CS8792 CNS Unit 1 - R1
CS8792 CNS Unit 1 - R1
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
CS8792-CRYPTOGRAPHY
AND NETWORK
SECURITY
Unit-I
Department : Computer Science and Engineering
Batch/Year : 2020-2024 / IV
Date : 07.08.2023
Table of Contents
PAGE
S NO CONTENTS
NUMBER
1 Course Objectives 6
2 Pre Requisites 6
3 Syllabus 7
4 Course Outcomes 8
6 Lecture Plan 10
8 Lecture Notes 13
9 Assignments 73
10 Part A Q & A 74
11 Part B Questions 82
15 Assessment Schedule 86
COURSE OBJECTIVES
To understand Cryptography Theories, Algorithms and Systems.
To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
PREREQUISITE
CS8792 CRYPTOGRAPHY AND NETWORK SECURITY
SYLLABUS
CS8792CRYPTOGRAPHY AND NETWORK SECURITY 3003
UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for
Security at Multiple levels, Security Policies - Model of network security – Security
attacks, services and mechanisms – OSI security architecture – Classical
encryption techniques: substitution techniques, transposition techniques,
steganography).- Foundations of modern cryptography: perfect security –
information theory – product cryptosystem – cryptanalysis.
Course Outcomes
PO’s/PSO’s
COs PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 3 3 2 - 2 - - - - - - 1 2 1
2
CO2 3 3 3 2 - - - - - - - 1 2 1
2
CO3 3 3 3 2 - - - - - - - 1 2 1
2
CO4 3 3 3 2 - - - - - - - 1 2 1
2
CO5 3 3 3 2 - - - - - - - 1 2 1
2
CO6 3 3 3 2 - - - - - - - 1 2 1
Link
S NO TOPICS
https://www.youtube.com/w
atch?v=ZWz8KiJpTEM&t=20
1 PlayFair Cipher 4s&ab_channel=MadhuAmar
nath
https://www.youtube.com/w
2 Cryptographic attacks atch?v=BXq2T3BDLBo
https://www.youtube.com/w
History and Evolution of
3 atch?v=z9Qi5mDSYb8&t=67
Cryptography and Cryptanalysis
s
https://www.youtube.com/w
4 Network Security atch?v=Jt9lxEoWuYs
https://www.youtube.com/w
5 Cybercrime atch?v=87N2GPEIyAE
https://www.youtube.com/w
6 Perfect Secrecy atch?v=vKRMWewGE9A
ACTIVITY BASED LEARNING
1. https://www.cryptool.org/en/cto/caesar
2. https://www.simonsingh.net/The_Black_Chamber/monoalphabetic.html
3. https://www.simonsingh.net/The_Black_Chamber/playfair_cipher.html
4. https://www.cryptool.org/en/cto/vigenere
LEGAL, ETHICAL AND PROFESSIONAL ASPECTS OF
SECURITY
Computer crime, or cybercrime, is a term used broadly to describe criminal
activity in which computers or computer networks are a tool, a target, or a place
of criminal activity.
The term cybercrime has a association of the use of networks specifically,
whereas computer crime may or may not involve networks.
INTELLECTUAL PROPERTY
The U.S. legal system, and legal systems generally, distinguish three primary
types of property:
Real property: Land and things permanently attached to the land, such as trees,
buildings, and stationary mobile homes.
Personal property: Personal effects, moveable property and goods, such as
cars, bank accounts, wages, securities, a small business, furniture, insurance
policies, jewelry, patents, pets.
Intellectual property: Any intangible asset that consists of human knowledge
and ideas. Examples include software, data, novels, sound recordings, the design
of a new type of mousetrap, or a cure for a disease.
The copyright owner has the following exclusive rights, protected against
infringement:
PATENTS
A patent for an invention is the grant of a property right to the inventor. There
are three types of patents:
Utility patents: May be granted to anyone who invents or discovers any new
and useful process, machine, article of manufacture, or composition of matter, or
any new and useful improvement thereof;
Design patents: May be granted to anyone who invents a new, original, and
ornamental design for an article of manufacture;
Plant patents: May be granted to anyone who invents or discovers and
reproduces any distinct and new variety of plant.
TRADEMARKS
A trademark is a word, name, symbol, or device that is used in trade with goods
to indicate the source of the goods and to distinguish them from the goods of
others.
DRM Components
Content provider: Holds the digital rights of the content and wants to protect
these rights
Distributor: Provides distribution channels, such as an online shop or a Web
retailer.
Consumer: Uses the system to access the digital content by retrieving
downloadable or streaming content through the distribution channel and then
paying for the digital license
Clearinghouse: Handles the financial transaction for issuing the digital license to
the consumer and pays royalty fees to the content provider and distribution fees
to the distributor accordingly
The DRM components is depicted in the figure below.
The system interface to the services provided by the DRM system are
Identity management: Mechanisms to uniquely identify entities, such as
parties and content
Content management: Processes and functions needed to manage the content
lifestyle
Rights management: Processes and functions needed to manage rights, rights
holders, and associated requirements
The DRM system architecture is shown in figure below.
Security Policies
Organizational policies must identify goals, threats, risks;
Information policies must establish data categories, labels, sensitivity levels,
handling restrictions, roles, responsibilities;
Data Security policies must specify human, physical, communications, and
computer protections for data;
CKMS Policies should be configurable and automated to manage keys that protect
sensitive applications and data.
Global secure applications must support various policies.
Goal: Automated security policy specification, negotiation, and enforcement is
desirable for sensitive applications among mutually suspicious but cooperating
organizations. Key Management based on automated dynamic Domain Security
Policy support will help meet this goal.
DOC/NIST’s Information and Data Security Policies include all aspects of protecting
information and data. These include:
The potential impact on DOC, NIST, Federal employees, and private individuals is
categorized as:
low (limited),
moderate (serious), or
SECURITY ATTACK
A useful means of classifying security attacks, used both in X.800 and RFC 2828, is
in terms of passive attacks and active attacks. A passive attack attempts to learn
or make use of information from the system but does not affect system resources.
An active attack attempts to alter system resources or affect their operation.
Active attacks
Masquerade (Fabrication)
Replay
Modification
Denial of service
Passive attacks:
Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. Passive attacks are very difficult to detect because they do not
involve any alteration of data. However, it is feasible to prevent the success of
these attacks. The goal of the opponent is to obtain information that is being
transmitted.
Active attacks:
These attacks involve some modification of the data stream or the creation of a
false stream. It is quite difficult to prevent active attacks absolutely, because to do
so would require physical protection of all communication facilities and paths at all
times. Instead, the goal is to detect them and to recover from any disruption or
delays caused by them.
These attacks can be classified in to four categories:
1) Masquerade (Fabrication) – One entity pretends to be a different entity.
Figure 5: Masquerade
2) Replay – involves passive capture of a data unit and its subsequent transmission
to produce an unauthorized effect.
Figure 6: Replay
3) Modification – Some portion of message is altered or the messages are delayed
or recorded, to produce an unauthorized effect.
Figure 7: Modification
SECURITY SERVICES
X.800 defines a security service as a service provided by a protocol layer of
communicating open systems, which ensures adequate security of the systems or
of data transfers. As per RFC 2828, the definition is “ a processing or
communication service that is provided by a system to give a specific
kind of protection to system resources; security services implement
security policies and are implemented by security mechanisms”.
X.800 divides the security services into five categories and fourteen specific
services
1) AUTHENTICATION:
The assurance that the communicating entity is the one that it claims to be.
Peer Entity Authentication: Used in association with a logical connection to
provide confidence in the identity of the entities connected.
Data Origin Authentication: In a connectionless transfer, provides assurance
that the source of received data is as claimed.
