Upload
prema-selvam
View
218
Download
0
Embed Size (px)
Citation preview
7/25/2019 VII SEM updates.doc
1/171
ALPHA COLLEGE OF ENGINEERING
DEPARTMENT
OF
INFORMATION TECHNOLOGY
MINIMUM LEARNING MATERIAL
FOR THE THIRD YEAR B.Tech(IT) DEGREE COURSE
(R-2013)
SEMESTER-II
1
7/25/2019 VII SEM updates.doc
2/171
TABLE OF CONTENTS
LIST OF SUB!ECTSPAGE
NO
CURRICULAM """
IT6701 Information Management
CS6701 Cryptography and Network Security
IT6702 Data are !ou"ing and Data Mining
CS670# $rid and C%oud Computing
IT600& Software Te"ting
IT6711 Data Mining 'a(oratory
IT6712 Security 'a(oratory
IT671#$rid and C%oud Computing 'a(oratory
2
7/25/2019 VII SEM updates.doc
3/171
ANNA UNIERSITY CHENNAI
AFFILIATED INSTITUTIONS
2013 REGULATION B.TECH. INFORMATION TECHNOLOGY
II SEMESTERS CURRICULUM AND SYLLABI
C#$e N#. C#%&'e T"e L T P C
THEORY
IT6701 Information Management# 0 0 #
CS6701 Cryptography and Network Security# 0 0 #
IT6702 Data are !ou"ing and Data Mining # 0 0 #
CS670# $rid and C%oud Computing# 0 0 #
IT600& Software Te"ting # 0 0 #
PRACTICAL
IT6711 Data Mining 'a(oratory 0 0 # 2
IT6712 Security 'a(oratory 0 0 # 2
IT671#$rid and C%oud Computing 'a(oratory
0 0 # 2
TOTAL 1* 0 + 21
3
7/25/2019 VII SEM updates.doc
4/171
CS,01 CRYPTOGRAPHY AND NETOR/ SECURITY L T P C
3 0 0 3
UNIT I INTRODUCTION NUMBER THEORY 10
Ser)ice"* Mechani"m" and attack"+the ,SI "ecurity architecture+Network "ecurity mode%+
C%a""ica% -ncryption techni.ue" /Symmetric cipher mode%* "u("titution techni.ue"*
tran"po"ition techni.ue"* "teganographyINIT- I-'DS 3ND N4M5- T!-,8$roup"* ing"* ie%d"+Modu%ar arithmetic+ -uc%id9" a%gorithm+inite fie%d"+ :o%ynomia%
3rithmetic ;:rime num(er"+ermat9" and -u%er9" theorem+ Te"ting for prima%ity +The
Chine"e remainder theorem+ Di"crete %ogarithm"
UNIT II BLOC/ CIPHERS PUBLIC /EY CRYPTOGRAPHY 10
Data -ncryption Standard+5%ock cipher princip%e"+(%ock cipher mode" of operation+
3d)anced -ncryption Standard /3-S+Trip%e D-S+5%owfi"h+C< a%gorithm :u(%ic key
cryptography8 :rincip%e" of pu(%ic key crypto"y"tem"+The S3 a%gorithm+=ey
management ; Diffie !e%%man =ey e>change+-%%iptic cur)e arithmetic+-%%iptic cur)e
cryptography
UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES ?
3uthentication re.uirement ; 3uthentication function ; M3C ; !a"h function ; Security
of ha"h function and M3C ;MD< ; S!3 ; !M3C ; CM3C ; Digita% "ignature and
authentication protoco%" ; DSS ; -I $ama% ; Schnorr
UNIT I SECURITY PRACTICE SYSTEM SECURITY ?
3uthentication app%ication" ; =er(ero" ; @
7/25/2019 VII SEM updates.doc
5/171
REFERENCES
1 5ehrouF 3 erouFan* Cryptography G Network SecurityE* Tata Mc $raw !i%%* 2007
2 Man oung hee* Internet Security8 Cryptographic :rincip%e"E* 3%gorithm" and
:rotoco%"E* i%ey :u(%ication"* 200#
# Char%e" :f%eeger* Security in ComputingE* &th -dition* :rentice !a%% of India* 2006
& 4%y"e"" 5%ack* Internet Security :rotoco%"E* :ear"on -ducation 3"ia* 2000
7/25/2019 VII SEM updates.doc
6/171
ALPHA COLLEGE OF ENGINEERING
Th"&%567h"'6" Che886" 9 ,0012
LESSON PLAN
6
7/25/2019 VII SEM updates.doc
7/171
acu%ty Name 8 :ra"ath De"ignation 83:
Su(Hect Name 8Cryptography GNetwork Securit
Code 8CS6701
ear 8IBSeme"ter 807
Degree G 5ranch 85TechIT
AIM
To under"tand ,SI "ecurity architecture and c%a""ica% encryption techni.ue" 3c.uire fundamenta%know%edge on the concept" of finite fie%d" and num(er theory* under"tand )ariou" (%ock cipher and "treamcipher mode%"* De"cri(e the princip%e" of pu(%ic key crypto"y"tem"* ha"h function" and digita% "ignature
S. N#. T#:"c'N#. #; Pe&"#$'
Rechange 1 T1
1A -%%iptic cur)e cryptography 1 T1
7
7/25/2019 VII SEM updates.doc
8/171
S. N#. T#:"c'N#. #; Pe&"#$'
Reporta(i%ity+-ncoding+Secure -%ectronicTran"action /S-T
2 T2
UNIT I
PART A (TO MAR/S)
1. S:ec";@ he ;#%& c6e#&"e' #; 'ec%&"@ h&e6'Interruption Interception Modification a(rication
8
7/25/2019 VII SEM updates.doc
9/171
2. E=:6"8 6c"e 68$ :6''"e 66c? "h e=65:e (!%8e 1*)P6''"e 66c?8 Monitoring the me""age during tran"mi""ion -g8 InterceptionAc"e 66c?8 It in)o%)e" the modification of data "tream or creation of fa%"e data
"tream -g8 a(rication* Modification* and Interruption
3. De;"8e "8e&"@ 68$ 8#8-&e:%$"6"#8.
I8e&"@8 Ser)ice that en"ure" that on%y authoriFed per"on a(%e to modify the me""age
N#8 &e:%$"6"#88 Thi" "er)ice he%p" to pro)e that the per"on who denie" the tran"action
i" true or fa%"e
. D";;e&e8"6e '@55e&"c 68$ 6'@55e&"c e8c&@:"#8
Symmetric encryption 3"ymmetric encryption
It i" a form of crypto"y"tem in whichencryption and decryption performed
u"ing the "ame key -g8 D-S* 3-S
It i" a form of crypto"y"tem in
which encryption and decryption:erformed u"ing two key"
-g8S3*-CC
*. De;"8e c&@:686@'"'It i" a proce"" of attempting to di"co)er the key or p%ainte>t or (oth
,. C#5:6&e '&e65 c":he& "h #c? c":he& "h e=65:e. (M6@ 1*)
Stream cipher 5%ock cipher
:roce""e" the input "tream continuou"%yand producing one e%ement at a time
->amp%e8 cae"er cipher
:roce""e" the input one (%ock ofe%ement" at a time producing an output
(%ock for each input (%ock ->amp%e8
D-S
. De;"8e 'ec%&"@ 5ech68"'5.
It i" proce"" that i" de"igned to detect pre)ent* reco)er from a "ecurity attack ->amp%e8
-ncryption a%gorithm* Digita% "ignature* 3uthentication protoco%"
. D";;e&e8"6e %8c#8$""#86@ 'ec%&e$ 68$ c#5:%6"#86@ 'ec%&e$.
3n -ncryption a%gorithm i" %8c#8$""#86@ 'ec%&e$mean"J the condition i" if the cipher
te>t generated (y the encryption "cheme doe"n9t contain enough information to determine
corre"ponding p%ainte>t -ncryption i" c#5:%6"#86@ 'ec%&e$mean"*
The co"t of (reaking the cipher e>ceed" the )a%ue of enough information
Time re.uired to (reak the cipher e>ceed the u"efu% %ifetime of information
9
7/25/2019 VII SEM updates.doc
10/171
+. De;"8e 'e68#&6:h@.
!iding the me""age into "ome co)er media It concea%" the e>i"tence of a me""age
10. h@ 8e#&? 8ee$ 'ec%&"@
hen "y"tem" are connected through the network* acti)e attack" and pa""i)e attack" are
po""i(%e during tran"mi""ion time from "ender to recei)er and )ice )er"a So network
need" "ecurity
11. De;"8e E8c&@:"#8.
The proce"" of con)erting from p%ainte>t to cipher te>t i" known a" encryption
12. S:ec";@ he c#5:#8e8' #; e8c&@:"#8 6#&"h5
/a :%ainte>t /( -ncryption a%gorithm /c "ecret key /d cipher te>t /e Decryption
a%gorithm
13. De;"8e c#8;"$e8"6"@ 68$ 6%he8"c6"#8
C#8;"$e8"6"@8 It mean" how to maintain the "ecrecy of me""age It en"ure" that the
information in a computer "y"tem and tran"mitted information are acce""i(%e on%y for
reading (y authoriFed per"on
A%he8"c6"#8It he%p" to pro)e that the "ource entity on%y ha" in)o%)ed the tran"action
1. De;"8e c&@:#&6:h@.
It i" a "cience of writing Secret code u"ing mathematica% techni.ue" The many "cheme"
u"ed for enciphering con"titute the area of "tudy known a" cryptography
1*. C#5:6&e S%'"%"#8 68$ T&68':#'""#8 ech8"t digit" which
i" e.ui)a%ent to each cipher te>t digit i" affected (y many p%ainte>t digit" It can (e
achie)ed (y performing permutation on the data It i" the re%ation"hip (etween the
p%ainte>t and cipher te>t C#8;%'"#88 It can (e achie)ed (y "u("titution a%gorithm It i"
the re%ation"hip (etween cipher te>t and key
10
SUBSTITUTION TRANSPOSITION
3 "u("titution techni.ue" i" one in
which the %etter" of p%ainte>t are
rep%aced (y other %etter or (y num(er
or "ym(o%"
It mean"* different kind of mapping
i" achie)ed (y performing "ome "ort
of permutation on the p%ainte>t
%etter"
K-g8 Cae"ar cipher K-g8 D-S* 3-S
7/25/2019 VII SEM updates.doc
11/171
1. De;"8e M%":e E8c&@:"#8'.
L It i" a techni.ue in which the encryption i" u"ed mu%tip%e time" -g8 Dou(%e D-S* Trip%e
D-S
1. S:ec";@ he $e'"8 c&"e&"6 #; #c? c":he&.
Num(er of round"* De"ign of the function * =ey "chedu%ing
1+. De;"8e Ree&'"e 56::"8. (N# 13)
-ach p%ain te>t i" map" with the uni.ue cipher te>t Thi" tran"formation i" ca%%ed
re)er"i(%e mapping
20. S:ec";@ he 6'"c 6'? ;#& $e;"8"8 6 'ec%&"@ 'e&"ce.
3 "er)ice that enhance" the "ecurity of the data proce""ing "y"tem" and the information
tran"fer of an organiFation The "er)ice" are intended to counter "ecurity attack* and theymake u"e of one or more "ecurity mechani"m to pro)ide the "er)ice
PART B (1, 56&?)
