SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Guide to Network Security
First Edition
Chapter Three
Cryptography
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Objectives
• Chronicle the most significant events and
discoveries in the history of cryptology
• Explain the basic principles of cryptography
• Describe the operating principles of the most
popular cryptographic tools
• List and explain the major protocols used for
secure communications
• Discuss the nature and execution of attacks used
against cryptosystems
2
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Introduction
• Critical aspects of cryptography
– Protecting and verifying transmitted information
• Cryptanalysis
– Obtaining the original message from an encrypted
message without knowing the keys
• Encryption
– Process of converting an original message into a
form unreadable by unauthorized individuals
• Focus of this chapter: general overview
3
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Terminology
• Algorithm
• Cipher or cryptosystem
• Ciphertext or cryptogram
• Code
• Decipher
• Encipher
• Key or cryptovariable
• Keyspace
• Link encryption
4
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Terminology (cont’d.)
• Nonrepudiation
• Plaintext or cleartext
• Steganography
• Substitution
• Transposition
• Work factor
5
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
History of Cryptology
• Egyptians and Mesopotamians used cryptography
on clay tablets
• Julius Caesar used a simple substitution cipher to
secure military communications
• Alberti used polyalphabetic substitution in 1466
• Thomas Jefferson created the 26-letter wheel
cipher
• Used in World War I for radio communications
• Table 3-1 in the text gives detailed history
6
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Cipher Methods
• Bit stream method
– Each bit in plaintext transformed, one bit at a time
– Commonly uses exclusive OR operation (XOR)
• Block cipher method
– Message divided into blocks
– Each block transformed into an encrypted block
– Commonly uses substitution, transposition, XOR or
combination of these
7
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Substitution Cipher
• One value substituted for another
• Monoalphabetic substitution
– Uses one alphabet
• Polyalphabetic substitution
– Uses two or more alphabets
• Caesar cipher
– Three position shift to the right
• Vigenère cipher
– See Figure 3-2 for Vigenère square
8
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 9
Figure 3-2 Vigenère Square
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Transposition Cipher
• Simple to understand
– Can product difficult to decipher ciphertext if properly
used
• Rearranges values within a block to create
ciphertext
– Bit level or byte level
• Transposition and substitution ciphers can be
combined
– Highly secure encryption process
10
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Exclusive OR Operation
• Exclusive OR (XOR)
– Function of a binary operation
11
Table 3-2 XOR truth table
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Vernam Cipher
• Also called one-time pad
• Uses set of characters only one time for each
encryption process
• Pad values are added to numeric values that
represent plaintext
– Each character of plaintext turned into a number
– A pad value for that position is added to it
– Sum is converted back to a ciphertext character
– All numbers must be in the range 1-26
• Example on Pages 98-99 of the text
12
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Book or Running Key Cipher
• Text in a book used as key to decrypt a message
• Recipient must know which book is used
– Page and line number
• Dictionaries and thesauruses commonly used
• Grille cipher
– Uses a stencil or template with holes cut out
– Apply template to particular book or document
– Message is revealed in the holes (apertures)
13
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Hash Functions
• Mathematical algorithms
• Generate a message summary or digest
– Used to confirm whether message content has
changed
– Confirms message identity and integrity
– The same message always provides the same hash
value
• Hash cannot be used to determine message
contents
• Secure Hash Standard (SHS) issued by NIST
14
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Hash Functions (cont’d.)
• Attack methods
– Rainbow cracking
• Rainbow table
– Database of precomputed hashes from sequentially
calculated passwords
• Protecting against rainbow cracking
– Protect the file of hashed passwords
– Limit login attempts
– Hash salting
15
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Cryptographic Algorithms
• Two broad categories
– Symmetric
– Asymmetric
• Today’s popular cryptosystems:
– Combine symmetric and asymmetric algorithms
16
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Cryptographic Notation
• Notation varies depending on the source
• Notation used in this text
– M represents original message
– C represents ciphertext
– E represents the encryption process
– D represents the decryption process
– K represents the key
• Example of use: E(M) = C
17
