SlideShare a Scribd company logo
1 of 22
IT346 Information
System Security

Week 4-1: Stream Cipher
& Asymmetric Key
Cryptography
Faculty of Information Technology

Page

1
Symmetric Key
Cryptography

Cryptography



Symmetric Key
Plaintext

(Block Cipher)
‣
• DES:
• 3DES:
• AES:

1

1 Data Block = 64 bits
1 Data Block = 64 bits
1 Data Block = 128 bits

(Stream Cipher)
‣

Faculty of Information Technology

Page

2
Stream Ciphers
bit


‣

 Key
‣ Keystream

bit

(Stream)

Keystream

Stream
Cipher
pseudorandom keystream
‣ Pseudorandom

Faculty of Information Technology

Page

3
Stream Ciphers
bit



(




Keystream
XOR)
bit
random
keystream
plaintext
plaintext

Keystream
C = P XOR
plaintext StreamKey Key
encrypt
i

Faculty of Information Technology

i

i

Page

4
Stream Ciphers


Secret Key

Seed
Keystream
Key

Stream Cipher
Pseudorandom

K

Key
K

KeyStream Generator
(Pseudorandom byte
generator)

KeyStream Generator
(Pseudorandom byte
generator)

Plaintext
Byte
Stream
P

+
ENCRYPTION

Faculty of Information Technology

Ciphertext
Byte
Stream
C

+

Plaintext
Byte
Stream
P

DECRYPTION

Page

5
One-Time-Pad
(OTP)
 Stream Cipher

One-Time-Pad
Cipher
break

‣ Keystream

Vernam
(unbreakable cipher)

random number
Secret Key
Pseudorandom number generator
‣ Secret Key
OTP
Keystream
plaintext
OTP

Faculty of Information Technology

OTP

Page

6
Stream Cipher
Properties


Encryption

‣

‣ Keystream

random

Stream Cipher

random

‣ Secret Key

Brute-force Attack
bits


Faculty of Information Technology

Page

7
RC4
 RC4

Stream Cipher
Ron Rivest
RSA Security (Security
Company)

Key
(variable key size)
(Byte-oriented
Stream Cipher)
random permutation
 RC4
SSL/TLS
wireless WEP
Faculty of Information Technology

Page

8
Attack on
Cryptography
 Cryptanalysis

plaintext
break

encrypt

‣ Ciphertext-only attack

encrypt

Key

key

ciphertext

key
‣ Known-plaintext attack
plaintext
key
key
‣ Chosen-plaintext attack
Faculty of Information Technology

plaintext

ciphertext
ciphertext
Page

9
Asymmetric Key
Cryptography
(Public Key
Cryptography)

Faculty of Information Technology

Page

10
Asymmetric Key
Cryptography


encrypt
‣

‣
‣

symmetric key cryptography
key
decrypt
key

Key
Key
key

‣

ciphertext
Faculty of Information Technology

Symmetric Key Encryption

Page

11
Asymmetric Key
Cryptography


cryptosystem
cryptography
‣ Public Key

asymmetric key
key
key

‣ Private Key

key

Encryption


‣

public key

encrypt
Faculty of Information Technology

public key
Page

12
Asymmetric Key
Cryptography

Faculty of Information Technology

Page

13
Asymmetric
Encryption

 Public-Key Cryptosystem
‣
encrypt
ciphertext
decrypt
plaintext P = Plaintext
E(P, PKreceiver) = C

‣

public key
private key
encryption
decryption

‣

Plaintext
Faculty of Information Technology

E(C, SKreceiver) = P

C = Cipherte
PK = Public K
SK = Private

public key
private
Public Key key Private Key
Ciphertext
Encryp
Decryp
tion
tion

Plaintext
Page

14
Public Key
Cryptography

 Public Key Cryptography

one-way function

‣ One-Way Function

(Multiplication)
(Factorization)

‣
•

x12 = 144
•

x12

144

= 12x12 = 144x1 = 24x6, …
Faculty of Information Technology

Page

15


Symmetric Key
Cryptography
Asymmetric Key
Cryptography
‣

Security Goals
Confidentiality, Integrity, Authenticity, Av
ailability
Non-Repudiation

‣

Faculty of Information Technology

Page

16
 RSA Algorithm
 Diffie-Hellman Algorithm (

Key Exchange)
 Elliptic Curve Cryptography
 Digital Signature Algorithm

Faculty of Information Technology

Page

17
RSA
 RSA

Adi Shamir)
Len Adleman) MIT

Faculty of Information Technology

Ron Rivest)
RSA

Page

18
RSA



(prime number) p

q
‣





gcd
‣
Faculty of Information Technology

n = pq
m = (p-1)(q-1)
e 1<e<m
e
m
e

e

m

gcd(e, m)
Page

19
RSA Encryption


M
M<n
Public Key (e, n)

‣ Ciphertext C = Me mod n

RSA Decryption

ciphertext C
(d, n)
‣ Message

Private Key

M = Cd mod n


‣ p = 5, q = 7, n = 35, m = 24

Faculty of Information Technology

Page

20
 n = 35, e = 5
Plaintext

M

Me

Ciphertext = Me mod n

L

12

248832

17

O

15

759375

15

V

22

5153632

22

E

5

3125

10

Faculty of Information Technology

Page

21
 n = 35, d = 29
Cd

Ciphertext

M= Cd mod n

Plaintext

17

48196857210675091509141182522307000

12

L

15

12783403948858939111232757568359400

15

O

22

8.5164331908653770195619449972111e+38

22

V

5

E

10

Faculty of Information Technology

Page

22

More Related Content

Viewers also liked

Viewers also liked (10)

Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Key management
Key managementKey management
Key management
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Quan nguyen symmetric versus asymmetric cryptography
Quan nguyen   symmetric versus asymmetric cryptographyQuan nguyen   symmetric versus asymmetric cryptography
Quan nguyen symmetric versus asymmetric cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 

Similar to Information system security it346 wk4-1

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

Similar to Information system security it346 wk4-1 (20)

Why are we still vulnerable to Side Channel Attacks?
Why are we still vulnerable to Side Channel Attacks?Why are we still vulnerable to Side Channel Attacks?
Why are we still vulnerable to Side Channel Attacks?
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
[KGC 2010] 게임과 보안, 암호 알고리즘과 프로토콜
 
Cryptography
CryptographyCryptography
Cryptography
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
Common Crypto Pitfalls
Common Crypto PitfallsCommon Crypto Pitfalls
Common Crypto Pitfalls
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Engineering Cryptographic Applications: Symmetric Encryption
Engineering Cryptographic Applications: Symmetric EncryptionEngineering Cryptographic Applications: Symmetric Encryption
Engineering Cryptographic Applications: Symmetric Encryption
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
rsa.ppt
rsa.pptrsa.ppt
rsa.ppt
 

More from Bee Lalita (12)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk5-2-authentication
Information system security wk5-2-authenticationInformation system security wk5-2-authentication
Information system security wk5-2-authentication
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Information system security it346 wk4-1