1. E=:6"8 OSI 6&ch"ec%&e (M6@ 11)
OSI Sec%&"@ A&ch"ec%&e
IT4+T @?00 Security 3rchitecture for ,SI define" a "y"tematic way of defining and
pro)iding "ecurity re.uirement"
Sec%&"@ Se&"ce'
@?00 define" it a"8 a "er)ice pro)ided (y a protoco% %ayer of communicating open
"y"tem"* which en"ure" ade.uate "ecurity of the "y"tem" or of data tran"fer"
C 2?2? define" it a"8 a proce""ing or communication "er)ice pro)ided (y a "y"tem to
gi)e a "pecific kind of protection to "y"tem re"ource"
@?00 define" it in < maHor categorie"
A%he8"c6"#8 + a""urance that the communicating entity i" the one c%aimedAcce''
C#8 + pre)ention of the unauthoriFed u"e of a re"ource
D66 C#8;"$e8"6"@;protection of data from unauthoriFed di"c%o"ure
11
7/25/2019 VII SEM updates.doc
12/171
D66 I8e&"@ + a""urance that data recei)ed i" a" "ent (y an authoriFed entityN#8-
Re:%$"6"#8 + protection again"t denia% (y one of the partie" in a communication
Sec%&"@ Mech68"'5'
"pecific "ecurity mechani"m"8 encipherment* digita% "ignature"* acce"" contro%"* data integrity* authentication
e>change* traffic padding* routing contro%* notariFation
per)a"i)e "ecurity mechani"m"8
tru"ted functiona%ity* "ecurity %a(e%"* e)ent detection* "ecurity audit trai%"* "ecurity
reco)ery
C6''";"c6"#8 #; Sec%&"@ A6c?' a"
:6''"e 66c?' + ea)e"dropping on* or monitoring of* tran"mi""ion" to8
o(tain me""age content"* or monitor traffic f%ow"
6c"e 66c?';modification of data "tream to8ma".uerade of one entity a" "ome other
rep%ay pre)iou" me""age" modify me""age" in tran"it denia% of "er)ice
Sec%&"@ A6c?'i" c%a""ified a"
:a""i)e attack
eading content" of me""age"
3%"o ca%%ed ea)e"dropping
Difficu%t to detect pa""i)e attack"
Defence8 to pre)ent their "ucce""
3cti)e attack"
Modification or creation of me""age" /(y attacker"
our categorie"8 modification of me""age"* rep%ay* ma".uerade* denia% of "er)ice
-a"y to detect (ut difficu%t to pre)ent
Defen"e8 detect attack" and reco)er from damage"
2. G"e 6 5#$e ;#& 8e#&? 'ec%&"@. ( 56&?')
12
7/25/2019 VII SEM updates.doc
13/171
3. E=:6"8 c6''"c6 E8c&@:"#8 ech8"
7/25/2019 VII SEM updates.doc
14/171
' D:! ' BD ' OT@!4!$I C3M- I S3 I C,NO4--D
ie mapping i"
35CD-$!I='MN,:OST4B@D-$!I='MN,:OST4B@35C
M"=e$ A:h6e'
Mo"t genera%%y we cou%d u"e an ar(itrary mi>ed /Hum(%ed a%pha(et
each p%ainte>t %etter i" gi)en a different random cipherte>t %etter* hence key i" 26
%etter" %ong
:%ain8 35CD-$!I='MN,:OST4B@Cipher8 D=BOI5:-SC@!TM34,'$N:%ainte>t8 I-IS!T,-:'3C-'-TT-SCipher te>t8 I34!TSDBS443
C&@:686@'"'
u"e fre.uency count" to gue"" %etter (y %etter
a%"o ha)e fre.uencie" for digraph" G trigraph"
Ge8e&6 M#8#6:h6e"c
"pecia% form of mi>ed a%pha(et
u"e key a" fo%%ow"8
o write key /with repeated %etter" de%eted
o then write a%% remaining %etter" in co%umn" underneath
o then read off (y co%umn" to get cipherte>t e.ui)a%ent"
14
7/25/2019 VII SEM updates.doc
15/171
P#@6:h6e"c S%'"%"#8
in genera% u"e more than one "u("titution a%pha(et
make" cryptana%y"i" harder "ince ha)e more a%pha(et" to gue""
and (ecau"e f%atten" fre.uency di"tri(ution
/"ince "ame p%ainte>t %etter get" rep%aced (y "e)era% cipherte>t %etter* depending on
which a%pha(et i" u"ed
"e8&e C":he&
(a"ica%%y mu%tip%e Cae"ar cipher"
key i" mu%tip%e %etter" %ong = P kQ/1 kQ/2 kQ/d
ith%etter "pecifie" itha%pha(et to u"e
u"e each a%pha(et in turn* repeating from "tart after d %etter" in me""age
. E=:6"8 E%c"$' 6#&"h5 68$ Fe&56' L"e The#&e5. (M6@ 12 M6@ 1*)
TheEuclidean Algorithmi" a techni.ue for .uick%y finding theGCDof two
integer"
The 3%gorithm
The -uc%idean 3%gorithm for finding $CD/3*5 i" a" fo%%ow"8
If 3 P 0 then $CD/3*5P5* "ince the $CD/0*5P5* and we can "top
If 5 P 0 then $CD/3*5P3* "ince the $CD/3*0P3* and we can "top
rite 3 in .uotient remainder form /3 P 5O R
ind $CD/5* u"ing the -uc%idean 3%gorithm "ince $CD/3*5 P $CD/5*
Fe&56J' "e The#&e5
Fe&56J' "e he#&e5"tate" that ifpi" aprime num(er* then for anyintegera* thenum(er ap ai" an integer mu%tip%e ofp In the notation ofmodu%ar arithmetic* thi" i"
e>pre""ed a"
or e>amp%e* ifaP 2 andpP 7* 27P 12?* and 12? 2 P 7 1? i" an integer mu%tip%e of
7
15
https://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Integerhttps://en.wikipedia.org/wiki/Integerhttps://en.wikipedia.org/wiki/Modular_arithmetichttps://en.wikipedia.org/wiki/Modular_arithmetichttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Integerhttps://en.wikipedia.org/wiki/Modular_arithmetic7/25/2019 VII SEM updates.doc
16/171
If ai" not di)i"i(%e (yp* ermatU" %itt%e theorem i" e.ui)a%ent to the "tatement that ap 1
1 i" an integer mu%tip%e ofp* or in "ym(o%"
V1WV2W
or e>amp%e* if aP 2 andpP 7 then 26P 6& and 6& 1 P 6# i" thu" a mu%tip%e of 7
ermatU" %itt%e theorem i" the (a"i" for the ermat prima%ity te"t and i" one of the
fundamenta% re"u%t" ofe%ementary num(er theory The theorem i" named after :ierre de
ermat* who "tated it in 16&0 It i" ca%%ed the X%itt%e theoremX to di"tingui"h it
fromermatU" %a"t theorem
*. E=:6"8 $";;e&e8 @:e' #; 66c? "8 $e6".
C%a""e" of attack might inc%ude pa""i)e monitoring of communication"* acti)e
network attack"* c%o"e+in attack"* e>p%oitation (y in"ider"* and attack" through the "er)icepro)ider Information "y"tem" and network" offer attracti)e target" and "hou%d (e
re"i"tant to attack from the fu%% range of threat agent"* from hacker" to nation+"tate" 3
"y"tem mu"t (e a(%e to %imit damage and reco)er rapid%y when attack" occur
There are fi)e type" of attack8
PASSIE ATTAC/
3 :6''"e 66c?monitor" unencrypted traffic and %ook" for c%ear+te>t pa""word"
and "en"iti)e information that can (e u"ed in other type" of attack" P6''"e
66c?'inc%ude traffic ana%y"i"* monitoring of unprotected communication"* decrypting
weak%y encrypted traffic* and capturing authentication information "uch a" pa""word"
:a""i)e interception of network operation" ena(%e" ad)er"arie" to "ee upcoming action"
:a""i)e attack" re"u%t in the di"c%o"ure of information or data fi%e" to an attacker without
the con"ent or know%edge of the u"er
ACTIE ATTAC/
In an 6c"e 66c?the attacker trie" to (ypa"" or (reak into "ecured "y"tem"
Thi" can (e done through "tea%th* )iru"e"* worm"* or TroHan hor"e" 3cti)e attack" inc%ude
attempt" to circum)ent or (reak protection feature"* to introduce ma%iciou" code* and to
"tea% or modify information The"e attack" are mounted again"t a network (ack(one*
e>p%oit information in tran"it* e%ectronica%%y penetrate an enc%a)e* or attack an authoriFed
16
https://en.wikipedia.org/wiki/Fermat's_little_theorem#cite_note-1https://en.wikipedia.org/wiki/Fermat's_little_theorem#cite_note-2https://en.wikipedia.org/wiki/Fermat_primality_testhttps://en.wikipedia.org/wiki/Elementary_number_theoryhttps://en.wikipedia.org/wiki/Elementary_number_theoryhttps://en.wikipedia.org/wiki/Pierre_de_Fermathttps://en.wikipedia.org/wiki/Pierre_de_Fermathttps://en.wikipedia.org/wiki/Fermat's_last_theoremhttps://en.wikipedia.org/wiki/Fermat's_last_theoremhttps://en.wikipedia.org/wiki/Fermat's_last_theoremhttps://en.wikipedia.org/wiki/Fermat's_little_theorem#cite_note-1https://en.wikipedia.org/wiki/Fermat's_little_theorem#cite_note-2https://en.wikipedia.org/wiki/Fermat_primality_testhttps://en.wikipedia.org/wiki/Elementary_number_theoryhttps://en.wikipedia.org/wiki/Pierre_de_Fermathttps://en.wikipedia.org/wiki/Pierre_de_Fermathttps://en.wikipedia.org/wiki/Fermat's_last_theorem7/25/2019 VII SEM updates.doc
17/171
remote u"er during an attempt to connect to an enc%a)e 3cti)e attack" re"u%t in the
di"c%o"ure or di""emination of data fi%e"* DoS* or modification of data
DISTRIBUTED ATTAC/
3 $"'&"%e$ 66c?re.uire" that the ad)er"ary introduce code* "uch a" a TroHan hor"eor (ack+door program* to a tru"tedE component or "oftware that wi%% %ater (e di"tri(uted
to many other companie" and u"er" Di"tri(ution attack" focu" on the ma%iciou"
modification of hardware or "oftware at the factory or during di"tri(ution The"e attack"
introduce ma%iciou" code "uch a" a (ack door to a product to gain unauthoriFed acce"" to
information or to a "y"tem function at a %ater date
INSIDER ATTAC/
3n "8'"$e& 66c?in)o%)e" "omeone from the in"ide* "uch a" a di"grunt%edemp%oyee* attacking the network In"ider attack" can (e ma%iciou" or no ma%iciou"
Ma%iciou" in"ider" intentiona%%y ea)e"drop* "tea%* or damage informationJ u"e information
in a fraudu%ent mannerJ or deny acce"" to other authoriFed u"er" No ma%iciou" attack"
typica%%y re"u%t from care%e""ne""* %ack of know%edge* or intentiona% circum)ention of
"ecurity for "uch rea"on" a" performing a ta"k
CLOSE-IN ATTAC/
3 c#'e-"8 66c?in)o%)e" "omeone attempting to get phy"ica%%y c%o"e to networkcomponent"* data* and "y"tem" in order to %earn more a(out a network C%o"e+in attack"
con"i"t of regu%ar indi)idua%" attaining c%o"e phy"ica% pro>imity to network"* "y"tem"* or
faci%itie" for the purpo"e of modifying* gathering* or denying acce"" to information C%o"e
phy"ica% pro>imity i" achie)ed through "urreptitiou" entry into the network* open acce""*
or (oth
PHISHING ATTAC/
In phi"hing attack the hacker create" a fake we( "ite that %ook" e>act%y %ike a
popu%ar "ite "uch a" the S5I (ank or paypa% The phi"hing part of the attack i" that the
hacker then "end" an e+mai% me""age trying to trick the u"er into c%icking a %ink that %ead"
to the fake "ite hen the u"er attempt" to %og on with their account information* the
hacker record" the u"ername and pa""word and then trie" that information on the rea% "ite
17
7/25/2019 VII SEM updates.doc
18/171
HI!AC/ ATTAC/
!iHack attack In a hiHack attack* a hacker take" o)er a "e""ion (etween you and
another indi)idua% and di"connect" the other indi)idua% from the communication ou "ti%%
(e%ie)e that you are ta%king to the origina% party and may "end pri)ate information to the
hacker (y accident
SPOOF ATTAC/
Spoof attack In a "poof attack* the hacker modifie" the "ource addre"" of the
packet" he or "he i" "ending "o that they appear to (e coming from "omeone e%"e Thi"
may (e an attempt to (ypa"" your firewa%% ru%e"
BUFFER OERFLO
5uffer o)erf%ow 3 (uffer o)erf%ow attack i" when the attacker "end" more data to
an app%ication than i" e>pected 3 (uffer o)erf%ow attack u"ua%%y re"u%t" in the attacker
gaining admini"trati)e acce"" to the "y"tem in a ommand prompt or "he%%
E4PLOIT ATTAC/
->p%oit attack In thi" type of attack* the attacker know" of a "ecurity pro(%em
within an operating "y"tem or a piece of "oftware and %e)erage" that know%edge (y
e>p%oiting the )u%nera(i%ity
PASSORD ATTAC/
:a""word attack 3n attacker trie" to crack the pa""word" "tored in a network account
data(a"e or a pa""word+protected fi%e There are three maHor type" of pa""word attack"8 a
dictionary attack* a (rute+force attack* and a hy(rid attack 3 dictionary attack u"e" a
word %i"t fi%e* which i" a %i"t of potentia% pa""word" 3 (rute+force attack i" when the
attacker trie" e)ery po""i(%e com(ination of character"
,. E=:6"8 C":he& Fee$6c? 68$ O%:% Fee$6c?.