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Symmetric Encryption
• Same secret key used to encipher and decipher
the message
• Also called private key encryption
• Mathematical algorithms used
– Processes executed quickly by computers
• Primary challenge: getting the key to the receiver
– Must be done “out of band”
• Using a different channel other than one carrying the
ciphertext
18
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 19
Figure 3-5 Example of symmetric encryption
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Symmetric Encryption (cont’d.)
• Data Encryption Standard (DES)
– Developed by IBM
– Key length: 56 bits
– Block size: 64 bits
– Adopted as a federal standard in 1976
• Key length is insufficient to provide acceptable
security
– Electronic Frontier Foundation broke a DES key in
56 hours in 1998
20
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Symmetric Encryption (cont’d.)
• Triple DES (3DES)
– Provides level of security far beyond DES
– Uses same encryption
– Repeats encryption three times
– Uses three 64-bit keys
– Common implementations use two or three different
keys
• With advances in computing power:
– Algorithm became too weak to survive
21
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Symmetric Encryption (cont’d.)
• Advanced Encryption Standard (AES)
– Federal Information Processing Standard (FIPS)
– Specifies a cryptographic algorithm used within the
US government
• Not used for National Defense
– Replaces both DES and 3DES
– Uses the Rijndael Block Cipher
• Variable block length
• Key lengths of 128, 192, or 256 bits
– Number of rounds varies between 9 and 13
22
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Asymmetric Encryption
• Uses two different keys
– Either key can be used to encrypt or decrypt
• Commonly used with one public key and one
private key
– Public keys shared in reliable directories
– Private keys kept secret
• RSA
– Popular asymmetric key cryptosystem
– Developed in 1977 by Rivest, Shamir, and Adleman
23
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 24
Figure 3-6 Example of asymmetric encryption
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Hybrid Cryptography Systems
• Problem with asymmetric encryption
– Holding a two-party conversation requires four keys
• Diffie-Hellman key exchange
– Exchanging private keys using public-key encryption
25
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 26
Figure 3-7 Example of a Diffie-Hellman key exchange
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Encryption Key Size
• Strength of the encryption algorithm corresponds to
key size
– Length increases number of random guesses
required to break code
• Details of encrypting algorithms typically published
– Allows research to uncover weaknesses
27
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 28
Table 3-4 Encryption key power
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Multiple Encryption Methods
• Using same operation (XOR, substitution,
transposition) multiple times
– No additional benefit gained
• Using different operations (XOR, substitution,
transposition)
– Dramatically scrambles plaintext
29
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Encrypted Communications
• Software systems used to protect information
confidentiality
– Most are not true cryptosystems
– Applications to which cryptographic protocols have
been added
– Internet protocols fall into this category
30
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing Network Communications
with IPSec and SSH
• IPSec
– Open-source protocol
– Secures communications across IP-based networks
– Often used to create a secure virtual private network
– Uses several different cryptosystems
• Components of IPSec
– IP Security protocol
• Specifies information to be added to an IP packet
• Specifies how to encrypt packet data
31
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing Network Communications
with IPSec and SSH (cont’d.)
• Components of IPSec (cont’d.)
– Internet Key Exchange (IKE)
• Uses an asymmetric-based key exchange
• Secure Shell (SSH)
– Protocol for secure access over an insecure medium
– Latest version: SSH-2
– Commonly used to access UNIX and Linux system
shells
32
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 33
Figure 3-9 IPSec headers
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing Web Communications with
SSL and S-HTTP
• Secure Sockets Layer (SSH)
– Protocol used for public-key encryption
– Provides a secure channel over the Internet
– Used in most popular browsers
• Secure HTTP (S-HTTP)
– Extended version of HTTP
– Encrypts individual messages transmitted over the
Internet
– Session for each individual data exchange must be
established
34
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing E-mail with S/MIME and
PGP
• SMTP
– First commonly used Internet e-mail standard
• S/MIME
– Developed to replace SMTP
– Handles character sets other than 7-bit ASCII
• Pretty Good Privacy (PGP)
– Hybrid cryptosystem
– De facto standard for encryption, authentication for
e-mail and file storage applications
35
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 36
Table 3-5 MIME message header fields