2 ) ACCESS CONTROL:
The prevention of unauthorized use of a resource (i.e., this service controls who
can have access to a resource, under what conditions access can occur, and what
those accessing the resource are allowed to do.
4) DATA INTEGRITY:
The assurance that data received are exactly as sent by an authorized entity (i.e.,
contain no modification, insertion, deletion, or replay).
Connection Integrity with Recovery: Provides for the integrity of all user data
on a connection and detects any modification, insertion, deletion, or replay of any
data within an entire data sequence, with recovery attempted.
Connection Integrity without Recovery: As above, but provides only
detection without recovery.
Selective-Field Connection Integrity: Provides for the integrity of selected
fields within the user data of a data block transferred over a connection and takes
the form of determination of whether the selected fields have been modified,
inserted, deleted, or replayed.
Connectionless Integrity:
Provides for the integrity of a single connectionless data block and may take the form of
detection of data modification. Additionally, a limited form of replay detection may be
provided.
5) NONREPUDIATION:
Provides protection against denial by one of the entities involved in a communication of
having participated in all or part of the communication.
Nonrepudiation, Origin: Proof that the message was sent by the specified party.
Nonrepudiation, Destination: Proof that the message was received by the specified
party.
SECURITY MECHANISMS
The security mechanisms defined by X.800 are divided into those that are implemented
in a specific protocol layer, such as TCP or an application-layer protocol, and those that
are not specific to any particular protocol layer or security service. X.800 distinguishes
between reversible encipherment mechanisms and irreversible encipherment
mechanisms.
A reversible encipherment mechanism is simply an encryption algorithm that allows data
to be encrypted and subsequently decrypted. Irreversible encipherment mechanisms
include hash algorithms and message authentication codes, which are used in digital
signature and message authentication applications.
Specific security mechanisms are encipherment, digital signatures, access
controls, data integrity, authentication exchange, traffic padding, routing control
and notarization.
Encipherment
The use of mathematical algorithms to transformdata into a form that is not
Digital Signature
Data appended to, or a cryptographic transformationof, a data unit that allows a
recipient of the data unitto prove the source and integrity of the data unit and
Access Control
Data Integrity
A variety of mechanisms used to assure the integrityof a data unit or stream of
data units.
Authentication Exchange
A mechanism intended to ensure the identity of anentity by means of
information exchange.
Traffic Padding
The insertion of bits into gaps in a data stream tofrustrate traffic analysis
attempts.
Routing Control
Enables selection of particular physically secureroutes for certain data and allows
routing changes,especially when a breach of security is suspected.
Notarization
The use of a trusted third party to assure certainproperties of a data exchange.
Trusted Functionality
That which is perceived to be correct with respectto some criteria (e.g., as
established by a securitypolicy).
Security Label
The marking bound to a resource (which may be adata unit) that names or
designates the security attributes of that resource.
Event Detection
Detection of security-relevant events.
Security Recovery
Deals with requests from mechanisms, such as eventhandling and management
functions, and takes recovery actions.
Secret key: The secret key is also input to the encryption algorithm.The key is a
value independent of the plaintext and of the algorithm. The algorithm will
produce a different output depending on the specific key being used at the time.
The exact substitutions and transformations performed by the algorithm depend
on the key.
A source produces a message in plaintext, X = [X1, X2, … , XM] where M are the
number of letters in the message. A key of the form K = [K1, K2, …, KJ] is
generated. If the key is generated at the source, then it must be provided to the
destination by means of some secure channel.
With the message X and the encryption key K as input, the encryption algorithm
forms the cipher text Y = [Y1, Y2, …, YN]. This can be expressed as
Y = EK(X)
The intended receiver, in possession of the key, is able to invert the
transformation:
X = DK(Y)
An opponent, observing Y but not having access to K or X, may attempt to recover
X or K or both. It is assumed that the opponent knows the encryption and
decryption algorithms. If the opponent is interested in only this particular
message, then the focus of effort is to recover X by generating a plaintext
estimate. Often if the opponent is interested in being able to read future
messages as well, in which case an attempt is made to recover K by generating
an estimate. The essential elements of a symmetric encryption scheme is shown
in the figure below:
Cipher text only – A copy of cipher text alone is known to the cryptanalyst.
Known plaintext – The cryptanalyst has a copy of the cipher text and the
corresponding plaintext.
Chosen cipher text – The cryptanalyst obtains temporary access to the decryption
machine, uses it to decrypt several string of symbols, and tries to use the results to
deduce the key.
Chosen text: Plaintext message chosen by cryptanalyst, with its corresponding
ciphertext generated, purported ciphertext chosen by cryptanalyst, with its corresponding
decrypted plaintext.
SUBSTITUTION TECHNIQUES
1. Caesar cipher (or) shift cipher
2. Playfair cipher
3. Hill cipher
4. Polyalphabetic ciphers
1. Vigenere cipher
2. Vernam cipher
3. One Time Pad cipher
TRANSPOSITION TECHNIQUES
1. Rail fence
2. Row Transposition Ciphers
A substitution technique is one in which the letters of plaintext are replaced by
other letters or by numbers or symbols. If the plaintext is viewed as a sequence
of bits, then substitution involves replacing plaintext bit patterns with cipher text
bit patterns.
Example 1:
Plain text: pay more money
Cipher text: SDB PRUH PRQHB
Example 2:
Disadvantages
The encryption and decryption algorithm are known.
There are only 25 keys to try.
The language of the plain text is known
PLAYFAIR CIPHER
The best known multiple letter encryption cipher is the playfair, which treats
digrams in the plaintext as single units and translates these units into cipher text
digrams. The playfair algorithm is based on the use of 5x5 matrix of letters
constructed using a keyword. Let the keyword be ‘monarchy’. The matrix is
constructed by filling in the letters of the keyword (minus duplicates) from left to
right and from top to bottom, and then filling in the remainder of the matrix with
the remaining letters in alphabetical order. The letter ‘i’ and ‘j’ count as one letter.
Plaintext is encrypted two letters at a time according to the following rules:
Repeating plaintext letters that would fall in the same pair are separated with a
filler letter such as ‘x’.
Plaintext letters that fall in the same row of the matrix are each replaced by the
letter to the right, with the first element of the row following the last.
Plaintext letters that fall in the same column are replaced by the letter beneath,
with the top element of the column following the last.
Otherwise, each plaintext letter is replaced by the letter that lies in its own row
and the column occupied by the other plaintext letter.
Example:
Plaintext = meet me at the school house
Splitting two letters as a unit =>me et me at th es ch ox ol ho us ex
Corresponding cipher text => CL KL CL RS PD IL HY AV MP HF XL IU
Example 2:
Plain text : Balloon
Repeating plain text letter that fall in the same pair are repeated with the filler
letter ‘X’.
Plain text : ba lx lo on
Cipher text : IB SU PM NA
Advantage
It is difficult to identify particular diagrams.
Frequency analysis is more difficult.
Disadvantages
It is relatively easy to be broken.
The sufficient number of cipher text letter is very small.
Hill Cipher
Hill cipher is a poly-graphic substitution cipher based on linear algebra.
Hill used matrices and matrix multiplication to mix up the plain text.
Each letter is represented by a number modulo 26.
To encrypt a message, each block of ‘n’ letters is multiplied by an invertible n x n matrix,
again modulus 26.
To decrypt the message, each block is multiplied by the inverse of the matrix used
for encryption.
Example:
POLYALPHABETIC CIPHERS
Another way to improve on the simple monoalphabetic technique is to use
different monoalphabetic substitutions as one proceeds through the plaintext
message. The general name for this approach is polyalphabetic cipher. All the
techniques have the following features in common.
To encrypt, pick the letter in the plain text and its corresponding letter in the
keyword. The plain text is considered as row index and the keyword letter as
column index.
Here in the above example letter ‘G’ from row and letter ‘T’ from colum intersects
and produces the letter ‘Z’.