C":he& Fee$6c? (CFB)
Me""age i" treated a" a "tream of (it" o added to the output of the (%ock cipher
re"u%t i" feed(ack for ne>t "tage /hence name
"tandard a%%ow" any num(er of (it /1*? or 6& or whate)er to (e feed(ack o denoted
C5+1* C5+?* C5+6& etc
18
7/25/2019 VII SEM updates.doc
19/171
i" mo"t efficient to u"e a%% 6& (it" /C5+6& CiP :i@, D-S=1/Ci+1 C+1P IB
u"e"8 "tream data encryption* authentication
A$686e' 68$ L"5"6"#8' #; CFB
appropriate when data arri)e" in (it"(yte" o mo"t common "tream mode
%imitation i" need to "ta%% whi%e do (%ock encryption after e)ery n+(it" o note that
the (%ock cipher i" u"ed in encryption mode at (oth end"
error" propagate for "e)era% (%ock" after the error
O%:% Fee$6c? (OFB)
me""age i" treated a" a "tream of (it" output of cipher i" added to me""age
output i" then feed(ack /hence name
feed(ack i" independent of me""age
can (e computed in ad)ance
CiP :i@, ,i,iP D-S=1/,i+1 ,+1P IB
o u"e"8 "tream encryption o)er noi"y channe%"
A$686e' 68$ L"5"6"#8' #; OFB
4"ed when error feed(ack a pro(%em or where need to encryption" (efore me""age i"
a)ai%a(%e
"uperficia%%y "imi%ar to C5
(ut feed(ack i" from the output of cipher and i" independent of me""age o a )ariation of
a Bernam cipher
hence mu"t ne)er reu"e the "ame "e.uence /keyRIB
"ender and recei)er mu"t remain in "ync* and "ome reco)ery method i" needed to en"ure
thi" occur
origina%%y "pecified with m+(it feed(ack in the "tandard"
Su("e.uent re"earch ha" "hown that on%y OFB-,"hou%d e)er (e u"ed
. E=:6"8 Ch"8e'e Re5"8$e& The#&e5.
Ch"8e'e Re56"8$e& The#&e5
4"ed to "peed up modu%o computation" o working modu%o a product of num(er"
19
7/25/2019 VII SEM updates.doc
20/171
eg mod M P m1m2mk
Ch"8e'e Re56"8$e& he#&e5%et" u" work in each modu%e mi"eparate%y
"ince computationa% co"t i" proportiona% to "iFe* thi" i" fa"ter than working in the
fu%% modu%u" M
can imp%ement CT in "e)era% way"
to compute /3 mod M can fir"t%y compute a%% /a imod mi "eparate%y and then
com(ine re"u%t" to get an"wer u"ing8
5#$ M
K ( 5#$ ) ;#& 1
P&"5""e R##'
from -u%er" theorem ha)e aY/nmod nP1 o con"ider ammod nP1* $CD/a*nP1
mu"t e>i"t for mP Y/n (ut may (e "ma%%er o once power" reach m* cyc%e wi%%repeat
if "ma%%e"t i" mP Y/n then a i" ca%%ed a primiti)e root
if p i" prime* then "ucce""i)e power" of a XgenerateX the group mod p o the"e are
u"efu% (ut re%ati)e%y hard to find
D"'c&ee L#6&"h5' #& I8$"ce'
the in)er"e pro(%em to e>ponentiation i" to find the di"crete %ogarithm of a num(er
modu%o p
that i" to find > where a>P ( mod p
written a" >P%oga( mod p or >Pinda*p/(
if a i" a primiti)e root then a%way" e>i"t"* otherwi"e may not
> P %og#& mod 1# /> "t #>P & mod 1# ha" no an"wer
> P %og2# mod 1# P & (y trying "ucce""i)e power"
hi%"t e>ponentiation i" re%ati)e%y ea"y* finding di"crete %ogarithm" i" genera%%y
a hard pro(%em
. E=:6"8 c#8;"$e8"6"@ #; S@55e&"c E8c&@:"#8
C#8;"$e8"6"@ U'"8 S@55e&"c E8c&@:"#8
Traditiona%%y "ymmetric encryption i" u"ed to pro)ide me""age confidentia%ity con"ider
typica% "cenario
work"tation" on '3N" acce"" other work"tation" G "er)er" on '3N
'3N" interconnected u"ing "witche"router"
20
7/25/2019 VII SEM updates.doc
21/171
with e>terna% %ine" or radio"ate%%ite %ink" con"ider attack" and p%acement in thi"
"cenario
"nooping from another work"tation
u"e dia%+in to '3N or "er)er to "noop
u"e e>terna% router %ink to enter G "noop monitor andor modify traffic one
e>terna% %ink" ha)e two maHor p%acement a%ternati)e"
L"8? e8c&@:"#8
-ncryption occur" independent%y on e)ery %ink
imp%ie" mu"t decrypt traffic (etween %ink"
re.uire" many de)ice"* (ut paired key"
e8$-#-e8$ e8c&@:"#8
-ncryption occur" (etween origina% "ource and fina% de"tination
need de)ice" at each end with "hared key"
T&6;;"c C#8;"$e8"6"@ when u"ing end+to+end encryption mu"t %ea)e header" in c%ear
"o network can correct%y route information
hence a%though content" protected* traffic pattern f%ow" are not
idea%%y want (oth at once end+to+end protect" data content" o)er entire path and
pro)ide" authentication
%ink protect" traffic f%ow" from monitoring
P6ce5e8 #; E8c&@:"#8
Can p%ace encryption function at )ariou" %ayer" in ,SI eference Mode% o %inkencryption occur" at %ayer" 1 or 2
end+to+end can occur at %ayer" #* &* 6* 7
a" mo)e higher %e"" information i" encrypted (ut it i" more "ecure though more
comp%e> with more entitie" and key"
T&6;;"c A86@'"'
I" monitoring of communication" f%ow" (etween partie" o u"efu% (oth in mi%itary
G commercia% "phere"
can a%"o (e u"ed to create a co)ert channe% o %ink encryption o("cure" header
detai%"
(ut o)era%% traffic )o%ume" in network" and at end+point" i" "ti%% )i"i(%e o traffic
padding can further o("cure f%ow"
UNIT II
21
7/25/2019 VII SEM updates.doc
22/171
PART A (TO MAR/S)
1. D";;e&e8"6e :%"c ?e@ 68$ c#8e8"#86 e8c&@:"#8 (Dec 11)
2.
h6 6&e he :&"8c":e ee5e8' #; 6 :%"c ?e@ c&@:#'@'e5
The princip%e e%ement" of a crypto"y"tem are8
p%ain te>t
-ncryption a%goritm
:u(%ic and pri)ate key
Cipher te>t
Decryption a%gorithm IT
3. h6 6&e e' #; :%"c 68$ :&"6e ?e@
The two key" u"ed for pu(%ic+key encryption are referred to a" the pu(%ic key and the
pri)ate key In)aria(%y* the pri)ate key i" kept "ecret and the pu(%ic key i" known
pu(%ic%y 4"ua%%y the pu(%ic key i" u"ed for encryption purpo"e and the pri)ate key i" u"ed
in the decryption "ide
. S:ec";@ he 6::"c6"#8' #; he :%"c ?e@ c&@:#'@'e5
22
Con)entiona% -ncryption :u(%ic key -ncryption
The "ame a%gorithm with the "ame key i"
u"ed for encryption and decryption
,ne a%gorithm i" u"ed for encryption
and decryption with a pair of key"*
one for encryption and another for
decryption
The "ender and recei)er mu"t "hare the
a%gorithm and the key
the "ender and recei)er mu"t each
ha)e one of the matched pair of key"
The key mu"t (e "ecret ,ne of two key" mu"t (e kept Secret
It mu"t (e impo""i(%e or at%ea"t
impractia% me""age if no other
information i" a)ai%a(%e
It mu"t (e impo""i(%e or to at %ea"t
impractica% to decipher a me""age if
no other information i" a)ai%a(%e
=now%edge of the a%gorithm p%u"
"amp%e" of cipher te>t mu"t in"ufficient
to determine the key
=now%edge of the a%gorithm p%u" one
of key p%u" "amp%e" of cipherte>t
mu"t (e in"ufficient to determine the
other key
7/25/2019 VII SEM updates.doc
23/171
The app%ication" of the pu(%ic+key crypto"y"tem can c%a""ified a" fo%%ow"
E8c&@:"#8>Dec&@:"#8The "ender encrypt" a me""age with the recipient9" pu(%ic key
D""6 '"86%&eThe "ender "ign"E a me""age with it" pri)ate key Signing i" achie)ed
(y a cryptographic a%gorithm app%ied to a me""age or to a "ma%% (%ock of data that i" a
function of the me""age
/e@ E=ch68e Two "ide" cooperate to e>change a "e""ion key Se)era% different
approache" are po""i(%e* in)o%)ing the pri)ate key/" of one or (oth partie"
*. h6 &et
u"ing the pri)ate key to reco)er the origina% me""age 8
MPD=(/CPD=(V-=4(/MW It i" computationa%%y infea"i(%e for an opponent* knowing the pu(%ic key*=4(*to
determine the pri)ate key*=( It i" computationa%%y infea"i(%e for an opponent* knowing the pu(%ic key*=4(*
and a cipher te>t* C* to reco)er the origina% me""age The encryption and decryption function" can (e app%ied in either order8
MP-=4(VD=(/MWPD=4( V-=(/MW
,. h6 "' 6 #8e 6@ ;%8c"#8 (Dec 12)
,ne way function i" one that map the domain into a range "uch that e)ery function )a%ue
ha" a uni.ue in)er"e with a condition that the ca%cu%ation of the function i" ea"y wherea"
the ca%cu%ation" of the in)er"e i" infea"i(%e
. h6 "' 6 &6:$##& #8e 6@ ;%8c"#8 (Dec 12)
It i" function which i" ea"y to ca%cu%ate in one direction and infea"i(%e to ca%cu%ate in
other direction in the other direction un%e"" certain additiona% information i" known ith
the additiona% information the in)er"e can (e ca%cu%ated in po%ynomia% time It can (e
"ummariFed a"8 3 trapdoor one way function i" a fami%y of in)erti(%e function" fk* "uch
that P fk/ @ ea"y* if k and @ are known @Pfk +1 / ea"y* if k and y are known @P fk
+1 / infea"i(%e* if i" known (ut k i" not known
23
7/25/2019 VII SEM updates.doc
24/171
. L"' ;#%& e8e&6 ch6&6ce&"'"c' #; 'che56 ;#& he $"'&"%"#8 #; he :%"c ?e@(M6@
11)
The four genera% characteri"tic" for the di"tri(ution of the pu(%ic key are
:u(%ic announcement :u(%ic%y a)ai%a(%e directory
:u(%ic+key authority
:u(%ic+key certificate
+. h6 6&e e''e8"6 "8&e$"e8' #; he :%"c ?e@ $"&ec#&@
The e""entia% ingredient" of the pu(%ic key are a" fo%%ow"8
The authority maintain" a directory with a Zname* pu(%ic key[ entry for each
participant
-ach participant regi"ter" a pu(%ic key with the directory authority egi"trationwou%d ha)e to (e in per"on or (y "ome form of "ecure authenticated
communication 3 participant may rep%ace the e>i"ting key with a new one at a time *either
(ecau"e of the de"ire to rep%ace a pu(%ic key that ha" a%ready (een u"ed for a %arge
amount of data* or (ecau"e the corre"ponding pri)ate key ha" (een compri"ed in
"ome way :eriodica%%y* the authority pu(%i"he" the entire directory or update" to the
directory or e>amp%e* a hard+copy )er"ion much %ike a te%ephone (ook cou%d (e
pu(%i"hed* or update" cou%d (e %i"ted in a wide%y circu%ated new"paper
:articipant" cou%d a%"o acce"" the directory e%ectronica%%y or thi" purpo"e*"ecure* authenticated communication from the authority to the participant i"
mandatory
10. h6 6&e he $e'"8 :6&65ee&' #; Fe"'e c":he& 8e#&?
