0% found this document useful (0 votes)
17 views13 pages

Cryptography

Uploaded by

MD Arsalan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Cryptography

Uploaded by

MD Arsalan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

) Categemg

Algo f Active httack


Passive Compenents 1
Ctphen
Text ) Secunity
AtacksAttack
Active
TntegityMestnge OAtacK& she
Passive
ttack O
9
anaysr
*Cgpto Plain O Te a) Oante
AccesA
Ascym
yctric )
hede rlasgu analgis
Traffhe )
Rclease Inte
Text ttack n
one t
#he Senviceamade up CantroL grty
- thie tien
heceive actal t
Befne heg Athen Cryrtegmaphy
Key 9 mestage
Irtenepen
Replus antidortiaity
onyprtegmaphg:dle
sendngnãrtegnaphg meaage sheuld
Dff
Gartent ticatron
ef n't
the fantext rdtieation Active
medied
i Meditieation ron.nepudia
nesage beth

heside ef Passive m
befone / nt the /w
the
Key Attack sendet tion
ey Seguente fe
tending led is brtitation OAvaabbg
.
same 4eteiven 15.e2 2

realme Shot by Wasinma


Assymme Algo
Agyotrie Symmetie Assymmetric
Algonith m " " Algorthmi
metrieSymCyptegraphie
Algehithm!
I4Wile 2) 1
no
Encaypthon symmetrie
Sender
ot hene Assymretric
Ptio
Encng Senden
a
Decnypton
done secret ae s pla)n
text
Encrypton Sane
Keg Plain hort
ciphes
test
test, n' Algonthm
Cipher
teet Ke nole
yB
numben
nlgonithm
done on
for ked
Network Sechet
bg secretKeg /Priate
bg encnyption pivate >
of /Puk
public Network
he se
Se text
phe cì lie
ceive Key
Ke thenKey/
Key
r y. ¬ eiphet
text CAg-)DESex
sec decrJ >Dec
therePeblC nyption Cnlgo)RSAex.
iven
Rece
Het ption.
/ Decryption Plain
text
Pvate Recelyeh
private ne ke
Plajn
Text ete
total
16.24
o2
Key
|n
cz
realme Shot by Wasima
2024 04
Trans : Ex
PolyalphabeticTranspozitional
Mlone Poly
CT Now
Ciphenl
EX)vigenene
alphabe adphabe
po CT PT Ke
d
Y Zitional Key
XEX CT=2 Key PT
x 5 tic tre
X T vaue !
DxbA S
A 3 5 Top7S 2440
ty
RFwA
X AY A Ciphcn
S 2 3 Cipheh = K
U
o SIM
DS SI X 2 214 S xY
WAS
0 mod 2G
W I I z
CDTIWs A 3 mod
K M I
Y WEDNESDAY
i
Z
X A M
X A 4 ASIMAPT
W A
AXNy A
X 5
n)
many oneto y'2 Ke
W

Blank
Boy’ X
22
+
mod45
26
-45

realme Shot bv
Geneal Ciphen
StreBleck
am
Size Ttenaions '
DES Ciphen

of Data
Left
bits32 Left
bits32 PlaindextbiGy
t
G4
bicT
Itenation GItenation 2 |Transpos bi(4
tPT bit64
Key tTranspo
sition Iteration 1e ition Struc
Swap
Process value ciphen
Text
Encngption
tune
bit 8 biG4
t
biG4
t
of of of bitKe
48
ES DES
bits|48 DES Standand)'
5Algo' bits
Keg 48
6 Rightbits32 Right
bits32
bits Ketbit 5G
Ket Prokes o
Rgtbit;32
Functien of.

Prolessor
bits56 Ke

ked 48
bitS430

XOR8de
realme Shot by Wasima.
2024/04 /24 1E20
3) 2) i) How Seppose RSA
In TrippleDES
choose Choo8eCalcul ChooBe PrivatePublie Private
Key
P=c P=cmod N modC=p thisSymmetric Frc ipl en
we 2
TechriguC/
43nmod il= Encnjptn
DecryptionEs 64
wil 8 the PublicKe Encnyptise
d e ate any algoithm
Keg Key bits
such such tschoo%e
N= two mod Npublic DES
N= that = plain
that P (M, (N,
2 large x
(P-i) 2=1
xI6Tf=3, key two gnaphd
Crypto text
e)kd) Asymnetric
Puslic
Key
(-1) (p-i)2-)
=
exd'mod Private
Ket is KeHs
will e number Ki-
22
= l be
|2 ane
less Key e)=/u9_5)Priv
X\c- pmodN C wsed al
go
p 43 pmod ti9
|52 than,(P-i)2-1) ¢4

and Decngphon
Techngueciphenbits64
7K, Decnypt ES
Encnygt
DESk DeenytDEs
med221Cxt ate
key-(n R

test
F.o324
)
(971
realme
Message 2)
Sende
Sile Pigest
Message signatwne
2Digita
aion privacy Signatune - Securty In
Has h privateKeg As Publie hepudi
Ih
lheDigrtal Privacy cheee
st function
Hash Encnyptior RsA
varjablemess
age digital digital
length
key anothe)Authentication algo Giiven

