Network Security Prof N N GAIKWAD M P

  • Slides: 24
Download presentation
Network Security Prof. N. N. GAIKWAD M. P. A. S. C COLLEGE PANVEL DIST-RAIGAD

Network Security Prof. N. N. GAIKWAD M. P. A. S. C COLLEGE PANVEL DIST-RAIGAD

ONE TIME PAD/ VERNAM CIPHER Is perfect secrecy possible? If each PT symbol encrypted

ONE TIME PAD/ VERNAM CIPHER Is perfect secrecy possible? If each PT symbol encrypted with a randomly chosen key (Shannon) This idea used by Vernam to create One time pad Key has same length as the PT and key chosen randomly Known as Perfect Cipher Attacks impossible for sufficiently long PT msgs

ONE TIME PAD/ VERNAM CIPHER Generally not usable in practice Key is random &

ONE TIME PAD/ VERNAM CIPHER Generally not usable in practice Key is random & as long as the PT msg Can be used to store some secret data in a public computer Scenario: President of a country needs to send a secret msg to president of another country Send a trusted envoy with the random key b 4 sending the msg

ROTOR CIPHER Basic idea: mono aphabetic substitution, but each time the (PT char to

ROTOR CIPHER Basic idea: mono aphabetic substitution, but each time the (PT char to CT char) mapping is changed

ROTOR CIPHER Initial position = Secret Key The first PT char is encrypted with

ROTOR CIPHER Initial position = Secret Key The first PT char is encrypted with the initial setting, the second with the setting after first rotation, and so on. . If the rotor is stationary then ? ? Encrypt ”bee” with the given key

TRANSPOSITION CIPHERS Change location of the symbols in PT to get CT An ”a”

TRANSPOSITION CIPHERS Change location of the symbols in PT to get CT An ”a” at the first position of the PT may appear at the tenth position in CT Does permutation of characters

Keyless transposition ciphers RAIL FENCE CIPHER Consider the PT msg ”Meet me at the

Keyless transposition ciphers RAIL FENCE CIPHER Consider the PT msg ”Meet me at the park” CT msg = ”MEMATEAKETETHPR” Cryptanalysis very easy => 2 rows only & no key

Keyless transposition ciphers Another method PT = row by row CT = col by

Keyless transposition ciphers Another method PT = row by row CT = col by col Cryptanalysis Easy if attacker knows number of cols.

Keyed transposition ciphers Idea : divide PT chars into groups of predetermined size called

Keyed transposition ciphers Idea : divide PT chars into groups of predetermined size called 'blocks' and use a permutation key Eg: - Consider ”enemy attacks tonight” Group chars into blocks of size 5 (an agreed-upon value by both Alice and Bob) Use a bogus char (say z) to ”fill” the last block Result: enemy attac kston ightz

Keyed transposition ciphers Permutation key Encryption 3 1 4 1 2 3 5 4

Keyed transposition ciphers Permutation key Encryption 3 1 4 1 2 3 5 4 2 5 Cipher text EEMYN TAACT TKONS HITZG Decryption

Combining keyed & keyless Better scrambling Encryption & Decryption done in 3 steps PT

Combining keyed & keyless Better scrambling Encryption & Decryption done in 3 steps PT msg written into a table row by row Permutation done by reordering cols (based on key) The new table read col by col ( ==> CT msg )

Combining keyed & keyless

Combining keyed & keyless

Combining keyed & keyless Keys Table is not necessary Eg: enc key : 3

Combining keyed & keyless Keys Table is not necessary Eg: enc key : 3 1 4 5 2 & dec key: 2 5 1 3 4 Finding Enc/Dec key from the other Write index below Swap values with indices Sort values in ascending order of index Try for: 2 6 3 1 4 7 5

Combining keyed & keyless Key as a matrix

Combining keyed & keyless Key as a matrix

Combining keyed & keyless Cryptanalysis Trans. Ciphers don't change the frequency of chars But

Combining keyed & keyless Cryptanalysis Trans. Ciphers don't change the frequency of chars But frequency of digrams & trigrams hidden Brute force attack extremely difficult

Double transposition cipher

Double transposition cipher

STREAM & BLOCK CIPHERS Literature divides symmetric ciphers into two broad categories – stream

STREAM & BLOCK CIPHERS Literature divides symmetric ciphers into two broad categories – stream ciphers and block ciphers Stream cipher – encryption and decryption done symbol at a time Block ciphers – enc and dec done on a bolck of symbos at a time

Stream Cipher There is a plain text stream There is a cipher text stream

Stream Cipher There is a plain text stream There is a cipher text stream P = P 1 P 2 P 3. . . C = C 1 C 2 C 3. . . There is a key stream K = (k 1, k 2, k 3, . . . )

Stream Cipher

Stream Cipher

Stream cipher Examples Additive cipher Monoalphabetic substitution cipher K = (k, k, k, .

Stream cipher Examples Additive cipher Monoalphabetic substitution cipher K = (k, k, k, . . . ) K = mapping of the current PT char to CT char, . . . Vigenere cipher K = (k 1, k 2, . . . , km, k 1, k 2, . . . )

Block cipher

Block cipher

Block cipher Examples Play fair cipher (block size = 2) Hill cipher

Block cipher Examples Play fair cipher (block size = 2) Hill cipher

Stream & Block Combined Idea: Blocks of PT encrypted individually Use a stream of

Stream & Block Combined Idea: Blocks of PT encrypted individually Use a stream of keys to encrypt blocks (separate key for each block) Cipher is a block cipher when looking at the individual blocks Cipher is a stream cipher when looking at the whole msg considering each block as a single unit

Thank You

Thank You