K5%ock "iFe K=ey "iFe KNum(er of ound" KSu( key generation a%gorithm Kound
function Ka"t "oftware -ncryptionDecryption K-a"e of ana%y"i"
11. De;"8e P$%c c":he&.
It mean" two or more (a"ic cipher are com(ined and it produce the re"u%tant cipher i"
ca%%ed the product cipher
12. E=:6"8 A668che e;;ec.
3 de"ira(%e property of any encryption a%gorithm i" that a "ma%% change in either the
p%ainte>t or the key produce a "ignificant change in the cipher te>t In particu%ar* a change
in one (it of the p%ainte>t or one (it of the key "hou%d produce a change in many (it" of
24
7/25/2019 VII SEM updates.doc
25/171
the cipher te>t If the change i" "ma%%* thi" might pro)ider a way to reduce the "iFe of the
p%ainte>t or key "pace to (e "earched
13. G"e he ;"e 5#$e' #; #:e&6"#8 #; B#c? c":he&. (Dec 1)
-%ectronic Code(ook/-C5
Cipher 5%ock Chaining/C5C
Cipher eed(ack/C5
,utput eed(ack/,5
Counter/CT
1. S6e 6$686e' #; c#%8e& 5#$e.
K!ardware -fficiency K Software -fficiency K:reproce""ing K andom 3cce"" K
:ro)a(%e Security K Simp%icity
1*. F"8$ c$ (1+0 10,,) %'"8 E%c"$' 6#&"h5 (Dec 13)
gcd /1A70*1066 P gcd/1066*1A70 mod 1066
P gcd/1066*A0&
P 2 1
7/25/2019 VII SEM updates.doc
26/171
n P 7K11P77
\/nP/p+1 /.+1
P6K10 P 60
e P17 d P27
C P Memod n
C P ?17 mod 77
P changing cryptographic key"o)er a pu(%ic channe% and wa" one of the fir"tpu(%ic+key
protoco%"a" origina%%y conceptua%iFed (y a%ph Merk%eand named after hitfie%d
Diffieand Martin !e%%manV1WV2WD;! i" one of the ear%ie"t practica% e>amp%e" of pu(%ic key
e>changeimp%emented within the fie%d of cryptographyTraditiona%%y* "ecure encrypted
communication (etween two partie" re.uired that they fir"t e>change key" (y "ome
26
https://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Algebraic_structurehttps://en.wikipedia.org/wiki/Algebraic_structurehttps://en.wikipedia.org/wiki/Elliptic_curvehttps://en.wikipedia.org/wiki/Finite_fieldhttps://en.wikipedia.org/wiki/Finite_fieldhttps://en.wikipedia.org/wiki/Galois_fieldhttps://en.wikipedia.org/wiki/Encryptionhttps://en.wikipedia.org/wiki/Digital_signaturehttps://en.wikipedia.org/wiki/Digital_signaturehttps://en.wikipedia.org/wiki/CPRNGhttps://en.wikipedia.org/wiki/CPRNGhttps://en.wikipedia.org/wiki/CPRNGhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Block_cipherhttps://en.wikipedia.org/wiki/Bruce_Schneierhttps://en.wikipedia.org/wiki/Data_Encryption_Standardhttps://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-1https://en.wikipedia.org/wiki/Key_(cryptography)https://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Ralph_Merklehttps://en.wikipedia.org/wiki/Whitfield_Diffiehttps://en.wikipedia.org/wiki/Whitfield_Diffiehttps://en.wikipedia.org/wiki/Martin_Hellmanhttps://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-Merkle_1978-2https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-Diffie_1976-3https://en.wikipedia.org/wiki/Key_exchangehttps://en.wikipedia.org/wiki/Key_exchangehttps://en.wikipedia.org/wiki/Key_exchangehttps://en.wikipedia.org/wiki/Cryptographyhttps://en.wikipedia.org/wiki/Cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Algebraic_structurehttps://en.wikipedia.org/wiki/Elliptic_curvehttps://en.wikipedia.org/wiki/Finite_fieldhttps://en.wikipedia.org/wiki/Galois_fieldhttps://en.wikipedia.org/wiki/Encryptionhttps://en.wikipedia.org/wiki/Digital_signaturehttps://en.wikipedia.org/wiki/CPRNGhttps://en.wikipedia.org/wiki/CPRNGhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Block_cipherhttps://en.wikipedia.org/wiki/Bruce_Schneierhttps://en.wikipedia.org/wiki/Data_Encryption_Standardhttps://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-1https://en.wikipedia.org/wiki/Key_(cryptography)https://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Ralph_Merklehttps://en.wikipedia.org/wiki/Whitfield_Diffiehttps://en.wikipedia.org/wiki/Whitfield_Diffiehttps://en.wikipedia.org/wiki/Martin_Hellmanhttps://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-Merkle_1978-2https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-Diffie_1976-3https://en.wikipedia.org/wiki/Key_exchangehttps://en.wikipedia.org/wiki/Key_exchangehttps://en.wikipedia.org/wiki/Cryptography7/25/2019 VII SEM updates.doc
27/171
"ecure phy"ica% channe%* "uch a" paper key %i"t" tran"ported (y a tru"ted courier The
Diffie;!e%%man key e>change method a%%ow" two partie" that ha)e no prior know%edge of
each other to Hoint%y e"ta(%i"h a "hared "ecretkey o)er anin"ecurechanne% Thi" key can
then (e u"ed to encrypt "u("e.uent communication" u"ing a "ymmetric keycipher
Diffie;!e%%man i" u"ed to "ecure a )ariety of Internet"er)ice" !owe)er* re"earch
pu(%i"hed in ,cto(er 201< "ugge"t" that the parameter" in u"e for many D;! Internet
app%ication" at that time are not "trong enough to pre)ent compromi"e (y )ery we%%+
funded attacker"* "uch a" the "ecurity "er)ice" of %arge go)ernment"
The "cheme wa" fir"t pu(%i"hed (y hitfie%d Diffie and Martin !e%%man in 1A76 5y
1A7
7/25/2019 VII SEM updates.doc
28/171
Diffie;!e%%man =ey ->change e"ta(%i"he" a "hared "ecret (etween two partie" that can (e
u"ed for "ecret communication for e>changing data o)er a pu(%ic network The fo%%owing
conceptua% diagram i%%u"trate" the genera% idea of the key e>change (y u"ing co%or"
in"tead of )ery %arge num(er"
The proce"" (egin" (y ha)ing the two partie"* 3%ice and 5o(* agree on an ar(itrary
"tarting co%or that doe" not need to (e kept "ecret /(ut "hou%d (e different e)ery timeJ in
thi" e>amp%e the co%or i" ye%%ow -ach of them "e%ect" a "ecret co%or;red and a.ua
re"pecti)e%y;that they keep to them"e%)e" The crucia% part of the proce"" i" that 3%ice and
5o( now mi> their "ecret co%or together with their mutua%%y "hared co%or* re"u%ting in
orange and (%ue mi>ture" re"pecti)e%y* then pu(%ic%y e>change the two mi>ed co%or"
ina%%y* each of the two mi> together the co%or they recei)ed from the partner with their
own pri)ate co%or The re"u%t i" a fina% co%or mi>ture /(rown that i" identica% to the
partnerU" co%or mi>ture
If another party /u"ua%%y namedEveincrypto%ogypu(%ication"* -)e (eing a third+party
who i" con"idered to (e an ea)e"dropper had (een %i"tening in on the e>change* it wou%d
(e computationa%%y difficu%t for that per"on to determine the common "ecret co%orJ in fact*
when u"ing %arge num(er" rather than co%or"* thi" action i" impo""i(%e for
modern "upercomputer"to do in a rea"ona(%e amount of time
2. E=:6"8 DES "8 $e6". (M6@ 1*)
D66 E8c&@:"#8 S68$6&$ (DES)
Mo"t wide%y u"ed (%ock cipher in wor%d
adopted in 1A77 (y N5S /now NIST
a" I:S :45 &6encrypt" 6&+(it data u"ing
7/25/2019 VII SEM updates.doc
29/171
I8""6 Pe&5%6"#8 IP
fir"t "tep of the data computation
I: reorder" the input data (it"
e)en (it" to '! ha%f* odd (it" to ! ha%f
.uite regu%ar in "tructure /ea"y in hw
DES R#%8$ S&%c%&e u"e" two #2+(it ' G ha%)e"
e>pand" to &?+(it" u"ing perm -
add" to "u( key
pa""e" through ? S+(o>e" to get #2+(it re"u%t
fina%%y permute" thi" u"ing #2+(it perm :
S%'"%"#8 B#=e' S
ha)e eight S+(o>e" which map 6 to & (it"
each S+(o> i" actua%%y & %itt%e & (it (o>e"
outer (it" 1 G 6 /row (it" "e%ect one row"
inner (it" 2+< /co% (it" are "u("tituted
re"u%t i" ? %ot" of & (it"* or #2 (it"
row "e%ection depend" on (oth data G key
feature known a" autoc%a)ing /auto keying
e>amp%e8 S/1? 0A 12 #d 11 17 #? #A P ha%foutput (it"
making attempt" to home
inE (y gue""ing key" impo""i(%e
D-S e>hi(it" "trong a)a%anche
29
7/25/2019 VII SEM updates.doc
30/171
3. B&"e;@ e=:6"8 #c? c":he& $e'"8 :&"8c":e' 68$ 5#$e' #; #:e&6"#8. (Dec13)
B#c? C":he& De'"8 P&"8c":e' 68$ M#$e' #; O:e&6"#8
5a"ic princip%e"
"ti%% %ike ei"te% in 1A70 " num(er of round"
more i" (etter* e>hau"ti)e "earch (e"t attack
function f8
pro)ide" confu"ionE* i" non%inear* a)a%anche
key "chedu%e
comp%e> "u(key creation* key a)a%anche
M#$e' #; O:e&6"#8
(%ock cipher" encrypt fi>ed "iFe (%ock"
eg D-S encrypt" 6&+(it (%ock"* with
7/25/2019 VII SEM updates.doc
31/171
!owe)er if IB i" "ent in the c%ear* an attacker can change (it" of the fir"t (%ock* and
change IB to compen"ate hence either IB mu"t (e a fi>ed )a%ue /a" in -T:,S or it
mu"t (e"ent encrypted in -C5 mode (efore re"t of me""age
at end of me""age* hand%e po""i(%e %a"t "hort (%ock
(y padding either with known non+data )a%ue /eg nu%%"
or pad %a"t (%ock with count of pad "iFeeg V (1 (2 (# 0 0 0 0 t "tage /hence name
"tandard a%%ow" any num(er of (it /1*? or 6& or whate)er to (e feed (ack
denoted C5+1* C5+?* C5+6& etc
i" mo"t efficient to u"e a%% 6& (it" /C5+6&
u"e"8 "tream data encryption* authenticationA$686e' 68$ L"5"6"#8' #; CFB
appropriate when data arri)e" in (it"(yte"
mo"t common "tream mode
%imitation i" need to "ta%% whi%e do (%ock encryption after e)ery n+(it"
note that the (%ock cipher i" u"ed in encryption mode at (oth end"
error" propagate for "e)era% (%ock" after the error
(")O%:% Fee$B6c? (OFB)
me""age i" treated a" a "tream of (it"
output of cipher i" added to me""age
output i" then feed (ack /hence name feed(ack i" independent of me""age
can (e computed in ad)ance C
u"e"8 "tream encryption o)er noi"y channe%"
()C#%8e& (CTR)
a newE mode* though propo"ed ear%y on
"imi%ar to ,5 (ut encrypt" counter )a%ue rather than any feed(ack )a%ue
mu"t ha)e a different key G counter )a%ue for e)ery p%ainte>t (%ock /ne)er reu"ed
C u"e"8 high+"peed network encryption"
. E=:6"8 RSA 6#&"h5 "8 $e6" "h 68 e=65:e (M6@ 11 M6@ 12 Dec 1)
RSAi" one of the fir"t practica%pu(%ic+key crypto"y"tem"and i" wide%y u"ed for "ecure
data tran"mi""ion In "uch a crypto"y"tem* theencryption keyi" pu(%ic and differ" from
the decryption keywhich i" kept "ecret In S3* thi" a"ymmetry i" (a"ed on the practica%
difficu%ty of factoringthe product of two %argeprime num(er"* the factoring pro(%em
S3 i" made of the initia% %etter" of the "urname" ofon i)e"t*3di Shamir*
31