fon
signatue signatwre find twe
privateKegA's
nypt decrgption can layer Assignment
prime
MDS
d
pro
does
the of whe
function| Hat h numben
vide not in) He
PublitKegA's priv
encpion-dec"yption e
’20 cryptore -|peam Integrity =
ed ateintegnity provide 17
p=
bit keg an 19
dl bigestLength usedIs d
gest Message Fixed privacy and
=
authenhcato 187,
on 2=23.
cncnyphionfandar if
Can there Repudiaton Try
meksage
Signed
Diges Secure
SHE>
Hash
MDS’Mess app is to
and Lied a tnd
message
need 13.03-24
age on for ,
realme ,
izcs Q
Shot by Wasima d
2024
check Note " Receiven
Site
Nonce2n! Replag L Uses Signed
Sendes
- Digkst
the To Authentcation
Senden(s) Sende attac K mesage
ori pre +
vent mesage
inal Hash
7KAB/Rr
Digest
senden, nep
BKetAB -
KAB Kg lay
Receiver(R) ag
attack
ccc
Receiven(R) ive Receiveh
we
n
and ne

wsing
nal Nonce

6syin 1403

realme Shot by
Man
K=(R)mod ( Dif
y)´mod
=Gmed K N Man n
|R, RL
in K= (R2modK=
N ieProslem
= in
G the =(G' rodN) = Hellan
A
Symmetic
(Ra) Keg GmodN
modN the SymmetricKey
K2 middle
middle mod
R Peblem
X
mod N
N
attack
attac
Gmod N
R protocol
K Algo
Prime
nurb

(Key

exchange
K=(R)ot
=(Ga
B

mod protocol)
20.°32 n)
mod
realme Shot by Wasima N
2024/O4 /24 13-20
Ket
Request
Senrice5) 4) 3)Request )
Tcket Steps< Database
Authentication
3)Senver) It
2) )As KerberoB Needhan
Oatwag
Provide
Sevice ) )
B
A-Request A Ths has
Subdivis Distrì
Ths Cuent
sesson (TicKet its
A Rees bution
ticket seion own lo Pootocol
Scho
eder
f2 ion
Poroto
key nanting ,
4 2
maks) pwpose Cen
for Key Tas
for database
tcation
authen
co
¢ l
der
ticket B ¢ (KDC
ticke senven) of
Seven KDC
Tas) |As algo)'
for t
n fon
BI
Tus DB
application Sec
ranspotdajor
twek wrtty
Tce/Ip
to|i2
Layer

Protocals

realme Shot by
" " AH Headere
New IP LmeEStaushesModes
Conncction " Protocols
Secunity ;
8bits IPtteade Signabing IPS£C
desuing
ce gnam Tpeexcept The Next HHeaderTP Tunnel
ode Trans
Mode
port
TE
IE
anspo0 of
(Athentication
data Header Header IP b]w
the Authentication
Digest)
variable
lengthSequence
DataNember 51 nPSe
9%t those twoProto
SPI(SeCunity,
sed
en layen
Pay 8b;ts HeadenSecIP ho
Rayle AH sts col
loadheader in Lod Tunne Tr
data ’ rode L anspo ceserty
the The

ingSeguence lergth Header)


gam) <aied in PacKet
Rest of Header Coponent
SPE Main
calcu Par t Packet
nest et protocol
addne58
Sownce
Secwrty otP Tpe of
1p ameten
Reseved Mode
leadenlation ProtocoL' IP
o The
tion hasociation)
sA(Secunity
Poametes
help datagramtheTP Index) bit Header nest
changing ot pf
to of
he Secui
tuthentication Padding Packet dex In
n
foneange nest tj
uence ding of
Asseciatian
cwity
Sec’ se 3-4-2
the
trasmjsSia
ot datu
datlaye
data
realme Shot by Wasima
1

PL AL

Data
Framing
Packdrnag7am
intcn
Firewall is hdy
Dis PGp
Finealls Gof P PGiP(Pre
nal One
Jt Fncogpt
Sig + ed ad Hash Email at 2)
networ
Global tme
DigetEncnypt Conti
Pnocess js gned Sender
Networ k Receiver
ty
hand Secct dertia
k message Gocd
device
eauie
(it How 15 Ste
of
an
outqermsIncommg to
Digest Li
to
Complex kej ite S t
brcak Porivacy)
protect prvateA's
outn be Fnewal EncayptedhetSeKec t
rganzat could MIME S| Protocol
the Entypted £mol
Intenna! Signed
Onganzatien system
Digest
n
f |Pecnypt
the
Jins-tall privakep's
itself.
Keg
rest ed TPSEL
lPublicKey 1 PGP TLS
of he pubieA's Signatére
Pigrtal b 24|o4
Crgptogapn7 Private
B's Ke? secnetKePoiyacpcth
thetwcen Bne d One
Digek t secyet
oig ke
Ke.Secnetp
tine time
intral the GmpaneDigest J Enypkd
realme Shot Sy Wasima fr y
2024,047 24
Netwonk newl
Prox Packet
Diffeence
Global inewls
from
global budFilterthe Twopes ty
FireuolL
yPes ot
Inteface Networ k
2 Proxy tireual
>Prox
Frewal
Packet
fite
Packet
networK
lo
23-345- Souce
firewall
IP
Prot FinewalPacketfilter to
errorHTTP
fitn
Destnathon
Packet Au IP
trans
dhe
po
Intenal
Oganiz
ation app ht
8o Pont licctlayer

on
SenvehHTTP
iyPoxt 23
Pozt loyes
D
Packet
Accepted

realme Shot by Wasima


2024 04 24 13:21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy