Data Security
Data Security
Data Security
Mr.Gopal Sakarkar
• Principal of Security.
Computer Network
Security Security
• Authentication
• Integrity
• Non-repudiation
• Authentication
• Integrity
• Non-repudiation
• Authentication
• Integrity
• Non-repudiation
• Authentication
• Integrity
• Non-repudiation
Release of
Traffic Analysis
Message Contents
Hi, I am Bob
Hi, I am Bob
Release of
Traffic Analysis
Message Contents
Meet me at Meet me
Cinemax at
Cinemax
Phhw ph dw
flqhpda
Active
Attack
Denial of
Replay Modification Service Masquerade
Transfer Rs.1000
to Alice.
Denial of
Replay Modification Service Masquerade
Denial of
Replay Modification Service Masquerade
Denial of
Replay Modification Service Masquerade
• http://buchananweb.co.uk/asmn/unit03.swf
• http://www.computing.co.uk/computing/video/2246841/network-security
• http://en.kioskea.net/contents/courrier-electronique/fonctionnement-mta-mua.php3
• http://www.thepcmanwebsite.com/cgi-bin/web_tools/ascii.pl (converter)
• http://bytes.com/topic/c/answers/769137-how-convert-alphabet-numbers
• http://www.kerryr.net/pioneers/binary.htm
31
Caesar Cipher
A B C D E F G H …… z
0 1 2 3 4 5 6 7 25
32
Caesar Cipher
C=E(3,p)=(p+3) mod 26
For generalize equation for encryption :
C=E(k,p)= (p+k) mod 26
For generalize equation for decryption :
P=D(k,C)=(C-K)mod 26
33
Caesar Cipher
plain: abcdefghijklmnopqrstuvwxyz
key: defghijklmnopqrstuvwxyzabc
Video
34
“Rail-Fence” Cipher
It is use substitution method , in which plaintext is written down
As a sequence of diagonals and then read off as a sequence of
row.
35
“Rail-Fence” Cipher
DISGRUNTLED EMPLOYEE
D R L E O
I G U T E M L Y E
S N D P E
DRLEOIGUTE MLYESNDPE
36
Steganography
What is Steganography?
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
Least Significant Bit Insertion: The most common and popular method of
modern day steganography is to make use of the LSB of a picture’s pixel
information. Thus the overall image distortion is kept to a minimum while
the message is spaced out over the pixels in the images. This technique
works best when the image file is larger then the message file and if the
image is grayscale.
Basics of Modern Steganography
45
Encryption Methods
• The essential technology underlying virtually
all automated network and computer security
applications is cryptography
• Two fundamental approaches are in use:
– Conventional Encryption, also known as
symmetric encryption
– Public-key Encryption, also known as
asymmetric encryption
46
Conventional Encryption
Model
47
Conventional Encryption
Five components to the algorithm
– Plaintext: The original message or data
– Encryption algorithm: Performs various substitutions
and transformations on the plaintext
– Secret key: Input to the encryption algorithm.
Substitutions and transformations performed depend
on this key
– Ciphertext: Scrambled message produced as output.
depends on the plaintext and the secret key
– Decryption algorithm: Encryption algorithm run in
reverse. Uses ciphertext and the secret key to produce
the original plaintext
48
Conventional Encryption
M EK C DK M
50
Today’s Agenda
• Cryptography and Encryption
• Encryption Principles
2 31
6 24 1 0 216
X
13 16 10
19
= 325
20 17 15
• Definition of Cryptography .
• Working of encryption principal.
• Substitution and transportation techniques .
• http://www.youtube.com/watch?v=IzVCrSrZIX8
• http://www.youtube.com/watch?v=ZdC7cnpYOwI&feature=related
• Introduced by Claude Shannon to capture the two basic building blocks for any
cryptographic system.
• Confusion - Confusion seeks to make the relationship between the statistics of the
ciphertext and the value of the encryption key as complex as possible, again to
stop attempts to discover the key.
• http://www.encryptionanddecryption.com/encrypt_decrypt_encyclopedia.ht
ml
Initial Permutation
LPT RPT
Final Permutation
DES Algorithm
Mr. Gopal Sakarkar
DES Encryption Overview
• M = 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101
1110 1111
• L = 0000 0001 0010 0011 0100 0101 0110 0111
• R= 1000 1001 1010 1011 1100 1101 1110 1111
The first bit of M is "0". The last bit is "1". We read from left to right.
» 125
• Key Distribution
K1
Round 1 K2
….
K6
Round 2 ….K 7
K 12
……………….
Round 6 …. K 43
K 48
…. K 49
Output Transformation ….
K 52
C1(16 bits) C2(16 bits) C3(16 bits) C4(16 bits)
Unused
K1(1-16 bits) K2(17-32 bits) …K6(81-96 bits) (97-128 bits)
Conti….
Mr. Gopal Sakarkar
• The original key is exhausted . It is circular-left shifted by 25
bits.
Position 1 Position
128
Original Key(128 bits)
x + y = 20
x − y = 10
Step 1
You have two equations. Pick either the first or the second equation and solve for
either x or y.
Since I am the one solving it, I have decided to choose the equation at the bottom
(x − y = 10) and I will solve for x
x − y = 10
x − y + y = 10 + y
x = 10 + y
We get 10 + y + y = 20
10 + 2y = 20
10 − 10 + 2y = 20 − 10
2y = 10
y=5
3x + y = 10
-4x − 2y = 2