For decryption, pick the letter from the keyword as column index and search for
the cipher text. The intersection of corresponding row gives the plain text.
In our example letter ‘t ’ is considered as column index searching for cipher text
z’. The corresponding row index produces the plain text ‘g’.
Cipher text : zslw fsogbrd
Key : text texttex
Plain text : Good morning
Advantage
Multiple cipher text letters are used for each plain text letters.
VERNAM CIPHER
The ultimate defense against such a cryptanalysis is to choose akeyword that is
as long as the plaintext and has no statistical relationship to it. This cipher works
on binary data (bits) rather than letters. The system can beexpressed succinctly
as follows :
ci= pi ki
where
pi= ith binary digit of plaintext
ki= ith binary digit of key
pi= ci ki
Example:
Plaintext =00101001
Key =10101100
Ciphertext =10000101
Suppose that we are using a Vigenère scheme with 27 characters in which the
twenty-seventh character is thespace character, but with a one-time key that is as
long as the message.
Consider the ciphertext
ANKYODKYUREPFJBYOJDSPLREYIUNOFDOIUERFPLUYTS
Advantage
It is a highly source method because it generates random keys
Disadvantages
Sending the key securely is a problem.
Randomness is also a disadvantage.
TRANSPOSITION TECHNIQUES
All the techniques examined so far involve the substitution of a cipher text symbol
for a plaintext symbol. A very different kind of mapping is achieved by performing
some sort of permutation on the plaintext letters. This technique is referred to as
a transposition cipher.
RAIL FENCE:
It is simplest of such cipher, in which the plaintext is written down as a sequence
of diagonals and then read off as a sequence of rows.
m e a t e c o l o s
e t t h s h o h u e
The encrypted message is
MEATECOLOSETTHSHOHUE
ROW TRANSPOSITION CIPHER:
A more complex scheme is to write the message in a rectangle, row by row, and
read the message off, column by column, but permute the order of the columns.
The order of columns then becomes the key of the algorithm.
Example:
Plaintext = meet at the school house
Key = 4 3 1 2 5 6 7
Plaintext = m e e t a t t
h e s c h o o
l h o u s e z
Cipertext = ESOTCUEEHMHLAHSTOETOZ
STEGANOGRAPHY
A plaintext message may be hidden in any one of the two ways. The methods of
steganography conceal the existence of the message, whereas the methods of
cryptography render the message unintelligible to outsiders by various
transformations of the text. A simple form of steganography, but one that is time
consuming to construct is one in which an arrangement of words or letters within
an apparently innocuous text spells out the real message. e.g., (i) the sequence
of first letters of each word of the overall message spells out the real (hidden)
message. (ii) Subset of the words of the overall message is used to convey the
hidden message. Various other techniques have been used historically, some of
them are
Character marking – selected letters of printed or typewritten text are
overwritten in pencil. The marks are ordinarily not visible unless the paper is held
to an angle to bright light.
Invisible ink – a number of substances can be used for writing but leave no
visible trace until heat or some chemical is applied to the paper.
Pin punctures – small pin punctures on selected letters are ordinarily not visible
unless the paper is held in front of the light.
Typewritten correction ribbon – used between the lines typed with a black
ribbon, the results of typing with the correction tape are visible only under a
strong light.
Drawbacks of Steganography
Requires a lot of overhead to hide a relatively few bits of information.
Once the system is discovered, it becomes virtually worthless.
MODERN CRYPTOGRAPHY
Modern cryptography is the cornerstone of computer and communications
security. Its foundation is based on various concepts of mathematics such as
number theory, computational-complexity theory, and probability theory.