https://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Cryptosystemhttps://en.wikipedia.org/wiki/Encryption_keyhttps://en.wikipedia.org/wiki/Encryption_keyhttps://en.wikipedia.org/wiki/Decryption_keyhttps://en.wikipedia.org/wiki/Factorizationhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Factoring_problemhttps://en.wikipedia.org/wiki/Ron_Rivesthttps://en.wikipedia.org/wiki/Ron_Rivesthttps://en.wikipedia.org/wiki/Ron_Rivesthttps://en.wikipedia.org/wiki/Adi_Shamirhttps://en.wikipedia.org/wiki/Public-key_cryptographyhttps://en.wikipedia.org/wiki/Cryptosystemhttps://en.wikipedia.org/wiki/Encryption_keyhttps://en.wikipedia.org/wiki/Decryption_keyhttps://en.wikipedia.org/wiki/Factorizationhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Factoring_problemhttps://en.wikipedia.org/wiki/Ron_Rivesthttps://en.wikipedia.org/wiki/Adi_Shamir7/25/2019 VII SEM updates.doc
32/171
and'eonard 3d%eman* who fir"t pu(%ic%y de"cri(ed the a%gorithm in 1A77C%ifford
Cock"* an -ng%i"h mathematician working for the 4= inte%%igence agency $C!O* had
de)e%oped an e.ui)a%ent "y"tem in 1A7#* (ut it wa" notdec%a""ifiedunti% 1AA7
3 u"er of S3 create" and then pu(%i"he" a pu(%ic key (a"ed on two %argeprime num(er"*
a%ong with an au>i%iary )a%ue The prime num(er" mu"t (e kept "ecret 3nyone can u"e
the pu(%ic key to encrypt a me""age* (ut with current%y pu(%i"hed method"* if the pu(%ic
key i" %arge enough* on%y "omeone with know%edge of the prime num(er" can fea"i(%y
decode the me""age5reaking S3encryptioni" known a" theS3 pro(%emJwhether it i"
a" hard a" the factoring pro(%em remain" an open .ue"tion
S3 i" a re%ati)e%y "%ow a%gorithm* and (ecau"e of thi" it i" %e"" common%y u"ed to
direct%y encrypt u"er data More often* S3 pa""e" encrypted "hared key" for"ymmetric
keycryptography which in turn can perform (u%k encryption+decryption operation" at
much higher "peed
The S3 a%gorithm in)o%)e" four "tep"8 keygeneration* key di"tri(ution* encryption and
decryption
S3 in)o%)e" apublic keyand aprivate key.The pu(%ic key can (e known (y e)eryone
and i" u"ed for encrypting me""age" The intention i" that me""age" encrypted with the
pu(%ic key can on%y (e decrypted in a rea"ona(%e amount of time u"ing the pri)ate key
The (a"ic princip%e (ehind S3 i" the o("er)ation that it i" practica% to find three )ery
%arge po"iti)e integer" e*dand n"uch that with modu%ar e>ponentiationfor a%% m8
and that e)en knowing eand nor e)en mit can (e e>treme%y difficu%t to find d3dditiona%%y* for "ome operation" it i" con)enient that the order of the two
e>ponentiation" can (e changed and that thi" re%ation a%"o imp%ie"8
1. /e@ $"'&"%"#8
To ena(%e 5o(to "end hi" encrypted me""age"* 3%icetran"mit" her pu(%ic key /n* e to
5o( )ia a re%ia(%e* (ut not nece""ari%y "ecret route The pri)ate key i" ne)er di"tri(uted
2. E8c&@:"#8
Suppo"e that 5o( wou%d %ike to "end me""ageMto 3%ice !e fir"t turn"Minto an
integer m* "uch that 0 ` m_ nand gcd/m* n P 1 (y u"ing an agreed+upon re)er"i(%e
protoco% known a" apadding "cheme !e then compute" the cipher te>t c* u"ing 3%iceU"
pu(%ic key e* corre"ponding to Thi" can (e done efficient%y* e)en for ponentiation 5o( then tran"mit" cto 3%ice
3. Dec&@:"#8
32
https://en.wikipedia.org/wiki/Leonard_Adlemanhttps://en.wikipedia.org/wiki/Leonard_Adlemanhttps://en.wikipedia.org/wiki/Clifford_Cockshttps://en.wikipedia.org/wiki/Clifford_Cockshttps://en.wikipedia.org/wiki/Clifford_Cockshttps://en.wikipedia.org/wiki/Classified_informationhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Encryptionhttps://en.wikipedia.org/wiki/RSA_problemhttps://en.wikipedia.org/wiki/RSA_problemhttps://en.wikipedia.org/wiki/RSA_problemhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Key_(cryptography)https://en.wikipedia.org/wiki/Private_keyhttps://en.wikipedia.org/wiki/Modular_exponentiationhttps://en.wikipedia.org/wiki/Alice_and_Bobhttps://en.wikipedia.org/wiki/Alice_and_Bobhttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#Padding_schemeshttps://en.wikipedia.org/wiki/Leonard_Adlemanhttps://en.wikipedia.org/wiki/Clifford_Cockshttps://en.wikipedia.org/wiki/Clifford_Cockshttps://en.wikipedia.org/wiki/Classified_informationhttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/Encryptionhttps://en.wikipedia.org/wiki/RSA_problemhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Symmetric-key_algorithmhttps://en.wikipedia.org/wiki/Key_(cryptography)https://en.wikipedia.org/wiki/Private_keyhttps://en.wikipedia.org/wiki/Modular_exponentiationhttps://en.wikipedia.org/wiki/Alice_and_Bobhttps://en.wikipedia.org/wiki/Alice_and_Bobhttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#Padding_schemes7/25/2019 VII SEM updates.doc
33/171
3%ice can reco)er mfrom c(y u"ing her pri)ate key e>ponent d(y computing $i)en m*
"he can reco)er the origina% me""ageM(y re)er"ing the padding "cheme
. /e@ e8e&6"#8
The key" for the S3 a%gorithm are generated the fo%%owing way8
Choo"e two di"tinctprime num(er"pand q
or "ecurity purpo"e"* the integer"pand q"hou%d (e cho"en at random* and
"hou%d (e "imi%ar in magnitude (ut Udiffer in %ength (y a few digit"U V2Wto make
factoring harder :rime integer" can (e efficient%y found u"ing aprima%ity
te"t
Compute nPpq
ni" u"ed a" the modu%u"for (oth the pu(%ic and pri)ate key" It" %ength*
u"ua%%y e>pre""ed in (it"* i" the key %ength Compute(n) K (p)(q) K (p 1)(q 1) K n (p q 1)* where i"E%e&J'
#"e8 ;%8c"#8 Thi" )a%ue i" kept pri)ateChoo"e an integere"uch that1 e
(n) andc$(e (n)) K 1J ie*eand /n arec#:&"5e
1 Determineda"dbe1/mod /nJ ie*di" themodu%ar
mu%tip%icati)e in)er"eofe/modu%o /n
Thi" i" more c%ear%y "tated a"8 "o%)e fordgi)endeb 1 /mod /n
eha)ing a "hort(it+%engthand "ma%%!amming weightre"u%t" in more
efficient encryption ; mo"t common%y216R 1 P 6ponent
di" kept a" the pri)ate key e>ponent
Thepublic keycon"i"t" of the modu%u" nand the pu(%ic /or
encryption e>ponent e Theprivate keycon"i"t" of the
modu%u" nand the pri)ate /or decryption e>ponent d* which mu"t (e
kept "ecretp* q* and /n mu"t a%"o (e kept "ecret (ecau"e they can
(e u"ed to ca%cu%ate d
3n a%ternati)e* u"ed (y:=CS1* i" to choo"edmatchingdeb 1
/mod with P %cm/p 1*q 1* where %cm i" the%ea"t
33
https://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#cite_note-rsa-2https://en.wikipedia.org/wiki/RSA_(cryptosystem)#cite_note-rsa-2https://en.wikipedia.org/wiki/Primality_testhttps://en.wikipedia.org/wiki/Primality_testhttps://en.wikipedia.org/wiki/Modular_arithmetichttps://en.wikipedia.org/wiki/Modular_arithmetichttps://en.wikipedia.org/wiki/Key_lengthhttps://en.wikipedia.org/wiki/Euler's_totient_functionhttps://en.wikipedia.org/wiki/Euler's_totient_functionhttps://en.wikipedia.org/wiki/Greatest_common_divisorhttps://en.wikipedia.org/wiki/Greatest_common_divisorhttps://en.wikipedia.org/wiki/Coprimehttps://en.wikipedia.org/wiki/Coprimehttps://en.wikipedia.org/wiki/Modular_multiplicative_inversehttps://en.wikipedia.org/wiki/Modular_multiplicative_inversehttps://en.wikipedia.org/wiki/Bit-lengthhttps://en.wikipedia.org/wiki/Hamming_weighthttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#cite_note-Boneh-13https://en.wikipedia.org/wiki/PKCS1https://en.wikipedia.org/wiki/Least_common_multiplehttps://en.wikipedia.org/wiki/Prime_numberhttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#cite_note-rsa-2https://en.wikipedia.org/wiki/Primality_testhttps://en.wikipedia.org/wiki/Primality_testhttps://en.wikipedia.org/wiki/Modular_arithmetichttps://en.wikipedia.org/wiki/Key_lengthhttps://en.wikipedia.org/wiki/Euler's_totient_functionhttps://en.wikipedia.org/wiki/Euler's_totient_functionhttps://en.wikipedia.org/wiki/Greatest_common_divisorhttps://en.wikipedia.org/wiki/Coprimehttps://en.wikipedia.org/wiki/Modular_multiplicative_inversehttps://en.wikipedia.org/wiki/Modular_multiplicative_inversehttps://en.wikipedia.org/wiki/Bit-lengthhttps://en.wikipedia.org/wiki/Hamming_weighthttps://en.wikipedia.org/wiki/RSA_(cryptosystem)#cite_note-Boneh-13https://en.wikipedia.org/wiki/PKCS1https://en.wikipedia.org/wiki/Least_common_multiple7/25/2019 VII SEM updates.doc
34/171
common mu%tip%e 4"ing in"tead of /n a%%ow" more choice"
ford can a%"o (e defined u"ing theCarmichae% function* /n
Since any common factor" of /p 1 and /. 1 are pre"ent in the
factori"ation of p. 1*
V1&W
it i" recommended that /p 1 and /. 1ha)e on%y )ery "ma%% common factor"* if any (e"ide" the nece""ary 2
*. B&"e;@ e=:6"8 he "$e6 eh"8$ E":"c C%&e C&@:#'@'e5. (1,)
E":"c c%&e c&@:#&6:h@/ECC i" an approach topu(%ic+key cryptography(a"ed on
the a%ge(raic "tructureof e%%iptic cur)e"o)er finite fie%d" -CC re.uire" "ma%%er key"
compared to non+-CC cryptography /(a"ed on p%ain $a%oi" fie%d" to pro)ide e.ui)a%ent
"ecurity
-%%iptic cur)e" are app%ica(%e forencryption* digita% "ignature"*p"eudo+random
generator"and other ta"k" They are a%"o u"ed in "e)era% integer
factoriFationa%gorithm"that ha)e app%ication" in cryptography* "uch a" 'en"tra e%%iptic
cur)e factoriFation
:u(%ic+key cryptography i" (a"ed on theintracta(i%ityof certain mathematica%pro(%em"
-ar%y pu(%ic+key "y"tem" are "ecure a""uming that it i" difficu%t tofactora %arge integer
compo"ed of two or more %arge prime factor" or e%%iptic+cur)e+(a"ed protoco%"* it i"
a""umed that finding the di"crete %ogarithmof a random e%%iptic cur)e e%ement with
re"pect to a pu(%ic%y known (a"e point i" infea"i(%e8 thi" i" the Xe%%iptic cur)e di"crete
%ogarithm pro(%emX or -CD': The "ecurity of -CC depend" on the a(i%ity to compute
apoint mu%tip%icationand the ina(i%ity to compute the mu%tip%icand gi)en the origina% and
product point" The "iFe of the e%%iptic cur)e determine" the difficu%ty of the pro(%em
The primary (enefit promi"ed (y -CC i" a "ma%%er key "iFe* reducing "torage and
tran"mi""ion re.uirement"* ie that an e%%iptic cur)e group cou%d pro)ide the "ame %e)e%
of "ecurity afforded (y an S3+(a"ed "y"tem with a %arge modu%u" and corre"ponding%y
%arger key8 for e>amp%e* a 2change and -%%iptic Cur)e Digita% Signature 3%gorithm /-CDS3 for
digita% "ignature The 4SNationa% Security 3gency/NS3 a%%ow" their u"e for
protecting information c%a""ified up to top "ecretwith #?&+(it key"V1W!owe)er in 3ugu"t
201
7/25/2019 VII SEM updates.doc
35/171
hi%e the S3 patent e>pired in 2000* there may (epatent" in force co)ering certain
a"pect" of -CC techno%ogy* though "ome /inc%uding S3 'a(oratorie"V#Wand Danie%
5ern"teinV&W argue that the edera% e%%iptic cur)e digita% "ignature "tandard /-CDS3J
NIST I:S 1?6+# and certain practica% -CC+(a"ed key e>change "cheme" /inc%uding
-CD! can (e imp%emented without infringing them,. E=:6"8 /e@ 5686e5e8 "8 $e6". (1, 56&?)
