AC
AC
(nner og-ecatos lity oa
7 Ecoravitry - ; "
3 Flex; biliny tag
\- Providing, Security -
O51 aghitecnse 10 OR. Provides the veYAred seurity
X Safety Preven te Porerfal Pisks & threats .2 Meeting. Internatrenal Standards
“Security services ore Aekmed od ecagniced | mreeblerl,
meetigg, internatowal Standards.
3. wer ‘Interoperabitiny =
By ose Metwork Lincsn info wultele levels the 03)
molel ynokes tt Casrer foe gitferent oiclesure 4
are Components to Work togethe,
te Scali tiling —
“the layer Owchitecture ‘thekes the network Scalable,
Mew technolostes & proto cate €on be Ctolded without
Mrenupting Khe overall Susiem.
S> “Pleatbiliry -
Boch (syer cam Be evolue independently, Proud,
Hexbitiry For techre logy Garp Yeataq chempjesDore- QY, 03: 2QY
The Basic Principles of Moclern Cayntegi tog hy-
“Modera coypresmphy is based upon More scienbifre
Foundations,
~The Main principles that AémMguish Moclern erypro greghy
From classical erypkgeply owe ots Potivias
Principle~1-
“The Ist step MM sdving ony cryptogauphy problem is the
Brmulakun ofa fexreous ancl Prisize dchnattuy
af S€eunn
~Gromple Cv
Prien cxple-2_ - } et
. When Seeuriy of Cryptroamphy Frblem clepends ugen
emproven eAssumpbtan? Where assumpttan fuse Pris ely
Staldle -
“Further more the cassurnp ttn shod be as minimal
os possible -
FainePle-d -
* Cyypro, aloo. should be ciceampmescl fy
an ee oR Securityewne cee
Roemulored Gecocdingy (ro Prirciple-] ancl relseuwe te
Princ AN AssUropten stared ™ Prine] 2.~The Cansinectian of oboe 3 prindples Constiuiies a
yegermus APProach tocnsptosraphy which AStmer
fam acl hoe “approach of clussital Cry pteyreurhy.
Assignment \
Playfuir Cepher
Vigence Ciphes Cramericaa Poeary 5)
O51 Geourty axchicerne Casteicts, ee Servite
Basie Principle oF Cryplog raphy
Pasic Settiyy of fervekely. Cncryp tem
Reavoie Attack vs fassive AttacnModute- 2
Trans Positton -
~ Wy lrarspasitien cipher come sore of pocmubaitiun <6 per Forel
onthe plaintert — pletters fevers.
+ The Simplest runs posticren aigher TS Ran fence
“Technique ; ley which the plain tert conten ac cot
SEGAENCE oF cliqganals anch thes ead AP Se
Stqnrence of ows, :
Q. Plat Texe > ATTACK FRom THE EAST’
Eneygr the Cibave plan’ fem COM transpostun! venpher
eoitty alenth 2 ,
nose reo Tas oa
TAKS
Cmorks)
Nt eC FO Sica Sma
ND Homi oor Addon aie
Eu ne iM Caan 6S
areca Oca fam GL Vu RMHES
Gipher te
Deph> ?
OO) 1. ae
i
Te earn eae 2 eSBlock Cipher- |
Block Cipher, Os the Name suasese text VP CPlom Text’)
cand dhuides the Plain text inte’ a acamber oe acts or ’\oiu.
shen Each block $s enerypled Comh the Key and omer, {
“mko Cheher text-
Lo N ooulfiie 1144 7 PlainTexe
Brocw-1 Blom ~Q
Stveam Crpher-
| Stream agrer takes Wp as, streumof bis,
Ahior reciting espe lis cohth represent: O72 of
Play Pex: er onegy? ed twoilh the Key omd. converts
is cath the cipher text ) \
Plain Text = TO Wee MW We pig4
Vey
Lt
capher Texyhet eae
Block Cipher
Steam Cipher
» Block cipher ts Raster harry 1 Slower than Plock cipher.
Sream alpher-
ir Ory Block Car teingOny + Pde
kansmission erron, icco'll
; Bir is lost OF coprupiey
Not oPfecr other blocks . ~ & diffa'cult corecaven,
Gumsmissiory my
cthar (S Ye orang m SST § reeuived
“6 Easy to tmplement im APIS nar Cosy to Implant
Software. {r) so%cwoare+
Weis easy © gasert or delete Ir ts not Possivie (lisse
y !
Bios or delete amythms ts trea9
ok -
cipher -
\trmore Uvernable to «(tis leas vuewnulie To
Coyote Analysis . CPF analysrs.Dore~ Hh 08. QeQy
Dota Chayption Standard Ces).
“DES 1 a Doc cipher cxitha SGbit key, leogtha ay :
Plain Tet blo, whitch hes Plaryecl cr significa tole ty
dara seosty 9 |
~ DES encypts “data In bious of Rixed size hat ic,
GY vit Y Produces GY bit cipher tex —
Se ‘Uhisis a Sommer’ Olsye -' that \5 Same fey is
used Por encyypriin & deeryrhin .
DES Key-
~The inittol MES Key fs CU Bis.
Before the DES Prcessyy every B bk SE the Koy &
dis curled Co Preduce a Sb bit key,
Le Bit postion BUN ou aah ud ca gC
re Aiscorded,
~The Vscordipg af uery & bk of she Wer Produces
0 Gi Se bit Key from are Orfefine) GU bait Yer.DES Operarian-
C4 BK Blom Tex
ie oth Bic
Iial Permutarton C\P)
Lou
Roundd Sates, Seley
v
[ Round 1G
EES i
(Fina! Renna cer)
a
GY tit Caper Tem
4B boty Sub)
One Round of
oe
Rbis BWbisDES Function-
ae uae
Geressfon Pern ual UnDote- S108: 2eny
DES Operation-
Initial petrnutabion-
. \nitial permutation only once at rye weginmingy of the
Processes .
Atis a Stragmhe PErmuterion that (s the ofp is else Up Yb}
~The obj. of Miticd Permatation 4s Q mix ck che bit Posidins,
forexample - The tse bir of orlainiaa| plain text “mene replaus
eotth Satbit of the plain ter and Qndbi colgh Soth br-4
Sr bh with Buabm and so on-
- Umoy pe diffe means 17 Goth . 27 Sth
Key “Wwons Pecmeatrsn
- we hove noted thok the Gah lo Key ts bemsfirrm {nto ”
O Sor bit Key by discarding’ every Sth bite, So Now
a Sth bir key S avolicide, '
From He Goth bitkey , aditerenr 48 bir Sule Key Is
Qereratedl desing Cou round,
Sromsion Potmu tar ~
+ Daddy expermsin Perenutcrrm, the 1
15 expamded to 4th bits.
“To expand “Me bit blo is dived wnto blokes
(with Gach ‘o\ock Containiny 4 bis,then rch shir bing
15 Exponcbed 40 G bits, !
1 So the 8Qbe blo becomes Gr 48 bas.
ane plan fevraf 2a bisSecurity of DES-
Whe CES Wes clesyned, tevas Consided to bea secered
algo-
‘Voweve DES is no Longer consided as Seamed Ose. 18 ibe
Prompicol to brurefiree atrucny because the key size ts,
weasenalibl “yeasonalible” to Swrall thot tS 36 bits
+ Super campers coin break this alga. i minutes so
DVS offrcitlly Peteirredl fy QooS emndie peplaced ’
by ATS, RSA etc.
Advanced Encryption Standard (RES) -
AES 15 specifrecl lay MAST Crational, Ingtiture of Standeads
and Technolyy) m roo lin 050:
hous
We {Ss much Swoger thon fates Geis Hard co implemen %
Nba block Cipher algo. ceith differen: Key size. +e
128 bits ,19Q bis and QS bits
108 bits —> jw rounds
(02 ‘ots > 12 runds of eis
QW brs ~y \Y Tounds“AES comisis of bytes subsntutran , shift yous, “A Colemns
[B8 Bis Plain Teat
Pre + Round bans Fonnatien|
; OFF atae Pree
SPP State Owreny roondl 1
Me State Currey Of rund?
Reunch >
AES Operotion -
“PES operotan 15 Geite Corn Pl and it Congtes of 4 phoser
\- Byte Substiratt on
Q- Shift Cows
3- 4% columns
U- hdd: Ruel “ey\> Byte Substitutton -
Bye-8 Byte 2
120 Bits
Byte a Byre ‘5
Byrlo Pye 14
Bye 15
Input Sure rrrayee p29 ere ipa
Dare- 12.08. 9Q4
AS Algorithm - oe
ASSO Syrmense sve cipher use for “Enerypripy, mer
ane AIT XLANS migsiim in QS Stemdord .
