SlideShare a Scribd company logo
1 of 37
Information and Communication
Technologies(ICT)
Principles and Perspectives
Lecture : Distributed multimedia systems
Properties of secure communication
• Secrecy
• only B should understand
• Authentication
• B should be sure that sender is A
• Message integrity
• Content of the message not altered by intruder
Types of intrusion
• Passive intrusion
• eavesdropping—sniffing and recording control and data messages on the channel
• Active intrusion
• modification, insertion, or deletion of messages or message content
• key, KA, a string of numbers or characters, as input to the encryption
algorithm
• Plaintext message is m
• KA(m) refers to the ciphertext form (encrypted using the key KA) of the
plaintext message, m
• Decryption is KB(KA(m)) = m
Secrecy
Also known as cryptography
Types of cryptography
• Symmetric key cryptography
• Public key systems
Symmetric Key Cryptography
• Caesar cipher
• by taking each letter in the plaintext message and substituting the letter that is k letters
later. 25 possibilities
• Monoalphabetic cipher
• each letter is replaced by a letter a random number of letters away. 10 ^ 26 possibilities
• Attacker could break if he had some information about the message content
Scenarios for attacker
• Ciphertext only attack
• Known plaintext attack
• When an intruder knows some of the (plaintext, ciphertext) pairings
• Chosen plaintext attack
Polyalphabetic encryption
• use multiple monoalphabetic ciphers. One for each letter
• Example two Caesar ciphers, C1 and C2, in the repeating pattern C1, C2, C2,
C1, C2
• How ‘Cryptography basics’ will be encrypted?
Block Ciphers
• the message to be encrypted is processed in
blocks of k bits
• To encode a block, the cipher uses a one-to-
one mapping to map the k-bit block of
cleartext to a k-bit block of ciphertext
• If k = 3 , then one possible mapping is table
• 2^3 (= 8) possible inputs
• 8! = 40,320 permutations
• For 64 bit key, both users should have table
of 2^64 possible inputs
Challenge
• For k = 64 and for a given mapping, Alice and Bob would need to maintain a
table with 2^64 input values, which is an infeasible task
• What’s the solution
Popular Block Ciphers
1. DES (standing for Data Encryption Standard)
2. 3DES
3. AES (standing for Advanced Encryption Standard)
• Each of these standards uses functions, rather than predetermined tables
• DES uses 64-bit blocks with a 56-bit key.
• AES uses 128-bit blocks, can operate with keys that are 128, 192, and 256 bits long
• An algorithm’s key determines “mini-table” mappings and permutations within the algorithm’s
internals
• A machine that crack 56-bit DES ( all 2^56 keys) in 1 second will take 149 trillion years for 128-
bit AES key
Cipher-Block Chaining
• Two identical plaintext blocks will produce identical cipher text blocks
• Solution is to use cipher text of previous block while encrypting new block
Public key cryptography
RSA Algorithm
Ron Rivest, Adi Shamir, and Leonard Adleman
RSA Algorithm
1. Choose two large prime numbers, p and q. (5,7)
2. Compute n = pq and z = (p – 1)(q – 1). N=35, z=24
3. Choose a number, e, less than n, that has no common factors (other than 1) with z.
e=5
4. Find a number, d, such that ed – 1 is exactly divisible (that is, with no remainder) by
z. d=29 as (5x29) – 1 = 144. And 144 is exactly divisible by 24
We can also say ed mod z = 1 (5x29) mod 24 = 1
5. The public key that Bob makes available to the world, KB+, is the pair of numbers
(n, e); his private key, KB–, is the pair of numbers (n, d) public(35,5) private(29)
RSA encryption
Plain Text letter m: numeric representation m^e Ciphertext c = m e mod n
F 6 7776 6
I 9 59049 4
R 18 1889568 23
S 19 2476099 24
T 20 3200000 20
RSA encryption e=5, n=35
RSA Decryption
Cipher Text c^d
m=c^d mod
n plain text
6 36845653286788892983296 6 F
4 288230376151711744 9 I
23 3.09105864309353752279954583854e+39 18 R
24 1.062E+40 19 S
20 5.36871E+37 20 T
Decryption d=29, n=35
Session keys
• RSA is slow
• In practice it is used to encrypt session keys at start of communication
• Actual communication is encrypted using DES or some other technique
Authentication
Digital Signature
Digital Signature
Digital Signature
• Whoever signed the message must have used the private key, K–B, in
computing the signature K-B(m), such that K+B(K –B(m)) = m.
• The only person who could have known the private key, K–B, is Bob
Public key certification
• An important application of digital signatures is public key certification,
that is, certifying that a public key belongs to a specific entity
• Binding a public key to a particular entity is typically done by a Certification
Authority (CA), whose job is to validate identities and issue certificates
Message Integrity
Integrity
• Bob takes message m and applies his private key to it: dB(m).
• Bob sends the pair (m,dB(m)) to Alice.
• Alice uses Bob’s public key and applies it to the second half of the pair,
eB(dB(m)), checking to see whether the result matches the first half, i.e.
eB(dB(m)) = m. If this is the case then:
• only Bob could have sent the message (why?)
• the message was not modified in transit (again, why?).
Digest
• encryption/decryption using public key cryptography is computationally
complex. Data needs to
• be tested that the sender of the data is as claimed
• be tested that it has not been changed since the sender created and signed
the data.
• solution is only to encrypt a shortened version (aka digest)
Digest
• Digest is obtained by many to one Hash function. It has 2 properties
1. Given a message digest value, x, it is computationally infeasible to find a
message, y, such that H(y) = x. In other words, it is computationally
infeasible to reconstruct the whole message knowing its digest.
2. It is computationally infeasible to find any two messages x and y such that
H(x) = H(y). In other words it is extremely unlikely that two messages have
the same abstract
Digital Signature via Hash
• Bob takes message m and applies the hashing function, obtaining H(m).
• He then applies his private key to it: dB(H(m)).
• Bob sends the pair (m,dB(H(m))) to Alice.
• Alice uses Bob’s public key and applies it to the second half of the pair,
eB(dB(H(m))), and applies the hashing function to the first half of the
message, obtaining H(m). She then checks to see if the result of the two
computations are identical, i.e. that eB(dB(H(m))) = H(m).
Applications
Secure email
• Use public/private key
• Excellent but infeasible with long messages
• Use symmetric session keys
Sending message
Alice
1. selects a random symmetric session key, KS,
2. encrypts her message, m, with the symmetric key,
3. encrypts the symmetric key with Bob’s public key, KB+,
4. concatenates the encrypted message and the encrypted symmetric key to
form a “package,” and
5. sends the package to Bob’s e-mail address
Receiving message
Bob
1. uses his private key, KB –, to obtain the symmetric key, KS, and
2. uses the symmetric key KS to decrypt the message m
Security

