Unit-1 CSDF
Unit-1 CSDF
Introduction of Information
Security and Cryptography
1.1 INTRODUCTION: BASIC CONCEPTS OF INFORMATION SECURITY
• As we know, due to increase in hardware technology speed and internet speed, it became growing
very rapidly in different domains like Autonomous Systems, E-commerce, Gaming, Natural
Resource Management, Education, Space Exploration, Agriculture, Energy Management,
Healthcare, Finance, Retail Manufacturing, Automotive, Entertainment and Media, Government
and Defence, Environmental Conservation, Human Resources, Hospitality and Tourism etc.
1.1.1 Why information security?
• Let us understand why information security is important for organization as well as individuals with
some real examples.
Protection of Sensitive Personal Information:
• Online Banking Information security ensures that personal financial data, such as account numbers
and passwords, etc.. are protected from hackers. In the absence of strong security protocols,
internet banking systems may be breached, resulting in unapproved access to bank accounts and
possible monetary losses for users.
Business Confidentiality:
• Theft of Intellectual Property- Businesses greatly rely on information security to protect their
product designs, trade secrets, and intellectual algorithms. If this data is not protected, rivals may
obtain sensitive information and suffer large financial losses as well as a loss of competitive
advantage.
Prevention of Data Breaches:
• Credit card details are stored in a retail company's customer database. A cyberattack could cause
a data breach if this data is improperly safeguarded, exposing the private financial information
of thousands of consumers. The company's reputation suffers, regulatory fines are imposed, and
the impacted customers suffer losses as well.
Maintaining Operational Continuity:
• Information security guards against ransomware attacks, which have the ability to encrypt
important company data and make it unreadable. In the absence of sufficient security
measures, a ransomware attack has the potential to cause financial losses and service
disruptions by impeding operations until a ransom is paid.
Compliance with Regulations:
• General Data Protection Regulation, or GDPR, for data protection rules to be followed,
information security is essential. Organizations managing personal data may face severe fines
and legal repercussions if they fail to secure the data in compliance with laws like the GDPR.
Protection Against Cyber Threats:
• Firewalls and antivirus software are examples of information security techniques that guard
against malware infections. Without these defences, systems may be susceptible to trojans,
worms, or viruses that tamper with data integrity and interfere with regular operations
1.1.2 What is Information Security?
• Information security encompasses more than just protecting data from
unwanted access. Preventing unauthorized access, use, disclosure,
interruption, alteration, inspection, recording, or destruction of information
is the essence of information security.
• Information can refer to anything, such as your biometrics, phone number,
social network profile, or other details. Therefore, a wide range of academic
fields are covered by information security, including cryptography, mobile
computing, cyber forensics, online social media, etc.
• Thus, Information security can be defined as
• "The practice of protecting sensitive data, systems, networks, and
information assets from unauthorized access, disclosure, alteration,
destruction, or any form of cyber threat."
• It encompasses a set of strategies, technologies, policies, and practices
designed to ensure the confidentiality, integrity, and availability of
information.
1.2 CIA TRIAD: FUNDAMENTAL OBJECTIVES
• When talking about
Information Security, the three
fundamental objectives are
Confidentiality, Integrity and
Availability, commonly known
as CIA triad which is one of the
most important models
designed to guide policies for
information security. [Fig. 1.1: CIA Triad-Fundamental Objectives]
1.Confidentiality
• "Confidentiality refers to that the information is not disclosed or
revealed to unauthorised party, except the parties involved in
communication."
• As an illustration, let's imagine I had a password for my Gmail account,
someone saw while I was doing a login into Gmail account. In that
instance, confidentiality has been violated and my password has been
compromised.
• Unauthorized users shouldn't be able to access your personal
information. The attacker might attempt to obtain your information by
capturing the data with various online tools.
• The use of different encryption techniques to protect our data is one of
the main ways to prevent confidentiality, Because Encryption techniques
prevent the attacker from being able to decrypt it, even if they manage to
obtain access to it.
[Fig. 1.2: Confidentiality using Encryption]
AES (Advanced Encryption Standard) and DES (Data Encryption Standard) are two examples of
encryption standards.
2.Integrity
• The Integrity refers to make sure that data has not been modified by unauthorised
party.
• To check whether our data has been modified or not, we can use hash functions. Two
common types of hash functions are: SHA (Secure Hash Algorithm) and MD5
(Message Direct 5).