/e@ M686e5e8
D"'&"%"#8 #; P%"c /e@'
P%"c-/e@ D"'&"%"#8 #; Sec&e ?e@'
D"'&"%"#8 #; P%"c /e@'
can (e con"idered a" u"ing one of8
:u(%ic announcement
:u(%ic%y a)ai%a(%e directory
:u(%ic+key authority :u(%ic+key certificate"
P%"c A88#%8ce5e8
4"er" di"tri(ute pu(%ic key" to recipient" or (roadca"t to community at %arge
eg append :$: key" to emai% me""age" or po"t to new" group" or emai% %i"t
maHor weakne"" i" forgery
anyone can create a key c%aiming to (e "omeone e%"e and (roadca"t it
unti% forgery i" di"co)ered can ma".uerade a" c%aimed u"er
P%"c@ A6"6e D"&ec#&@
Can o(tain greater "ecurity (y regi"tering key" with a pu(%ic directory
directory mu"t (e tru"ted with propertie"8
contain" Zname*pu(%ic+key[ entrie"
participant" regi"ter "ecure%y with directory
participant" can rep%ace key at any time
directory i" periodica%%y pu(%i"hed
directory can (e acce""ed e%ectronica%%y
"ti%% )u%nera(%e to tampering or forgeryP%"c-/e@ A%h#&"@
Impro)e "ecurity (y tightening contro% o)er di"tri(ution of key" from directory ha" propertie" of directory and re.uire" u"er" to know pu(%ic key for the directory then u"er" interact with directory to o(tain any de"ired pu(%ic key "ecure%y
35
https://en.wikipedia.org/wiki/ECC_patentshttps://en.wikipedia.org/wiki/ECC_patentshttps://en.wikipedia.org/wiki/RSA_(security_firm)https://en.wikipedia.org/wiki/RSA_(security_firm)https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-3https://en.wikipedia.org/wiki/Daniel_J._Bernsteinhttps://en.wikipedia.org/wiki/Daniel_J._Bernsteinhttps://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-4https://en.wikipedia.org/wiki/ECC_patentshttps://en.wikipedia.org/wiki/ECC_patentshttps://en.wikipedia.org/wiki/RSA_(security_firm)https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-3https://en.wikipedia.org/wiki/Daniel_J._Bernsteinhttps://en.wikipedia.org/wiki/Daniel_J._Bernsteinhttps://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-47/25/2019 VII SEM updates.doc
36/171
. E=:6"8 E":"c C%&e C&@:#&6:h@. (Dec12)
E":"c C%&e C&@:#&6:h@
MaHority of pu(%ic+key crypto /S3* D+! u"e either integer or po%ynomia% arithmetic
with )ery %arge num(er"po%ynomia%"
impo"e" a "ignificant %oad in "toring and proce""ing key" and me""age" an a%ternati)e i"
to u"e e%%iptic cur)e"
offer" "ame "ecurity with "ma%%er (it "iFe"
Re6 E":"c C%&e'
3n e%%iptic cur)e i" defined (y an e.uation in two )aria(%e" > G y* with coefficient"
con"ider a cu(ic e%%iptic cur)e of form o y
2
P x
#
R ax R bwhere >*y*a*( are a%% rea%num(er"
a%"o define Fero point ,
ha)e addition operation for e%%iptic cur)e
geometrica%%y "um of OR i" ref%ection of inter"ection
F"8"e E":"c C%&e'
o -%%iptic cur)e cryptography u"e" cur)e" who"e )aria(%e" G coefficient" are finite
ha)e two fami%ie" common%y u"ed8o prime cur)e" -p/a*( defined o)er p
o u"e integer" modu%o a prime
o (e"t in "oftware
o (inary cur)e" -2m/a*( defined o)er $/2n
o u"e po%ynomia%" with (inary coefficient"
o (e"t in hardware
E":"c C%&e C&@:#&6:h@
o -CC addition i" ana%og of modu%o mu%tip%y
o -CC repeated addition i" ana%og of modu%o e>ponentiation o need hardE pro(%em e.ui)to di"crete %og
o OPk:* where O*: (e%ong to a prime cur)e o i" ea"yE to compute O gi)en k*:
o (ut hardE to find k gi)en O*:
o known a" the e%%iptic cur)e %ogarithm pro(%em o Certicom e>amp%e8 -2#/A*17
ECC D";;"e-He568
36
7/25/2019 VII SEM updates.doc
37/171
o can do key e>change ana%ogou" to D+! o u"er" "e%ect a "uita(%e cur)e -p/a*(
o "e%ect (a"e point $P/>1*y1 with %arge order n "t n$P, o 3 G 5 "e%ect pri)ate key"
n3_n* n5_n
o compute pu(%ic key"8 :3Pn3$* :5Pn5$ o compute "hared key8 =Pn3:5* =Pn5:3
o "ame "ince =Pn3n5$
ECC E8c&@:"#8>Dec&@:"#8
o "e)era% a%ternati)e"* wi%% con"ider "imp%e"t
mu"t fir"t encode any me""age M a" a point on the e%%iptic cur)e :m
"e%ect "uita(%e cur)e G point $ a" in D+! o each u"er choo"e" pri)ate key n3_n
o and compute" pu(%ic key :3Pn3$
o to encrypt :m8 CmPZk$* :mRk :([* k random o decrypt Cmcompute8
o :mRk:(;n5/kG P :mRk/n5G;n5/kG P :m
ECC Sec%&"@
o re%ie" on e%%iptic cur)e %ogarithm pro(%em
o fa"te"t method i" :o%%ard rho methodE
o compared to factoring* can u"e much "ma%%er key "iFe" than with S3 etc
o for e.ui)a%ent key %ength" computation" are rough%y e.ui)a%ent
o
hence for "imi%ar "ecurity -CC offer" "ignificant computationa% ad)antage"o doe" re.uire rea%+time acce"" to directory when key" are needed
P%"c-/e@ Ce&";"c6e'
Certificate" a%%ow key e>change without rea%+time acce"" to pu(%ic+key authority
a certificate (ind" identity to pu(%ic key
u"ua%%y with other info "uch a" period of )a%idity* right" of u"e etc with a%% content"
"igned (y a tru"ted :u(%ic+=ey or Certificate 3uthority /C3
can (e )erified (y anyone who know" the pu(%ic+key authoritie" pu(%ic+key
P%"c-/e@ D"'&"%"#8 #; Sec&e /e@'
u"e pre)iou" method" to o(tain pu(%ic+ke
can u"e for "ecrecy or authentication
(ut pu(%ic+key a%gorithm" are "%ow
37
7/25/2019 VII SEM updates.doc
38/171
"o u"ua%%y want to u"e pri)ate+key encryption to protect me""age content"
hence need a "e""ion key
ha)e "e)era% a%ternati)e" for negotiating a "uita(%e "e""ion
S"5:e Sec&e /e@ D"'&"%"#8
:ropo"ed (y Merk%e in 1A7A 3 generate" a new temporary pu(%ic key pair
3 "end" 5 the pu(%ic key and their identity
5 generate" a "e""ion key = "end" it to 3 encrypted u"ing the "upp%ied pu(%ic key
3 decrypt" the "e""ion key and (oth u"e
pro(%em i" that an opponent can intercept and imper"onate (oth ha%)e" of protoco%
. E=:6"8 A$68ce$ E8c&@:"#8 S68$6&$
A$68ce$ E8c&@:"#8 S68$6&$ (AES) E6%6"#8 C&"e&"6
AES Rei(i%ity /in endecrypt* keying* other factor"AES C":he& - R"Qe8$6e
De"igned (y iHmen+Daemen in 5e%gium ha" 12?1A22
7/25/2019 VII SEM updates.doc
39/171
operate" an entire (%ock in e)ery round de"igned to (e8
re"i"tant again"t known attack"
o "peed and code compactne"" on many C:4"
o de"ign "imp%icity:roce""e" data a" & group" of & (yte" /"tate ha" A111# round" in which "tate
undergoe"8
o (yte "u("titution /1 S+(o> u"ed on e)ery (yte
o "hift row" /permute (yte" (etween group"co%umn"
o mi> co%umn" /"u(" u"ing matri> mu%tipy of group"
o add round key /@, "tate with key materia%
initia% @, key materia% G incomp%ete %a"t round a%% operation" can (e com(ined into
@, and ta(%e %ookup" + hence )ery fa"t G efficient
+. B&"e;@ e=:6"8 &":e DES.
T&":e DES
C%ear a rep%acement for D-S wa" needed theoretica% attack" that can (reak it
demon"trated e>hau"ti)e key "earch attack" 3-S i" a new cipher a%ternati)e prior to thi"
a%ternati)e wa" to u"e mu%tip%e encryption with D-S imp%ementation"
h@ T&":e-DES
hy not Dou(%e+D-S
N,T "ame a" "ome other "ing%e+D-S u"e* (ut ha)e o meet+in+the+midd%e attack
work" whene)er u"e a cipher twice
"ince @ P -=1V:W P D=2VCW
attack (y encrypting : with a%% key" and "tore
then decrypt C with key" and match @ )a%ue
can "how take" ,/2
7/25/2019 VII SEM updates.doc
40/171
T&":e-DES "h Th&ee-/e@'
3%though are no practica% attack" on two+key Trip%e+D-S ha)e "ome indication"
can u"e Trip%e+D-S with Three+=ey" to a)oid e)en the"e C P -=#VD=2V-=1V:WWW
ha" (een adopted (y "ome Internet app%ication"* eg :$:* SMIM-
10. E=:6"8 B# F"'h A#&"h5.
B#;"'h E8c&@:"#8 A#&"h5
5%owfi"h wa" de"igned in 1AA# (y 5ruce Scheier a" a fa"t* a%ternati)e to e>i"ting
encryption a%gorithm" "uch 3-S* D-S and # D-S etc
5%owfi"h i" a "ymmetric (%ock encryption a%gorithm de"igned in con"ideration with*
Fast:It encrypt" data on %arge #2+(it microproce""or" at a rate of 26 c%ock cyc%e"
per (yte
Compact:It can run in %e"" than
7/25/2019 VII SEM updates.doc
41/171
The Fe"'e '&%c%&e #; B#;"'h
De'c&":"#8 #; A#&"h5
5%owfi"h "ymmetric (%ock cipher a%gorithm encrypt" (%ock data of 6&+(it" at a time It
wi%% fo%%ow" the fei"te% network and thi" a%gorithm i" di)ided into two part"
1 =ey+e>pan"ion
2 Data -ncryption
/e@-e=:68'"#88
It wi%% con)ert a key of at mo"t &&? (it" into "e)era% "u( key array" tota%ing &16?
(yte" 5%owfi"h u"e" %arge num(er of "u( key"
The"e key" are generating ear%ier to any data encryption or decryption
The p+array con"i"t" of 1?* #2+(it "u(key"8
:1* :2^ :1?
our #2+(it S+5o>e" con"i"t of 2
7/25/2019 VII SEM updates.doc
42/171
S#* 0* S#* 1^ S#* 2e"* in order* with a fi>ed "tring
Thi" "tring con"i"t" of the he>adecima% digit" of pi /%e"" the initia% #8 :1 P 0>2f6a??*
:2 P 0>?1#1A?a2e* :& P 0>0#707#&&* etc
2 @, :1 with the fir"t #2 (it" of the key* @, :2 with the "econd #2+(it" of the key*
and "o on for a%% (it" of the key /po""i(%y up to :1& epeated%y cyc%e through the key
(it" unti% the entire :+array ha" (een @,ed with key (it" /or e)ery "hort key* there i"
at %ea"t one e.ui)a%ent %onger keyJ for e>amp%e* if 3 i" a 6&+(it key* then 33* 333* etc*
are e.ui)a%ent key"
# -ncrypt the a%%+Fero "tring with the 5%owfi"h a%gorithm* u"ing the "u( key"
de"cri(ed in "tep" /1 and /2
& ep%ace :1 and :2 with the output of "tep /#
t wou%d (e u"ed for authentication
42
7/25/2019 VII SEM updates.doc
43/171
Me''6e A%he8"c6"#8 C#$eIt i" a function of me""age and "ecret key produce a
fi>ed %ength )a%ue
H6'h ;%8c"#8Some function that map a me""age of any %ength to fi>ed %ength which
"er)e" a" authentication
3. h6 6&e he &e
7/25/2019 VII SEM updates.doc
44/171
MACIn Me""age 3uthentication Code* the "ecret key "hared (y "ender and recei)er
The M3C i" appended to the me""age at the "ource at a time which the me""age i"
a""umed or known to (e correct
H6'h F%8c"#8The ha"h )a%ue i" appended to the me""age at the "ource at time when
the me""age i" a""umed or known to (e correct The ha"h function it"e%f not con"idered to(e "ecret
,. A8@ h&ee h6'h 6#&"h5.
MD< /Me""age Dige"t )er"ion ed %ength )a%ue ca%%ed a" M3C M3C P Ck/M here M P )aria(%e %engthme""age = P "ecret key "hared (y "ender and recei)er C=/M P fi>ed %ength
authenticator
+. D";;e&e8"6e "8e&86 68$ e=e&86 e&& c#8.
I8e&86 e&& c#8In interna% error contro%* an error detecting code a%"o known a"
frame check "e.uence or check"um
E=e&86 e&& c#8 In e>terna% error contro%* error detecting code" are appended
after encryption
10. h6 "' 5e68 @ 5ee "8 he 5"$$e 66c?
Thi" i" the cryptana%ytic attack that attempt" to find the )a%ue in each of the range and
domain of the compo"ition of two function" "uch that the forward mapping of one
through the fir"t function i" the "ame a" the in)er"e image of the other through the "econd
function+.uite %itera%%y meeting in the midd%e of the compo"ed function
44
7/25/2019 VII SEM updates.doc
45/171
11. h6 "' he e #; c#5:&e''"#8 ;%8c"#8 "8 h6'h ;%8c"#8
The ha"h a%gorithm in)o%)e" repeated u"e of a compre""ion function f* that take" two
input" and produce a n+(it output 3t the "tart of ha"hing the chaining )aria(%e ha" an
initia% )a%ue that i" "pecified a" part of the a%gorithm The fina% )a%ue of the chaining
)aria(%e i" the ha"h )a%ue u"ua%%y (nJ hence the term compre""ion
12. h6 "' he $";;e&e8ce eee8 e6? 68$ ' c#"'"#8 &e'"'68ce
e6? c#"'"#8 &e'"'68ce S &e'"'68ce c#"'"#8
or any gi)en (%ock >* it i"
computationa%%y infea"i(%e to fine y>
wit !/yP!/>
It i" computationa%%y infea"i(%e to
find any pair />*y "uch that
!/>P!/y
It i" proportiona% to 2n It i" proportiona% to 2 n2
13. C#5:6&e MD* SHA1 68$ RIPEMD-1,0 6#&"h5. (Dec 13)
3%gorithm" MD< S!3+1 I:-MD160
Dige"t %ength 12? (it" 12? (it" 160 (it"
5a"ic unit of
proce""ing
7/25/2019 VII SEM updates.doc
46/171
on%y the communicating partie" ro%e in thi" digita% "ignature
2Thi" may (e formed (y encrypting the
entire me""age with the "ender9" pri)ate
key
-)ery "igned me""age from a "ender >
to a recei)er y goe" fir"t to an ar(iter 3*
who "u(Hect" the me""age and it"
"ignature to a num(er of te"t" to checkit" origin and content
1*. h6 6&e he ::e&"e' 6 $""6 '"86%&e 'h#%$ h6e
It mu"t )erify the author and the data and time of "ignature
It mu"t authenticate the content" at the time of "ignature
It mu"t (e )erifia(%e (y third partie" to re"o%)e di"pute"
1,. h6 &ee" "ecurity deficiencie" ofC5C+M3C/C5C+M3C i"
"ecure on%y for fi>ed+%ength me""age"
1. De;"8e HMAC
!a"h+(a"ed Me""age 3uthentication Code /!M3C i" a me""age authentication
code that u"e" acryptographic keyin conHunction with aha"h function !M3C
pro)ide" the"er)erand thec%ienteach with a pu(%ic and pri)ate key Thepu(%ic
keyi" known* (ut thepri)ate keyi" known on%y to that "pecific "er)er and that
"pecific c%ient The c%ient create" a uni.ue !M3C* or ha"h* per re.ue"t to the
"er)er (y com(ing the re.ue"t data and ha"hing that data* a%ong with a pri)ate key
and "ending it a" part of a re.ue"t The "er)er recei)e" the re.ue"t and regenerate"
46
https://en.wikipedia.org/wiki/Cryptographyhttps://en.wikipedia.org/wiki/CMAC#endnote_SP800-38Bhttps://en.wikipedia.org/wiki/Block_cipherhttps://en.wikipedia.org/wiki/Message_authentication_codehttps://en.wikipedia.org/wiki/Block_cipher_modes_of_operationhttps://en.wikipedia.org/wiki/CBC-MAChttp://searchsecurity.techtarget.com/definition/keyhttp://searchsqlserver.techtarget.com/definition/hashinghttp://whatis.techtarget.com/definition/serverhttp://searchenterprisedesktop.techtarget.com/definition/clienthttp://searchsecurity.techtarget.com/definition/public-keyhttp://searchsecurity.techtarget.com/definition/public-keyhttp://searchsecurity.techtarget.com/definition/private-keyhttps://en.wikipedia.org/wiki/Cryptographyhttps://en.wikipedia.org/wiki/CMAC#endnote_SP800-38Bhttps://en.wikipedia.org/wiki/Block_cipherhttps://en.wikipedia.org/wiki/Message_authentication_codehttps://en.wikipedia.org/wiki/Block_cipher_modes_of_operationhttps://en.wikipedia.org/wiki/CBC-MAChttp://searchsecurity.techtarget.com/definition/keyhttp://searchsqlserver.techtarget.com/definition/hashinghttp://whatis.techtarget.com/definition/serverhttp://searchenterprisedesktop.techtarget.com/definition/clienthttp://searchsecurity.techtarget.com/definition/public-keyhttp://searchsecurity.techtarget.com/definition/public-keyhttp://searchsecurity.techtarget.com/definition/private-key7/25/2019 VII SEM updates.doc
47/171
it" own uni.ue !M3C The "er)er compare" the two !M3C"* and* if theyUre
e.ua%* the c%ient i" tru"ted and the re.ue"t i" e>ecuted Thi" proce"" i" often ca%%ed
a 'ec&eh68$'h6?e.
1+. h6 "' $""6 '"86%&e (M6@ 1*)
3 digita% "ignature i" a mathematica% techni.ue u"ed to )a%idate the authenticity
and integrity of a me""age* "oftware or digita% document/Digita% "ignature" can
pro)ide the added a""urance" of e)idence to origin* identity and "tatu" of an
e%ectronic document* tran"action or me""age* a" we%% a" acknow%edging informed
con"ent (y the "igner
20. G"e E656 D""6 S"86%&e Sche5e. (M6@ 13)
TheEG656 '"86%&e 'che5ei" adigita% "ignature"cheme which i" (a"ed on
the difficu%ty of computingdi"crete %ogarithm" It wa" de"cri(ed (yTaher
-%$ama%in 1A?& The -%$ama% "ignature "cheme a%%ow" a third+party to confirm
the authenticity of a me""age "ent o)er an in"ecure channe%
PART-B
1. E=:6"8 he c6''";"c6"#8 #; 6%he8"c6"#8 ;%8c"#8 "8 $e6". (M6@ 11)
me""age authentication i" concerned with8
o protecting the integrity of a me""age
o )a%idating identity of originator
o non+repudiation of origin /di"pute re"o%ution
e%ectronic e.ui)a%ent of a "ignature on a me""age
an6%he8"c6#&*'"86%&e* or5e''6e 6%he8"c6"#8 c#$e (MAC)i" "enta%ong with the me""age
the M3C i" generated )ia "ome a%gorithm which depend" on (oth the me""age
and "ome /pu(%ic or pri)ate key known on%y to the "ender and recei)er
the me""age may (e of any %ength
the M3C may (e of any %ength* (ut more often i" "ome fi>ed "iFe* re.uiring theu"e of "omeh6'h ;%8c"#8to conden"e the me""age to the re.uired "iFe if thi" i"not achie)ed (y the authentication "cheme
need to con"ider rep%ay pro(%em" with me""age and M3C
o re.uire a me""age "e.uence num(er* time"tamp or negotiated random
)a%ue"
47
http://searchnetworking.techtarget.com/definition/handshakinghttp://searchnetworking.techtarget.com/definition/handshakinghttps://en.wikipedia.org/wiki/Digital_signaturehttps://en.wikipedia.org/wiki/Discrete_logarithmhttps://en.wikipedia.org/wiki/Taher_ElGamalhttps://en.wikipedia.org/wiki/Taher_ElGamalhttp://searchnetworking.techtarget.com/definition/handshakinghttps://en.wikipedia.org/wiki/Digital_signaturehttps://en.wikipedia.org/wiki/Discrete_logarithmhttps://en.wikipedia.org/wiki/Taher_ElGamalhttps://en.wikipedia.org/wiki/Taher_ElGamal7/25/2019 VII SEM updates.doc
48/171
Fig: Authentication using Private-key Ciphers if a me""age i" (eing encrypted u"ing a "e""ion key known on%y to the "ender and
recei)er* then the me""age may a%"o (e authenticatedo "ince on%y "ender or recei)er cou%d ha)e created it
o any interference wi%% corrupt the me""age /pro)ided it inc%ude" "ufficient
redundancy to detect change
o (ut thi" doe" not pro)ide non+repudiation "ince it i" impo""i(%e to pro)e
who created the me""age
me""age authentication may a%"o (e done u"ing the "tandard mode" of u"e of a
(%ock cipher
o "ometime" do not want to "end encrypted me""age"
o can u"e either C5C or C5 mode" and "end fina% (%ock* "ince thi" wi%%
depend on a%% pre)iou" (it" of the me""age
o no ha"h function i" re.uired* "ince thi" method accept" ar(itrary %ength
input and produce" a fi>ed output
o u"ua%%y u"e a fi>ed known IB
o thi" i" the approached u"ed in 3u"tra%ian -T "tandard" 3S?20ed+
%ength ha"h )a%ue* which "er)e" a" the authenticator
. E=:6"8 HMAC
Specified a" Internet "tandard C210&
u"e" ha"h function on the me""age8 !M3C=P !a"hV/=R@, opad jj
!a"hV/=R@, ipadjjMWW where =Ri" the key padded out to "iFeand opad* ipad
are "pecified padding con"tant"
o)erhead i" Hu"t # more ha"h ca%cu%ation" than the me""age need" a%one any of
MD
7/25/2019 VII SEM updates.doc
56/171
e%ia(%e
Tran"parent
Sca%a(%e
. I8 he c#8e8 #; /e&e' h6 "' &e65
3 fu%% "er)ice =er(ero" en)ironment con"i"ting of a =er(ero" "er)er* a no of c%ient"*
noof app%ication "er)er re.uire" the fo%%owing8 The =er(ero" "er)er mu"t ha)e u"er ID
and ha"hed pa""word of a%% participating u"er" in it" data(a"e The =er(ero" "er)er mu"t
"hare a "ecret key with each "er)er Such an en)ironment i" referred to a" ea%mE
*. h6 "' he :%&:#'e #; 4.*0+ '68$6&$ (Dec 1)
@
7/25/2019 VII SEM updates.doc
57/171
10. L"' he "5"6"#8' #; SMTP>RFC 22
1 SMT: cannot tran"mit e>ecuta(%e fi%e" or (inary o(Hect"
2 It cannot tran"mit te>t data containing nationa% %anguage character"
# SMT: "er)er" may reHect mai% me""age o)er certain "iFe]
& SMT: gateway" cau"e pro(%em" whi%e tran"mitting 3SCII and -5CDIC
ten"ion/SMIM- i" a "ecurity enhancement to the
MIM- Internet -+mai% format "tandard* (a"ed on techno%ogy from S3 Data Security
12. h6 "' 6 ;"&e6
3;"&e6i" a network "ecurity "y"tem de"igned to pre)ent unauthoriFed acce"" to or
from a pri)ate networkF"&e6'can (e imp%emented in (oth hardware and "oftware* or
a com(ination of (oth
3 firewa%% i" a "ing%e de)ice u"ed to enforce "ecurity po%icie" within a network or (etweennetwork" (y contro%%ing traffic f%ow"
The irewa%% Ser)ice" Modu%e /SM i" a )ery capa(%e de)ice that can (e u"ed to
enforce tho"e "ecurity po%icie" The SM wa" de)e%oped a" a modu%e or (%ade thatre"ide" in either a Cata%y"t 6y irewa%%"
!o"t 5a"ed firewa%%"
:er"ona% firewa%%"
Di"tri(uted irewa%%"
Circuit %e)e% firewa%%
3pp%ication pro>y firewa%%
1. h6 6&e "5"6"#8' #; ;"&e6'
cannot protect from attack" (ypa""ing it ; eg "neaker net* uti%ity modem"* tru"ted
organiFation"* tru"ted "er)ice" /eg SS'SS!
