Block = 64 bits
1 Data Block = 128 bits

(Stream Cipher)
‣

Faculty of Information Technology

Page

2
Stream Ciphers
bit


‣

 Key
‣ Keystream

bit

(Stream)

Keystream

Stream
Cipher
pseudorandom keystream
‣ Pseudorandom

Faculty of Information Technology

Page

3
Stream Ciphers
bit



(




Keystream
XOR)
bit
random
keystream
plaintext
plaintext

Keystream
C = P XOR
plaintext StreamKey Key
encrypt
i

Faculty of Information Technology

i

i

Page

4
Stream Ciphers


Secret Key

Seed
Keystream
Key

Stream Cipher
Pseudorandom

K

Key
K

KeyStream Generator
(Pseudorandom byte
generator)

KeyStream Generator
(Pseudorandom byte
generator)

Plaintext
Byte
Stream
P

+
ENCRYPTION

Faculty of Information Technology

Ciphertext
Byte
Stream
C

+

Plaintext
Byte
Stream
P

DECRYPTION

Page

5
One-Time-Pad
(OTP)
 Stream Cipher

One-Time-Pad
Cipher
break

‣ Keystream

Vernam
(unbreakable cipher)

random number
Secret Key
Pseudorandom number generator
‣ Secret Key
OTP
Keystream
plaintext
OTP

Faculty of Information Technology

OTP

Page

6
Stream Cipher
Properties


Encryption

‣

‣ Keystream

random

Stream Cipher

random

‣ Secret Key

Brute-force Attack
bits


Faculty of Information Technology

Page

7
RC4
 RC4

Stream Cipher
Ron Rivest
RSA Security (Security
Company)

Key
(variable key size)
(Byte-oriented
Stream Cipher)
random permutation
 RC4
SSL/TLS
wireless WEP
Faculty of Information Technology

Page

8
Attack on
Cryptography
 Cryptanalysis

plaintext
break

encrypt

‣ Ciphertext-only attack

encrypt

Key

key

ciphertext

key
‣ Known-plaintext attack
plaintext
key
key
‣ Chosen-plaintext attack
Faculty of Information Technology

plaintext

ciphertext
ciphertext
Page

9
Asymmetric Key
Cryptography
(Public Key
Cryptography)

Faculty of Information Technology

Page

10
Asymmetric Key
Cryptography


encrypt
‣

‣
‣

symmetric key cryptography
key
decrypt
key

Key
Key
key

‣

ciphertext
Faculty of Information Technology

Symmetric Key Encryption

Page

11
Asymmetric Key
Cryptography


cryptosystem
cryptography
‣ Public Key

asymmetric key
key
key

‣ Private Key

key

Encryption


‣

public key

encrypt
Faculty of Information Technology

public key
Page

12
Asymmetric Key
Cryptography

Faculty of Information Technology

Page

13
Asymmetric
Encryption

 Public-Key Cryptosystem
‣
encrypt
ciphertext
decrypt
plaintext P = Plaintext
E(P, PKreceiver) = C

‣

public key
private key
encryption
decryption

‣

Plaintext
Faculty of Information Technology

E(C, SKreceiver) = P

C = Cipherte
PK = Public K
SK = Private

public key
private
Public Key key Private Key
Ciphertext
Encryp
Decryp
tion
tion

Plaintext
Page

14
Public Key
Cryptography

 Public Key Cryptography

one-way function

‣ One-Way Function

(Multiplication)
(Factorization)

‣
•

x12 = 144
•

x12

144

= 12x12 = 144x1 = 24x6, …
Faculty of Information Technology

Page

15


Symmetric Key
Cryptography
Asymmetric Key
Cryptography
‣

Security Goals
Confidentiality, Integrity, Authenticity, Av
ailability
Non-Repudiation

‣

Faculty of Information Technology

Page

16
 RSA Algorithm
 Diffie-Hellman Algorithm (

Key Exchange)
 Elliptic Curve Cryptography
 Digital Signature Algorithm

Faculty of Information Technology

Page

17
RSA
 RSA

Adi Shamir)
Len Adleman) MIT

Faculty of Information Technology

Ron Rivest)
RSA

Page

18
RSA



(prime number) p

q
‣





gcd
‣
Faculty of Information Technology

n = pq
m = (p-1)(q-1)
e 1<e<m
e
m
e

e

m

gcd(e, m)
Page

19
RSA Encryption


M
M<n
Public Key (e, n)

‣ Ciphertext C = Me mod n

RSA Decryption

ciphertext C
(d, n)
‣ Message

Private Key

M = Cd mod n


‣ p = 5, q = 7, n = 35, m = 24

Faculty of Information Technology

Page

20
 n = 35, e = 5
Plaintext

M

Me

Ciphertext = Me mod n

L

12

248832

17

O

15

759375

15

V

22

5153632

22

E

5

3125

10

Faculty of Information Technology

Page

21
 n = 35, d = 29
Cd

Ciphertext

M= Cd mod n

Plaintext

17

48196857210675091509141182522307000

12

L

15

12783403948858939111232757568359400

15

O

22

8.5164331908653770195619449972111e+38

22

V

5

E

10

Faculty of Information Technology

Page

22

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (10)

Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Key management
Key managementKey management
Key management
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Quan nguyen symmetric versus asymmetric cryptography
Quan nguyen   symmetric versus asymmetric cryptographyQuan nguyen   symmetric versus asymmetric cryptography
Quan nguyen symmetric versus asymmetric cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 

Ähnlich wie Information system security it346 wk4-1

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

Ähnlich wie Information system security it346 wk4-1 (20)

Why are we still vulnerable to Side Channel Attacks?
Why are we still vulnerable to Side Channel Attacks?Why are we still vulnerable to Side Channel Attacks?
Why are we still vulnerable to Side Channel Attacks?
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
 
Cryptography
CryptographyCryptography
Cryptography
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Engineering Cryptographic Applications: Symmetric Encryption
Engineering Cryptographic Applications: Symmetric EncryptionEngineering Cryptographic Applications: Symmetric Encryption
Engineering Cryptographic Applications: Symmetric Encryption
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
rsa.ppt
rsa.pptrsa.ppt
rsa.ppt
 

Mehr von Bee Lalita (12)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authentication
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Information system security it346 wk4-1