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing E-mail with S/MIME and
PGP (cont’d.)
• Pretty Good Privacy (cont’d.)
– Provides six services
• Authentication using digital signatures
• Message encryption
• Compression
• E-mail compatibility
• Segmentation
• Key management
37
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing Wireless Networks with WEP
and WPA
• Wireless LANs
– Inherently insecure
– Must use some form of cryptographic security control
• Two protocols in wide use
– Wired Equivalent Privacy (WEP)
– Wi-Fi Protected Access (WPA)
38
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Securing Wireless Networks with WEP
and WPA (cont’d.)
• Wired Equivalent Privacy (WEP)
– Early attempt to provide security with 802.11
network protocol
– Considered weak today
• Wi-Fi Protected Access (WPA and WPA2)
– Created to resolve issues with WEP
– 128-bit key size
– Uses dynamically changing keys
• Created and shared by authentication server
39
© 2013 Course Technology/Cengage Learning. All Rights Reserved. 40
Table 3-8 Comparison of WEP and WPA
Source: Wi-Fi Alliance
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Next-Generation Wireless Protocols
• Robust Secure Networks (RSN)
– Planned replacement for Temporal Key Integrity
Profile (TKIP) in WPA
– Supports key lengths up to 256 bits
– Not compatible with older hardware
41
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Cryptographic Tools
• Cryptographic capabilities
– Must be embodied in tools
– Apply cryptology to everyday computing
• Public Key Infrastructure
– Integrated system of software, services, and
encryption
• Digital certificates
– Public-key container files
– Allow computer programs to validate keys
• Identify key owners
42
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Public Key Infrastructure (PKI)
• Typical PKI solution components
– Certificate authority (CA)
– Registration authority (RA)
– Certificate directories
– Management protocols
– Policies and procedures
• Certificate authority
– Provides housekeeping activities associated with
keys and certificates
– Distributes certificate revocation list (CRL)
43
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Digital Signatures
• Encrypted messages that can be mathematically
proven authentic
• Management of digital signatures
– Built into most Web browsers
– Based on Digital Signature Standard
44
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Digital Certificates
• Electronic document or container file that holds:
– Key value
– Identifying information about key owner
• Authenticate cryptographic key embedded in a
certificate
• Often issued and certified by a third party (CA)
• Verification process occurs when downloading
software via the Internet
45
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Steganography
• The art of secret writing
• Technically, not a form of cryptography
• Another way of protecting information
confidentiality in transit
• Most popular modern version
– Hiding information within image files
46
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Attacks on Cryptosystems
• Brute force attacks
– Hacker searches for clues in ciphertext
• Frequency analysis
• Known-plaintext attack
• Selected-plaintext attack
47
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Man-in-the-Middle Attack
• Attempts to intercept a public key
• Attempts to insert known key structure in place of
public key
• Prevention strategy
– Establish public key with digital signature
– Attacker cannot duplicate signature
48
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Correlation Attacks
• Collection of brute force methods
• Attempt to deduce statistical relationships between
unknown key and ciphertext
• Advanced codebreaking methods
– Differential and linear cryptanalysis
49
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Dictionary Attacks
• Attacker encrypts every word in a dictionary
– Applies same cryptosystem used by target
– Looks for match between target ciphertext and list of
encrypted words
• Successful with small files
– Files containing usernames and passwords
50
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Timing Attacks
• Attacker eavesdrops on victim’s session
• Uses statistical analysis of patterns to discern
information
• Can be used to gain information about encryption
key
– Can eliminate some algorithms and narrow search
51
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Defending Against Attacks
• Encryption
– Useful tool to protect information confidentiality
– Process of hiding the true meaning of information
– Inherent flaw
• If you discover the key, you can read the message
– Key management is important
52
© 2013 Course Technology/Cengage Learning. All Rights Reserved.
Summary
• Encryption is the process of converting a message
to a form unreadable by unauthorized individuals
• Strength of encryption systems is generally
determined by the key length
• Hash functions generate a message summary that
can confirm message has not been altered
• Digital signatures are encrypted messages verified
by a third party
• Attacks on information often use brute force
methods
53