Shannon was concerned with ``messages'' and their transmission, even in the
presence of ``noise''.
possible messages, each with its own probability of occurrence. This entropy is
the average number of bits needed to represent each possible message, using the
best possible encoding. If there are n messages X = {X1, ... , Xn}, with
probabilities of occurrence: p(X1), ... , p(Xn) (with sum equal 1), then
Intuitively, the entropy is just the weighted average of the number of bits
required to represent each message, where the weights are the probabilities that
information in the message, that is, the number of bits needed for the shortest
that only the above formula gives a function with those properties
For example, if we have two messages X = {male, female}, each having
probability 1/2, then the entropy is
Law ENTROPY2: A random message has the most information (the greatest
entropy).
The Three Kinds of Codes.
The terms code and coding refer to ways of representing information. Here the
term binary codes is used, that is, codes that use only the binary bits 0 and 1.
There are three kinds of coding:
Source Coding: This usually involves data compression: representing the data
with as few bits as possible. Notice that one always needs at least as many bits to
encode a message as the entropy of the message. Example: The Huffman Code.
Channel Coding: Here one uses error detection and error correction to improve
the reliability of the channel. This is accomplished by adding extra redundant bits.
The rest of this chapter presents material on channel capacity and error correction
codes. Example: The Hamming Code.
Secrecy Coding. For secrecy, one uses cryptography to scramble the message
so that it may not be intelligible to an eavesdropper.
Law INFORMATION1:
In all coding theory, information transmission is essentially the same as
information storage, since the latter is just transmission from now to then.
It's possible to have a single code that combines two or even all three of these
functions, but the codes are usually kept separate. Normally one would compress
a message (making the message smaller, to save storage or channel bandwidth),
then transform it cryptographically for secrecy (without changing the message
length), and finally add bits to the message to allow for error detection or
correction.
Channel Capacity.
Shannon also introduced the concept of channel capacity, which is the maximum
rate at which bits can be sent over an unreliable (noisy) information channel with
arbitrarily good reliability.
The channel capacity is represented as a fraction or percentage of the total rate
at which bits can be sent physically over the channel. Shannon proved that there
always exist codes that will signal arbitrarily close to the channel capacity with
arbitrarily good reliability.
Thus by choosing a larger and more complicated code, one can reduce the
number of errors to as small a percentage as one would like, while continuing to
signal as close as one wants to 100% of the channel capacity.
In practice the theory does not provide these good codes, though they are known
to exist. It is not possible to signal with arbitrarily good reliability at a rate greater
than the channel capacity.
The simplest example of such a channel is the binary symmetric channel. Here
every time a bit is transmitted, there is a fixed probability p, with 0 <= p <=
1 such that a transmitted 0 is received as a 0 with probability p and received as
a 1 with probability 1 - p. The errors occur at random.
For example, if p = 1 there are no errors at all on the channel, and the channel
capacity is 1 (meaning 100%). If p = 0, the capacity is still 1 as long as you
realize that all bits are reversed. If p = 0.5, then on receipt of a bit,
both 0 and 1 are equally likely as the bit that was sent, so one can never say
anything about the original message. In this case the channel capacity is 0 and no
information can be sent over the channel.
For binary symmetric channels there is a simple formula for the capacity C
C = 1 + p log2(p) + (1 - p) log2(1 - p).
Alternatively, one can write this formula as:
C = 1 - H(X),
where X consists of two messages with probabilities p and 1 - p. This formula
gives the amount of information lost during transmission on this noisy channel.
PRODUCT CRYPTOSYSTEM
Figure: Cryptosystem
Objectives of Cryptosystem
The objective of this simple cryptosystem is that
At the end of the process, only the sender and the receiver will know the
plaintext.
A sender who wants to transfer some sensitive data to a receiver in such a way
that any party intercepting or eavesdropping on the communication channel
cannot extract the data.
Components of a Cryptosystem
CRYPTANALYSIS
Cryptanalysis is the science of cracking codes and decoding secrets. It is used to
violate authentication schemes, to break cryptographic protocols, and, to find and
correct weaknesses in encryption algorithms.
plaintext data
the encryption algorithm being used
any data about the cryptographic key being used
This is the type of challenge that intelligence agencies often face when they have
intercepted encrypted communications from an opponent
Man-in-the-Middle Attack
Cryptographic communications and key exchange protocols are susceptible to an
attack in which the attacker is able to place himself on the communication line
between two parties.