cannot protect again"t interna% threat" ; eg di"grunt%ed or co%%uding emp%oyee"
57
7/25/2019 VII SEM updates.doc
58/171
cannot protect again"t acce"" )ia '3N ; if improper%y "ecured again"t e>terna%
u"e
Cannot protect again"t ma%ware imported )ia %aptop* :D3* "torage infected out"ide
1*. h6 "' 68 "8&%$e&
3n Intruder i" a per"on who attempt" to gain unauthoriFed acce"" to a "y"tem* to damagethat "y"tem* or to di"tur( data on that "y"tem In "ummary* thi" per"on attempt" to
)io%ateSecurity(y interfering with "y"tem Availability* dataIntegrityor data
Confidentia%ity
1,. h6 "' IDS
3n"8&%'"#8 $eec"#8 '@'e5/IDS i" a de)ice or"oftware app%icationthat monitor"
network or "y"tem acti)itie" for ma%iciou" acti)itie" or po%icy )io%ation" and produce"
e%ectronic report" to a management "tation
17. What are the types of I!"
#et$or% &ase' I!(ost &ase' I!Intru"ion detection and pre)ention "y"tem" /ID:S
18. e)*e vir+s
3c#5:%e& "&%'i" ama%warethat* when e>ecuted*rep%icate"(y reproducing it"e%f or
infecting otherprogram"(y modifying themV1WInfecting computer program" can inc%ude
a" we%%* datafi%e"* or the(oot "ectorof thehard dri)e hen thi" rep%ication "ucceed"*
the affected area" are then "aid to (e XinfectedX
19. i,ere*tiate vir+s- $or a*' /roa* horse
I! W /A# (orse
3c#5:%e& "&%'i"
ama%warethat* when
e>ecuted*rep%icate"(y
reproducing it"e%f or
infectingotherprogram"(y
modifying them
It u"e" acomputer
networkto "pread
i"e%f4n%ike acomputer
)iru"* it doe" not need to
attach it"e%f to an e>i"tingprogram orm" a%mo"t
a%way" cau"e at %ea"t "ome
harm to the network* e)en
if on%y (y
con"uming(andwidth
The TroHan !or"e* at
fir"t g%ance wi%%
appear to (e
u"efu%"oftware(ut
wi%% actua%%y dodamage once
in"ta%%ed or run on
your computer
58
http://hitachi-id.com/concepts/security.htmlhttp://hitachi-id.com/concepts/integrity.htmlhttp://hitachi-id.com/concepts/confidentiality.htmlhttps://en.wikipedia.org/wiki/Software_applicationhttps://en.wikipedia.org/wiki/Malwarehttps://en.wikipedia.org/wiki/Quine_(computing)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_virus#cite_note-Stallings_2012_p.182-1https://en.wikipedia.org/wiki/Computer_filehttps://en.wikipedia.org/wiki/Boot_sectorhttps://en.wikipedia.org/wiki/Hard_disk_drivehttps://en.wikipedia.org/wiki/Malwarehttps://en.wikipedia.org/wiki/Quine_(computing)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Computer_virushttps://en.wikipedia.org/wiki/Computer_virushttps://en.wikipedia.org/wiki/Bandwidth_(computing)http://www.webopedia.com/TERM/S/software.htmlhttp://hitachi-id.com/concepts/security.htmlhttp://hitachi-id.com/concepts/integrity.htmlhttp://hitachi-id.com/concepts/confidentiality.htmlhttps://en.wikipedia.org/wiki/Software_applicationhttps://en.wikipedia.org/wiki/Malwarehttps://en.wikipedia.org/wiki/Quine_(computing)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_virus#cite_note-Stallings_2012_p.182-1https://en.wikipedia.org/wiki/Computer_filehttps://en.wikipedia.org/wiki/Boot_sectorhttps://en.wikipedia.org/wiki/Hard_disk_drivehttps://en.wikipedia.org/wiki/Malwarehttps://en.wikipedia.org/wiki/Quine_(computing)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Computer_virushttps://en.wikipedia.org/wiki/Computer_virushttps://en.wikipedia.org/wiki/Bandwidth_(computing)http://www.webopedia.com/TERM/S/software.html7/25/2019 VII SEM updates.doc
59/171
20. e)*e $ors.
3c#5:%e& #&5i" a "tanda%onema%warecomputer programthat rep%icate" it"e%f in
order to "pread to other computer" ,ften* it u"e" acomputer network
to "pread it"e%f*
re%ying on "ecurity fai%ure" on the target computer to acce"" it 4n%ike acomputer )iru"*it
doe" not need to attach it"e%f to an e>i"ting program orm" a%mo"t a%way" cau"e at %ea"t
"ome harm to the network* e)en if on%y (y con"uming(andwidth* wherea" )iru"e" a%mo"t
a%way" corrupt or modify fi%e" on a targeted computer
PART B (1, 56&?')
1. plai* erberos i* 'etail.
/e&e'
tru"ted key "er)er "y"tem from MIT pro)ide" centra%i"ed pri)ate+key third+party authentication in a di"tri(uted network
o a%%ow" u"er" acce"" to "er)ice" di"tri(uted through network
o without needing to tru"t a%% work"tation"
o rather a%% tru"t a centra% authentication "er)er two )er"ion" in u"e8 & G amine each I: packet /no conte>t and permit or deny according to ru%e"o hence re"trict
acce"" to "er)ice" /port"
o po""i(%e defau%t po%icie" that not e>pre""%y permitted i" prohi(ited that not e>pre""%y prohi(ited i" permitted
A6c?' #8 P6c?e F"e&'
o I: addre"" "poofing fake "ource addre"" to (e tru"ted add fi%ter" on router to (%ock
o "ource routing attack" attacker "et" a route other than defau%t (%ock "ource routed packet"
o tiny fragment attack" "p%it header info o)er "e)era% tiny packet" either di"card or rea""em(%e (efore check
F"&e6' 9 S6e;% P6c?e F"e&'
o e>amine each I: packet in conte>t
keep" track" of c%ient+"er)er "e""ion"
check" each packet )a%id%y (e%ong" to one o (etter a(%e to detect (ogu" packet" out of conte>t
*. E=:6"8 R#e' #; F"&e6'.
64
7/25/2019 VII SEM updates.doc
65/171
3 firewa%% i" a term u"ed for a LL(arrierUU (etween a network of machine" and u"er" that operate
under a common "ecurity po%icy and genera%%y tru"t each other* and the out"ide wor%d In recent
year"* firewa%%" ha)e (ecome enormou"%y popu%ar on the Internet In %arge part* thi" i" due to the
fact that mo"t e>i"ting operating "y"tem" ha)e e""entia%%y no "ecurity* and were de"igned under
the a""umption that machine" and u"er" wou%d tru"t each other
There are two (a"ic rea"on" for u"ing a firewa%% at pre"ent8 to "a)e money in concentrating your
"ecurity on a "ma%% num(er of component"* and to "imp%ify the architecture of a "y"tem (y
re"tricting acce"" on%y to machine" that tru"t each other irewa%%" are often regarded a" "ome a"
an irritation (ecau"e they are often regarded a" an impediment to acce""ing re"ource" Thi" i"
not a fundamenta% f%aw of firewa%%"* (ut rather i" the re"u%t of fai%ing to keep up with demand"
to impro)e the firewa%%
There i" a fair%y %arge group of determined and capa(%e indi)idua%" around the wor%d who take
p%ea"ure in (reaking into "y"tem" ,ther than the "en"e of in"ecurity that it ha" in"ti%%ed in
"ociety* the amount of actua% damage that ha" (een cau"ed i" re%ati)e%y "%ight It high%ight" the
fact that e""entia%%y any "y"tem can (e compromi"ed if an ad)er"ary i" determined enough It i"
a tried and true method to impro)e "ecurity within D,D proHect" to ha)e a LL(%ack hatUU
organiFation that attempt" to (reak into "y"tem" rather than ha)e them found (y your rea%
ad)er"arie" 5y (ringing the )u%nera(i%itie" of "y"tem" to the forefront* the Internet hacker"
ha)e e""entia%%y pro)ided thi" "er)ice* and an impetu" to impro)e e>i"ting "y"tem" It i"
pro(a(%y a "tretch to "ay that we "hou%d thank them* (ut I (e%ie)e that it i" (etter to rai"e the"e
i""ue" ear%y rather than %ater when our "ociety wi%% (e a%mo"t 100 dependent on information
"y"tem"
,. plai* types of )re$alls.Type" of irewa%%" The firewa%%" can (e (road%y categoriFed into the fo%%owing three type"8 :acket i%ter" 3pp%ication+%e)e% $ateway" Circuit+%e)e% $ateway"P6c?e F"e&':acket fi%tering router app%ie" a "et of ru%e" to each incoming I: packet and
then forward" or di"card" it :acket fi%ter i" typica%%y "et up a" a %i"t of ru%e" (a"ed on matche"
of fie%d" in the I: or TC: header 3n e>amp%e ta(%e of te%net fi%ter" ru%e" The packet fi%ter
operate" with po"iti)e fi%ter ru%e" It i" nece""ary to "pecify what "hou%d (e permitted* and
e)erything that i" e>p%icit%y not permitted i" automatica%%y for(idden 3 ta(%e of packet fi%ter
ru%e" for te%net app%icationA::"c6"#8-ee G6e6@3pp%ication %e)e% gateway* a%"o ca%%ed a :ro>y Ser)er act" a" a
re%ay of app%ication %e)e% traffic 4"er" contact gateway" u"ing an app%ication and the re.ue"t i"
"ucce""fu% after authentication The app%ication gateway i" "er)ice "pecific "uch a" T:*
T-'N-T* SMT: or !TT:C"&c%" Lee G6e6@Circuit+%e)e% gateway can (e a "tanda%one or a "pecia%iFed "y"tem It
doe" not a%%ow end+to+end TC: connectionJ the gateway "et" up two TC: connection" ,nce the
65
7/25/2019 VII SEM updates.doc
66/171
TC: connection" are e"ta(%i"hed* the gateway re%ay" TC: "egment" from one connection to the
other without e>amining the content" The "ecurity function determine" which connection" wi%%
(e a%%owed and which are to (e di"a%%owed
. E=:6"8 @:e' #; 'ec%&e '@'e5.
T@:e' #; Sec%&e C#5:%"8 S@'e5'
Dedicated /Sing%e+'e)e% Sy"tem"
o hand%e" "u(Hect" and o(Hect" with "ame c%a""ification
o re%ie" on other "ecurity procedure" /eg phy"ica%
Sy"tem+!igh
o on%y pro)ide" need+to+know protection (etween u"er"
o entire "y"tem operate" at highe"t c%a""ification %e)e%
o a%% u"er" mu"t (e c%eared for that %e)e% of information
Compartmented
o )araition of Sy"tem+!igh which can proce"" two or more type" of compartmented
information
o not a%% u"er" are c%eared for a%% compartment"* (ut a%% mu"t (e c%eared to the highe"t %e)e% of
information proce""ed
Mu%ti+'e)e% Sy"tem"
o i" )a%idated for hand%ing "u(Hect" and o(Hect" with different right" and %e)e%" of "ecurity
"imu%taneou"%y
o maHor feature" of "uch "y"tem" inc%ude8
u"er identification and authentication
re"ource acce"" contro% and o(Hect %a(e%ing
audit trai%" of a%% "ecurity re%e)ant e)ent"
e>terna% )a%idation of the "y"tem" "ecurity
. E=:6"8 6c"e ;"&e6 ee5e8'.
The "tructure of an acti)e firewa%% e%ement* which i" integrated in the communication interface
(etween the in"ecure pu(%ic network and the pri)ate network To pro)ide nece""ary "ecurity
"er)ice"* fo%%owing component" are re.uired8I8e&6"#8 M#$%eIt integrate" the acti)e firewa%% e%ement into the communication "y"tem
with the he%p of de)ice dri)er" In ca"e of packet fi%ter"* the integration i" a(o)e the Network3cce"" 'ayer* where a" it are a(o)e the Tran"port %ayer port" in ca"e of 3pp%ication $ateway
A86@'"' M#$%e8 5a"ed on the capa(i%itie" of the firewa%%* the communication data i" ana%y"e"
in the 3na%y"i" Modu%e The re"u%t" of the ana%y"i" are pa""ed on to the Deci"ion Modu%eDec"'"#8 M#$%eThe Deci"ion Modu%e e)a%uate" and compare" the re"u%t" of the ana%y"i"
with the "ecurity po%icy definition" "tored in the u%e "et and the communication data i"
a%%owed or pre)ented (a"ed the outcome of the compari"on
66
7/25/2019 VII SEM updates.doc
67/171
Pce''"8 5#$%e ;#& Sec%&"@ &e6e$ Ee8'5a"ed on ru%e "et* configuration "etting" and
the me""age recei)ed from the deci"ion modu%e* it write" on the %og(ook and generate" a%arm
me""age to the Security Management Sy"temA%he8"c6"#8 M#$%eThi" modu%e i" re"pon"i(%e for the identification and authentication of