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptkusum sharma
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationBitcoin Association of Australia
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key AlgorithmSHUBHA CHATURVEDI
 
Network security
Network securityNetwork security
Network securityABHISHEK KUMAR
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Cryptography
CryptographyCryptography
CryptographySuraj Shukla
 

Was ist angesagt? (20)

Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Network Security
Network SecurityNetwork Security
Network Security
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Network security
Network securityNetwork security
Network security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Andere mochten auch

Semantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web TechnologySemantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web TechnologyRinke Hoekstra
 
Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008Philip Sheldrake
 
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...Richard Wallis
 
Ch04 records management
Ch04 records managementCh04 records management
Ch04 records managementxtin101
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
PowerPoint 2013 ch07
PowerPoint 2013 ch07PowerPoint 2013 ch07
PowerPoint 2013 ch07Kristin Harrison
 
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communitiesNonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communitieskfritschie
 
PowerPoint 2013 ch04
PowerPoint 2013 ch04PowerPoint 2013 ch04
PowerPoint 2013 ch04Kristin Harrison
 
The Essential Elements of CJR
The Essential Elements of CJRThe Essential Elements of CJR
The Essential Elements of CJRBESLER
 
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.Farhan Ali
 
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredHealthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredBESLER
 
Simkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobileSimkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobileHaqem BESTMobile
 
Ahtosalo_sivulaudatur
Ahtosalo_sivulaudaturAhtosalo_sivulaudatur
Ahtosalo_sivulaudaturMilja Ahtosalo
 
The Essential Elements of CJR
The Essential Elements of CJRThe Essential Elements of CJR
The Essential Elements of CJRBESLER
 
Simkad BestMobile Malaysia
Simkad BestMobile MalaysiaSimkad BestMobile Malaysia
Simkad BestMobile MalaysiaHaqem BESTMobile
 
Uncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-onsUncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-onsBESLER
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentBESLER
 
Rauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumadoRauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumadoRauliPatagonia
 

Andere mochten auch (20)

Semantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web TechnologySemantic Modelling using Semantic Web Technology
Semantic Modelling using Semantic Web Technology
 
Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008Social Web Presentation To Agenda Setting 2008
Social Web Presentation To Agenda Setting 2008
 
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
Web 3.0 / Semantic Web: What it means for academic users, libraries and publi...
 
Ch04 records management
Ch04 records managementCh04 records management
Ch04 records management
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
PowerPoint 2013 ch07
PowerPoint 2013 ch07PowerPoint 2013 ch07
PowerPoint 2013 ch07
 
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communitiesNonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communities
 
PowerPoint 2013 ch04
PowerPoint 2013 ch04PowerPoint 2013 ch04
PowerPoint 2013 ch04
 
The Essential Elements of CJR
The Essential Elements of CJRThe Essential Elements of CJR
The Essential Elements of CJR
 
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
Kaitan penggunaan laras bahasa dan medium pemasaran yang digunakan.
 
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredHealthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
 
Simkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobileSimkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobile
 
Ahtosalo_sivulaudatur
Ahtosalo_sivulaudaturAhtosalo_sivulaudatur
Ahtosalo_sivulaudatur
 
The Essential Elements of CJR
The Essential Elements of CJRThe Essential Elements of CJR
The Essential Elements of CJR
 
Simkad BestMobile Malaysia
Simkad BestMobile MalaysiaSimkad BestMobile Malaysia
Simkad BestMobile Malaysia
 
Uncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-onsUncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-ons
 
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for PaymentWe Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
We Turn and Face the Changes - The S-10 Emerges as a Proxy for Payment
 
Vatly2013dantri
Vatly2013dantriVatly2013dantri
Vatly2013dantri
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Rauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumadoRauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumado
 

Ă„hnlich wie 9780840024220 ppt ch03

Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdfzerihunnana
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisVaibhav Khanna
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion pptRaj Sampat
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxmustafaenayat
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptxAnmolBansal66
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptxAjaykumar967485
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxpooleavelina
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyKarthikeyan Dhayalan
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 

Ă„hnlich wie 9780840024220 ppt ch03 (20)

groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docxhttpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
httpswww.youtube.comwatchtime_continue=8&v=rFV0aes0vYAN.docx
 
Security
SecuritySecurity
Security
 
Network Security Topic 3 cryptography
Network Security Topic 3 cryptographyNetwork Security Topic 3 cryptography
Network Security Topic 3 cryptography
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 

Mehr von Kristin Harrison

Mehr von Kristin Harrison (20)

9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
9780840024220 ppt ch05
9780840024220 ppt ch059780840024220 ppt ch05
9780840024220 ppt ch05
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
 
9780840024220 ppt ch02
9780840024220 ppt ch029780840024220 ppt ch02
9780840024220 ppt ch02
 
9780840024220 ppt ch07
9780840024220 ppt ch079780840024220 ppt ch07
9780840024220 ppt ch07
 
9780840024220 ppt ch06
9780840024220 ppt ch069780840024220 ppt ch06
9780840024220 ppt ch06
 
9780840024220 ppt ch01
9780840024220 ppt ch019780840024220 ppt ch01
9780840024220 ppt ch01
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 

KĂĽrzlich hochgeladen

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

KĂĽrzlich hochgeladen (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

9780840024220 ppt ch03

  • 1. Guide to Network Security First Edition Chapter Three Cryptography
  • 2. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Objectives • Chronicle the most significant events and discoveries in the history of cryptology • Explain the basic principles of cryptography • Describe the operating principles of the most popular cryptographic tools • List and explain the major protocols used for secure communications • Discuss the nature and execution of attacks used against cryptosystems 2
  • 3. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Introduction • Critical aspects of cryptography – Protecting and verifying transmitted information • Cryptanalysis – Obtaining the original message from an encrypted message without knowing the keys • Encryption – Process of converting an original message into a form unreadable by unauthorized individuals • Focus of this chapter: general overview 3
  • 4. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Terminology • Algorithm • Cipher or cryptosystem • Ciphertext or cryptogram • Code • Decipher • Encipher • Key or cryptovariable • Keyspace • Link encryption 4
  • 5. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Terminology (cont’d.) • Nonrepudiation • Plaintext or cleartext • Steganography • Substitution • Transposition • Work factor 5
  • 6. © 2013 Course Technology/Cengage Learning. All Rights Reserved. History of Cryptology • Egyptians and Mesopotamians used cryptography on clay tablets • Julius Caesar used a simple substitution cipher to secure military communications • Alberti used polyalphabetic substitution in 1466 • Thomas Jefferson created the 26-letter wheel cipher • Used in World War I for radio communications • Table 3-1 in the text gives detailed history 6
  • 7. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Cipher Methods • Bit stream method – Each bit in plaintext transformed, one bit at a time – Commonly uses exclusive OR operation (XOR) • Block cipher method – Message divided into blocks – Each block transformed into an encrypted block – Commonly uses substitution, transposition, XOR or combination of these 7
  • 8. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Substitution Cipher • One value substituted for another • Monoalphabetic substitution – Uses one alphabet • Polyalphabetic substitution – Uses two or more alphabets • Caesar cipher – Three position shift to the right • Vigenère cipher – See Figure 3-2 for Vigenère square 8
  • 9. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 9 Figure 3-2 Vigenère Square © Cengage Learning 2013
  • 10. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Transposition Cipher • Simple to understand – Can product difficult to decipher ciphertext if properly used • Rearranges values within a block to create ciphertext – Bit level or byte level • Transposition and substitution ciphers can be combined – Highly secure encryption process 10
  • 11. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Exclusive OR Operation • Exclusive OR (XOR) – Function of a binary operation 11 Table 3-2 XOR truth table © Cengage Learning 2013
  • 12. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Vernam Cipher • Also called one-time pad • Uses set of characters only one time for each encryption process • Pad values are added to numeric values that represent plaintext – Each character of plaintext turned into a number – A pad value for that position is added to it – Sum is converted back to a ciphertext character – All numbers must be in the range 1-26 • Example on Pages 98-99 of the text 12
  • 13. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Book or Running Key Cipher • Text in a book used as key to decrypt a message • Recipient must know which book is used – Page and line number • Dictionaries and thesauruses commonly used • Grille cipher – Uses a stencil or template with holes cut out – Apply template to particular book or document – Message is revealed in the holes (apertures) 13
  • 14. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Hash Functions • Mathematical algorithms • Generate a message summary or digest – Used to confirm whether message content has changed – Confirms message identity and integrity – The same message always provides the same hash value • Hash cannot be used to determine message contents • Secure Hash Standard (SHS) issued by NIST 14
  • 15. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Hash Functions (cont’d.) • Attack methods – Rainbow cracking • Rainbow table – Database of precomputed hashes from sequentially calculated passwords • Protecting against rainbow cracking – Protect the file of hashed passwords – Limit login attempts – Hash salting 15
  • 16. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Cryptographic Algorithms • Two broad categories – Symmetric – Asymmetric • Today’s popular cryptosystems: – Combine symmetric and asymmetric algorithms 16