Let's assume Sender 'A' wants to send data to
Receiver 'B' with maintaining data integrity. A
hash function will run over the data and produce
an arbitrary hash value which is then attached to
the data. When receiver 'B' receives the packet, it
runs the same hash function over the data which
gives a hash value. Now, if sender hash value =
Receiver hash value, then it means that the data's
integrity has been maintained and the contents [Fig. 1.3 Integrity Types of Modification Attack]
were not modified.
3. Availability
• Availability refers to ensure that, the system or network is timely and
reliably available to its authorised users.
• This applies to systems as well as data. Attacks such as DoS (Denial of
Services or DDoS(Distributed Denial of Services) may render a network
unavailable as the resources of the network get exhausted.
Ciphertext K H 0 0 R
Ciphertext K H 0 0 R
Plaintext H E L L 0
M O N A R
2. Fill all remaining places in the Playfair C H Y B D
square using letters from alphabet without E F G I/J K
L P Q S T
repeating. U V W X Z
Playfair Cipher Continue
• Note: In English alphabets there are 26 letters, but we have only 5*5 (Total 25) places. So, I and J are
placed in the same box.
3. Create Diagrams by combining two-two alphabets from the given plain text message.
• Example:
• Plaintext: ATTACK
• Diagram: AT TA CK
• (A) If there is a single character in the last Diagram, then use filler character X.
• Example:
• Plaintext: NESO ACADEMY
• Diagram : NE SO AC AD EM Y
• New Diagram: NE SO AC AD EM YX
• (B) If there is repeating character in the Diagram, use filler character as under.
• Example:
• Plaintext: BALLOON
• Diagram: BA LL OO N
• New Diagram: BA LX LO ON
• 4. Check each character of the Diagram in the matrix, and replace as
per below rules.
• (A) if both characters are in the same column, replace them with one
downward character.
• (B) if both characters are in the same row, replace them with one
right side character.
• (C) if characters are in different row and different column, replace
with last character in the same row
Example -1 Plaintext ATTACK Example -2 Plaintext MOSQUE
Diagram MO SQ UE
Diagram AT TA CK
Ciphertext ON TS ML
Ciphertext RS SR DE
Process 4B 4B 4A
Process step 4C 4C 4C step
[B] Transposition techniques:
•In contrast to the substitution techniques,
Transposition techniques perform some
permutation over the plain text, instead of
replacing one alphabet with another
alphabet.
•For example, if given plaintext is HELLO,
then Ciphertext may be LHELO. Here we can
observe that In ciphertext, letters are same
as plain text but placed at different position.
Rail-Fence Technique
• Rail-fence technique is the simplest transposition technique which
work with algorithm as written below.
• Step -1. Write alternate letters of the given plaintext into first line.
• Step -2. Write remaining letters of the given plaintext into second line.
• Step-3. Read the first line and then read the second line. Output of the
step 3 is Ciphertext of the given plaintext.
• Example
• Plaintext : YOU ARE BEST FRIEND Plaintext YOU ARE BEST FRIEND
Step -1 YURBSFIN
Step -2 OAEETRED
Step -3 YURBSFINOAEETRED
Ciphertext : YURBSFINOAEETRED
Simple Columnar Transposition Technique
• (1) Basic Simple Columnar Transposition Technique
• Basic Simple Columnar Transposition Technique works
with algorithm as written below.
• Step -1. Write the letters of given plain text row by row
into table with predefined size.
• Step-2. Read the letter from the table column wise. No
need to read columns in sequence. (columns 1, 2, 3...).
You are allowed to read columns randomly like column
3, 1, 2 etc...
• Step- 3. The output of the step 2 is Ciphertext.
Example
Plaintext: YOU ARE MY BEST FRIEND
STEP-1: Consider table of five columns and write letters of plaintext row
wise as below.
Column Column Column Column Column
1 2 3 4 5
Y O U A R
E M Y B E
S T F R I
E N D
Corresponding Number 7 14 22 0 17 4 24 14 20
Input Ciphertext N W Z Q R P V B D
Corresponding Number 13 22 25 16 17 15 21 1 3
In this technique, one-time pad is discarded after a single use, so this technique is highly secure
and suitable for small plain-text message, but this technique is impractical for large messages.
Book Cipher/Running-Key Cipher
•A portion of text from a book is used to
produce cipher text; this text acts as a one-
time pad, and characters from the book are
added to the input plain-text message in a
manner similar to the Vernam cipher.
•This basic idea behind the book cipher, also
incorrectly called running-key cipher, is
quite simple.
1.4.3 Private and Public key cryptography
• Encryption is the process of converting the original message called
plaintext into unintelligible message called ciphertext by the sender.
• For such conversion sender uses two important components namely an
algorithm and the key.