GSM conversation (5 Lfansmitied a8 a sequence F 928 bit
Frames Cl bis) 9 each alirech'on, in every 4.6 mil
SAONAS - j 1
~fach frame {5 ae Xored coith 99% bir sequence Producea}
by the AS. Mey generator.
= The wal State of His generatur depends On _ Stott
Secret oy; eahieh is fined econ Carqversaon Qa QI bie
Frome no. (F )
Prreame CNY
Cipher tear
groues Random. Mey
Sreaw
Ke
& by Key s) }
AS encryption 15 Very Simple. [t+ 6 ask am KOR openly
for coh Dit.ile en > ii.
; we asses AS/1,
Encryption Tress -
Peoite: the svengest and more Popular version af- AS Por
Gsr and tt Is Cewvrentty being used both in Expore As
“fart Pseudo Random Bis are Aeneraieal by 3
Veeot feedback tite - Reyisters CLAS) -
Mn {FSR isa htt Regsrer whose Yp
\engeh ;
The specifi caton of coch registers *S aven'™ We
EPSR tformany tobe
SHep Qi
Clociaing, LFSR's col Session os!
. Fhe TeasIera ave itfalize coith 0 ro athey awe ClaM
Wikh G4 bit Sesion Key thor S GYrtimes each
ser vy clock amd the resuitts Stored in the leu
ey rt
siynificient bit 0 Ralsrer.) Aes: is a
Bloc’ dhe linear Led boc shvF register CRC ae
» ARerthe reg’srecs ove been Cloud sth he seston ney they:
,
No lower code only O Values. )
- In aep ey the Ver ar hon Asam 29 bir Cree :
enat [s register ove cour 29 ttmes,
This Step IS eteilor to eee
> The only difeen !
© NS Qh Femme =
ren fe S QQ bit no agen 64
) ,
Stepy ‘chico bees
Clocking the “LSPR with the merpnty “vel
pr ahis patr, @E ore clone coth empy exter
To cmd Sess (04 ee "
In step-44 the reyrons are cloaked loo
Wregurar @ Nou) r
This 6 corere Cleuk ns ' Come into Play.
~ Urrggelar clouktag Fottous magenty rate » The
pir ts detennine A by the clociaigg vt of the
, \ és
f a a bi Of vessrem is Squat 40 MAPory tt “Are
Yegster is local otherwise the 5 Ste0 vs ree NChHONYMaj (0,1,0)2 0
StS
Production SF Pseacdo Ramdom Bir
fre-Process,
« Repisiks awe now Compete. ane they Ove ready FO Produce
Pseado -fanderg Wir eahich untl Cneytt the plam txt
“To produce — Patuds Yemclorn bis kaon as te Key Seren
)
the Yeyisers ave clocmed 223 bimes. cui rSyalav loc!
“For each Cycle, the tnost Significant (Hs8) of eath eae
% ued For final Computatian,
Each weysler M58 XoRed eoith euch other and the result 5
Added to the Key Stone
‘Hou coe have Jet pseado randorm dis of 228 beds .
“We cao Ener - 2B bir Poeudo: random bit Rat tS Simple
XoR creat.
Nexwork
Now these Cipher reat can be Send over GS SepcurdyRy ERO MIO—
RCL, Stands Got Rives, Cipher 4 Wnvened oy
whe Setrery W RSA Algorithm.
ASS: toh @ Uribie MOY SE
Ron Rives 134 Ror
eaithar fayte extentes
Eyer nuns
“ye 08S O KRY of evher Gdboit oF 12g Lit:
4 ‘Ss used Soy aprlicaknn Suck os Secure 30c ver
Gener dds |
secur ( TLS) end it 6 also
Layer CssL) 1 Wanspea Layer
Reem eee 800, | ties Lada ool ‘
The RC aye: gencrare Mey Streain for Seereh ny
USE ID AMEy schedigy aly.
ting ws
ream {5 Doxo absare the loo
Whe Produce Ceghor tort - Gaara
Arbcattin of 0-4 ~
RCH has a Yeputation of beleg a Simple, HEM LUIG ax}
Tnenpensive enceylte technol.
Wrembles effizen ond quik Proresiny of Lome dase
acteon, inert of moneys US aye- i
+ Hewever due to oyber atta in TE COME YES, there
shove Calls fo Stop spy RLY Enuyptiin,
= RCN eoqyetion 1S