  • 17. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Cryptographic Notation • Notation varies depending on the source • Notation used in this text – M represents original message – C represents ciphertext – E represents the encryption process – D represents the decryption process – K represents the key • Example of use: E(M) = C 17
  • 18. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption • Same secret key used to encipher and decipher the message • Also called private key encryption • Mathematical algorithms used – Processes executed quickly by computers • Primary challenge: getting the key to the receiver – Must be done “out of band” • Using a different channel other than one carrying the ciphertext 18
  • 19. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 19 Figure 3-5 Example of symmetric encryption © Cengage Learning 2013
  • 20. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Data Encryption Standard (DES) – Developed by IBM – Key length: 56 bits – Block size: 64 bits – Adopted as a federal standard in 1976 • Key length is insufficient to provide acceptable security – Electronic Frontier Foundation broke a DES key in 56 hours in 1998 20
  • 21. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Triple DES (3DES) – Provides level of security far beyond DES – Uses same encryption – Repeats encryption three times – Uses three 64-bit keys – Common implementations use two or three different keys • With advances in computing power: – Algorithm became too weak to survive 21
  • 22. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Symmetric Encryption (cont’d.) • Advanced Encryption Standard (AES) – Federal Information Processing Standard (FIPS) – Specifies a cryptographic algorithm used within the US government • Not used for National Defense – Replaces both DES and 3DES – Uses the Rijndael Block Cipher • Variable block length • Key lengths of 128, 192, or 256 bits – Number of rounds varies between 9 and 13 22
  • 23. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Asymmetric Encryption • Uses two different keys – Either key can be used to encrypt or decrypt • Commonly used with one public key and one private key – Public keys shared in reliable directories – Private keys kept secret • RSA – Popular asymmetric key cryptosystem – Developed in 1977 by Rivest, Shamir, and Adleman 23
  • 24. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 24 Figure 3-6 Example of asymmetric encryption © Cengage Learning 2013
  • 25. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Hybrid Cryptography Systems • Problem with asymmetric encryption – Holding a two-party conversation requires four keys • Diffie-Hellman key exchange – Exchanging private keys using public-key encryption 25
  • 26. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 26 Figure 3-7 Example of a Diffie-Hellman key exchange © Cengage Learning 2013
  • 27. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Encryption Key Size • Strength of the encryption algorithm corresponds to key size – Length increases number of random guesses required to break code • Details of encrypting algorithms typically published – Allows research to uncover weaknesses 27
  • 28. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 28 Table 3-4 Encryption key power © Cengage Learning 2013
  • 29. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Multiple Encryption Methods • Using same operation (XOR, substitution, transposition) multiple times – No additional benefit gained • Using different operations (XOR, substitution, transposition) – Dramatically scrambles plaintext 29
  • 30. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Encrypted Communications • Software systems used to protect information confidentiality – Most are not true cryptosystems – Applications to which cryptographic protocols have been added – Internet protocols fall into this category 30
  • 31. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing Network Communications with IPSec and SSH • IPSec – Open-source protocol – Secures communications across IP-based networks – Often used to create a secure virtual private network – Uses several different cryptosystems • Components of IPSec – IP Security protocol • Specifies information to be added to an IP packet • Specifies how to encrypt packet data 31
  • 32. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing Network Communications with IPSec and SSH (cont’d.) • Components of IPSec (cont’d.) – Internet Key Exchange (IKE) • Uses an asymmetric-based key exchange • Secure Shell (SSH) – Protocol for secure access over an insecure medium – Latest version: SSH-2 – Commonly used to access UNIX and Linux system shells 32
  • 33. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 33 Figure 3-9 IPSec headers © Cengage Learning 2013
  • 34. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing Web Communications with SSL and S-HTTP • Secure Sockets Layer (SSH) – Protocol used for public-key encryption – Provides a secure channel over the Internet – Used in most popular browsers • Secure HTTP (S-HTTP) – Extended version of HTTP – Encrypts individual messages transmitted over the Internet – Session for each individual data exchange must be established 34
  • 35. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing E-mail with S/MIME and PGP • SMTP – First commonly used Internet e-mail standard • S/MIME – Developed to replace SMTP – Handles character sets other than 7-bit ASCII • Pretty Good Privacy (PGP) – Hybrid cryptosystem – De facto standard for encryption, authentication for e-mail and file storage applications 35
  • 36. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 36 Table 3-5 MIME message header fields © Cengage Learning 2013
  • 37. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing E-mail with S/MIME and PGP (cont’d.) • Pretty Good Privacy (cont’d.) – Provides six services • Authentication using digital signatures • Message encryption • Compression • E-mail compatibility • Segmentation • Key management 37
  • 38. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing Wireless Networks with WEP and WPA • Wireless LANs – Inherently insecure – Must use some form of cryptographic security control • Two protocols in wide use – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) 38
  • 39. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Securing Wireless Networks with WEP and WPA (cont’d.) • Wired Equivalent Privacy (WEP) – Early attempt to provide security with 802.11 network protocol – Considered weak today • Wi-Fi Protected Access (WPA and WPA2) – Created to resolve issues with WEP – 128-bit key size – Uses dynamically changing keys • Created and shared by authentication server 39
  • 40. © 2013 Course Technology/Cengage Learning. All Rights Reserved. 40 Table 3-8 Comparison of WEP and WPA Source: Wi-Fi Alliance © Cengage Learning 2013
  • 41. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Next-Generation Wireless Protocols • Robust Secure Networks (RSN) – Planned replacement for Temporal Key Integrity Profile (TKIP) in WPA – Supports key lengths up to 256 bits – Not compatible with older hardware 41
  • 42. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Cryptographic Tools • Cryptographic capabilities – Must be embodied in tools – Apply cryptology to everyday computing • Public Key Infrastructure – Integrated system of software, services, and encryption • Digital certificates – Public-key container files – Allow computer programs to validate keys • Identify key owners 42
  • 43. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Public Key Infrastructure (PKI) • Typical PKI solution components – Certificate authority (CA) – Registration authority (RA) – Certificate directories – Management protocols – Policies and procedures • Certificate authority – Provides housekeeping activities associated with keys and certificates – Distributes certificate revocation list (CRL) 43
  • 44. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Digital Signatures • Encrypted messages that can be mathematically proven authentic • Management of digital signatures – Built into most Web browsers – Based on Digital Signature Standard 44
  • 45. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Digital Certificates • Electronic document or container file that holds: – Key value – Identifying information about key owner • Authenticate cryptographic key embedded in a certificate • Often issued and certified by a third party (CA) • Verification process occurs when downloading software via the Internet 45
  • 46. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Steganography • The art of secret writing • Technically, not a form of cryptography • Another way of protecting information confidentiality in transit • Most popular modern version – Hiding information within image files 46
  • 47. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Attacks on Cryptosystems • Brute force attacks – Hacker searches for clues in ciphertext • Frequency analysis • Known-plaintext attack • Selected-plaintext attack 47
  • 48. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Man-in-the-Middle Attack • Attempts to intercept a public key • Attempts to insert known key structure in place of public key • Prevention strategy – Establish public key with digital signature – Attacker cannot duplicate signature 48
  • 49. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Correlation Attacks • Collection of brute force methods • Attempt to deduce statistical relationships between unknown key and ciphertext • Advanced codebreaking methods – Differential and linear cryptanalysis 49
  • 50. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Dictionary Attacks • Attacker encrypts every word in a dictionary – Applies same cryptosystem used by target – Looks for match between target ciphertext and list of encrypted words • Successful with small files – Files containing usernames and passwords 50
  • 51. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Timing Attacks • Attacker eavesdrops on victim’s session • Uses statistical analysis of patterns to discern information • Can be used to gain information about encryption key – Can eliminate some algorithms and narrow search 51
  • 52. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Defending Against Attacks • Encryption – Useful tool to protect information confidentiality – Process of hiding the true meaning of information – Inherent flaw • If you discover the key, you can read the message – Key management is important 52
  • 53. © 2013 Course Technology/Cengage Learning. All Rights Reserved. Summary • Encryption is the process of converting a message to a form unreadable by unauthorized individuals • Strength of encryption systems is generally determined by the key length • Hash functions generate a message summary that can confirm message has not been altered • Digital signatures are encrypted messages verified by a third party • Attacks on information often use brute force methods 53