yasser f o mohammad 2010 2 23 reminder 1 active attacks
play

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks - PowerPoint PPT Presentation

Yasser F. O. Mohammad 2010.2.23 REMINDER 1: Active Attacks Masquerade Modification Replay DoS REMINDER 2: Security Services in X.800 Authentication 1. Pear entity authentication Data origin authentication Access Control 2.


  1. Yasser F. O. Mohammad 2010.2.23

  2. REMINDER 1: Active Attacks Masquerade Modification Replay DoS

  3. REMINDER 2: Security Services in X.800 Authentication 1. Pear entity authentication  Data origin authentication  Access Control 2. Data Confidentiality 3. Data Integrity 4. Nonrepudiation 5. Availability 6.

  4. REMINDER 3: Model For Network Security

  5. Basic Terms  Plain Text  Encipher/ciphertext  Cryptography  Cryptanalysis

  6. Operational of Conventional Cryptosystem

  7. Types of Cryptographic Systems  Type of Operation  Substitution  Transposition  Product Systems  Number of Keys  Single (Shared) Key  Two (public) Key  Processing Technique  Block Cipher  Stream Cipher

  8. Types of Cryptanalysis  Intelligence Level  Cryptanalysis (per se)  Brute-Force Attack  Available Information  Ciphertext only  Known plaintext (Full/Partial)  Chosen plaintext (Differential Cryptanalysis)  Chosen ciphertext  Chosen text

  9. Encryption Scheme Security  Unconditional Security  Information is not there in the ciphertext  One-Time Pad  Conditional Security  Cost  Time

  10. Brute-Force Attack

  11. Shared Key Encryption

  12. Public Key Encryption

  13. Classical Cryptosystems Substitution Techniques  Caesar Cipher  Example Plain : meet me after the toga party cipher: PHHW PH DIWHU WKH WRJD SDUWB  Subtitution Table: plain: abcdefghijklmnopqrstuvwxyz cipher: DEFGHIJKLMNOPQRSTUVWXYZABC  Formula C = E(3, p) = (p + 3) mod 26 p = D(k, C) = (C - k) mod 26 How to do cryptanalysis???

Recommend


More recommend