Module 4
Module 4
Information Security
Introduction
Real-Time Applications:
•Lottery systems
•Gaming (slot machines, online
games)
•Security tokens (e.g., RSA
SecurID for OTPs)
Pseudorandom Numbers
• Subheadings:Key Characteristics:
• Deterministic (predictable if seed is known)
• Periodic and repeatable
• Generated by algorithms
• Source:
• Generated through algorithms like Linear
Congruential Generator (LCG)
Real-Time Application
• Game Simulations
• Simple Cryptography
Python's Random Module
)
Machine
Real-Time
Learning
Application:
Simulations
RSA ALGORITHM
Security of RSA
Key Characteristics:
• Faster than MD2
• Widely used for checksums and non-cryptographic purposes
• Vulnerable to Collision Attacks
• Status: Deprecated for secure applications but still used in non-critical cases.
Step-by-Step Explanation of the MD5 Algorithm
Key Variants:
• SHA-1: 160-bit (obsolete)
• SHA-2: Includes SHA-224, SHA-256, SHA-384, SHA-512
• SHA-3: A newer algorithm based on the Keccak function,
uses sponge construction.
SHA-2 Overview
Variants:
• SHA-224: 224-bit hash
• SHA-256: 256-bit hash (most widely used)
• SHA-384: 384-bit hash
• SHA-512: 512-bit hash (used in high-security applications)
Key Characteristics:
• Based on the Merkle-Damgård construction.
• Resistant to collision and pre-image attacks (unlike MD5 and SHA-1).
• Common in Blockchain, SSL/TLS, Digital Signatures.
Secure Hash Algorithm (SHA)
2. Generate Signature
Components
Generate Receiver’s
Hash Code
2. Signature
Verification:
Real-
World
Example
Enhanced Security
Legally Binding
Benefits
of Digital Non-repudiation
Signatures Immutability
Identification
Fraud Prevention
Compatibility Issues
Software Dependency
Limitations Loss of Keys
of Digital
Standardization Needs
Signatures
Certificate and Verification Costs
Security Concerns
Financial Transactions
Real- E-Government and E-Voting
World Healthcare
Use
Legal Contracts
Cases
E-Commerce
KERBEROS
Components
of Kerberos
Kerberos Authentication Process
Step 3: User
Step 4: TGS Issues
Decrypts TGT and
Service Ticket
Sends it to TGS
User Authentication in
Single Sign-On (SSO) Windows Active
Directory (AD)
Mutual Authentication
Network File System
for Secure Network
(NFS) Authentication
Communication
Authorization and
Access Control in
Applications
Advantages of Kerberos
Secure Authentication
Mutual Authentication
Centralized Authentication
Widely Used
Dependency on Time
Synchronization
Limitations of
Scalability
Kerberos
Network Service Modification
Digital Identities
Security
Advantages
of X.509
Scalability
Authenticati
on
Trustworthiness
Compatibility
Dependency on Trusted
Cas
Limitations
of X.509 Certificate Management
Authenticati
on Revocation Complexity
Cost
Pretty Good Privacy (PGP)
Authentication in PGP
Confidentiality in PGP
The combined authentication and
confidentiality