In this "man-in-the-middle attack" the attacker is able to position himself to
intercept the key exchange between two parties. He performs his own key
exchange with each. Then, with both parties thinking they have set up a secure
channel, the attacker decrypts any communications with the proper key, and
encrypts them with the other key for sending to the other party. The parties think
that they are communicating securely, but in fact the adversary is reading
everything.
Deep Crack technology was developed in 1998 by the EFF (Electronic Frontier
Foundation). They built a machine called the Deep Crack capable of trying a
million DES keys per microsecond against a readable ASCII string hours to try all
possible keys. In theory, its success in cracking DES makes DES worthless. In
practice, however, by using cipher block chaining, doing any initial scrambling of
the data and/or doing it three times in a row (triple DES), it can still be fairly
difficult to crack.
Attacks on Symmetric Block Ciphers
Four types of attacks are normally used against symmetric block ciphers such as
DES and RC5:
Differential Cryptanalysis
Linear Cryptanalysis
Differential Linear Cryptanalysis
Algebraic Attacks
Differential cryptanalysis is a chosen plaintext attack that relies on analysis of the
differences between two related plaintexts as they are encrypted with the same
key. The correct key is identified by examining probabilities of each key. Linear
cryptanalysis, a known plaintext attack, uses linear approximation to describe
behavior of the block cipher. Given sufficient pairs of plaintext and corresponding
ciphertext, bits of information about the key can be obtained. Differential linear
cryptanalysis is a combination of differential and linear cryptanalysis. Algebraic
attacks analyze vulnerabilities in the mathematics of the algorithm.
Do you think that necessity of keeping files secure arises more during
COVID lockdown?
in a particular form so that only those for whom it is intended can read and
process it. Cryptography not only protects data from theft or alteration, but can
enciphering details fall into the area of cryptanalysis. Cryptanalysis is what the
by an organization.
organization. The services are intended to counter security attacks, and they
circumstance, capability, action, or event that could breach security and cause
harm. That is, a threat is a possible danger that might exploit vulnerability.
Attack -An assault on system security that derives from an intelligent threat; that
method or technique) to evade security services and violate the security policy of
a system.
What are the techniques that have been used historically for
steganography?(CO2,K1)
Character marking
Invisible ink
Pin punctures
Typewriter correction ribbon
What are the Intellectual Property that are relevant to Network and
Computer Security? (CO1,K1)
Software
Databases
Digital content
Algorithms
What are the Ethical issues related to Computers and Information
security? (CO1,K1)
10. Describe a classification of computer crime based on the role that the computer
plays in the criminal activity. (CO1,K2)
11. Explain in detail about copyright. (CO1,K2)
12. Describe the Digital Millennium Copyright Act. (CO1,K2)
13. Describe the principal categories of users of digital rights management
systems. (CO1,K2)
14. Summarize the Law Enforcement of Cybercrimes with the vicious cycle of
cybercrime. (CO1,K2)
15. Explain the role of Information theory in Cryptography. (CO1, K2)
Supportive online Certification courses
NPTEL
Cryptography and Network Security
COURSERA
Cryptography
Applied Cryptography
UDEMY
Advanced Cryptography Concepts
PLURALSIGHT
Cryptography Fundamentals for Developers and Security Professionals
Real time Applications in day to day life and to Industry
Kerckhoffs's principle
ASSESSMENT SCHEDULE
Tentative Dates:
IAT-1 11-Sep-2023
PRESCRIBED TEXT BOOKS & REFERENCE BOOKS
Text Books
1. William Stallings, Cryptography and Network Security: Principles and Practice,
PHI 3rd Edition, 2006.
Reference Books
1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network
Security, Wiley India Pvt.Ltd
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
MINI PROJECT SUGGESTIONS
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.