More Related Content

What's hot

Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding TheoryPiyush Mittal
 
Huffman Code Decoding
Huffman Code DecodingHuffman Code Decoding
Huffman Code DecodingRex Yuan
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -IntroductionBurdwan University
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSAMohamed Loey
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Codinganithabalaprabhu
 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemTELKOMNIKA JOURNAL
 

What's hot (20)

Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Huffman Code Decoding
Huffman Code DecodingHuffman Code Decoding
Huffman Code Decoding
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Error Control Coding -Introduction
Error Control Coding -IntroductionError Control Coding -Introduction
Error Control Coding -Introduction
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
F010243136
F010243136F010243136
F010243136
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Shannon Fano
Shannon FanoShannon Fano
Shannon Fano
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Huffman coding
Huffman coding Huffman coding
Huffman coding
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb CodesLec-03 Entropy Coding I: Hoffmann & Golomb Codes
Lec-03 Entropy Coding I: Hoffmann & Golomb Codes
 
Module 4 Arithmetic Coding
Module 4 Arithmetic CodingModule 4 Arithmetic Coding
Module 4 Arithmetic Coding
 
Blind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problemBlind multi-signature scheme based on factoring and discrete logarithm problem
Blind multi-signature scheme based on factoring and discrete logarithm problem
 

Similar to Security (20)

encryption and decryption
encryption and decryptionencryption and decryption
encryption and decryption
 
CNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptxCNS 3RD UNIT PPT.pptx
CNS 3RD UNIT PPT.pptx
 
Stallings Kurose and Ross
Stallings Kurose and RossStallings Kurose and Ross
Stallings Kurose and Ross
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
network security
network security network security
network security
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Crypt
CryptCrypt
Crypt
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 

More from Saqib Shehzad

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfSaqib Shehzad
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continuedSaqib Shehzad
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability EvaluationSaqib Shehzad
 
User centered Design
User centered DesignUser centered Design
User centered DesignSaqib Shehzad
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCISaqib Shehzad
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworksSaqib Shehzad
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attentionSaqib Shehzad
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionSaqib Shehzad
 

More from Saqib Shehzad (20)

خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdfخاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
خاکہ برائے درسِ مختصر البخاری۔ کتاب العلم 20.pdf
 
wireless networks
wireless networkswireless networks
wireless networks
 
wireless networks
wireless networkswireless networks
wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia networks
Multimedia networksMultimedia networks
Multimedia networks
 
Multimedia continued
Multimedia continuedMultimedia continued
Multimedia continued
 
Multimedia
MultimediaMultimedia
Multimedia
 
Usability Evaluation
Usability EvaluationUsability Evaluation
Usability Evaluation
 
Prototype in HCI
Prototype in HCIPrototype in HCI
Prototype in HCI
 
User centered Design
User centered DesignUser centered Design
User centered Design
 
HCI
HCIHCI
HCI
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Interaction styles
Interaction stylesInteraction styles
Interaction styles
 
Cognitive frameworks
Cognitive frameworksCognitive frameworks
Cognitive frameworks
 
Cognition, information processing, perception and attention
Cognition, information processing, perception and attentionCognition, information processing, perception and attention
Cognition, information processing, perception and attention
 
Conceptual Model
Conceptual ModelConceptual Model
Conceptual Model
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Security

  • 1. Information and Communication Technologies(ICT) Principles and Perspectives Lecture : Distributed multimedia systems
  • 2. Properties of secure communication • Secrecy • only B should understand • Authentication • B should be sure that sender is A • Message integrity • Content of the message not altered by intruder
  • 3. Types of intrusion • Passive intrusion • eavesdropping—sniffing and recording control and data messages on the channel • Active intrusion • modification, insertion, or deletion of messages or message content
  • 4.
  • 5. • key, KA, a string of numbers or characters, as input to the encryption algorithm • Plaintext message is m • KA(m) refers to the ciphertext form (encrypted using the key KA) of the plaintext message, m • Decryption is KB(KA(m)) = m
  • 6. Secrecy Also known as cryptography
  • 7. Types of cryptography • Symmetric key cryptography • Public key systems
  • 8. Symmetric Key Cryptography • Caesar cipher • by taking each letter in the plaintext message and substituting the letter that is k letters later. 25 possibilities • Monoalphabetic cipher • each letter is replaced by a letter a random number of letters away. 10 ^ 26 possibilities • Attacker could break if he had some information about the message content
  • 9. Scenarios for attacker • Ciphertext only attack • Known plaintext attack • When an intruder knows some of the (plaintext, ciphertext) pairings • Chosen plaintext attack
  • 10. Polyalphabetic encryption • use multiple monoalphabetic ciphers. One for each letter • Example two Caesar ciphers, C1 and C2, in the repeating pattern C1, C2, C2, C1, C2 • How ‘Cryptography basics’ will be encrypted?
  • 11. Block Ciphers • the message to be encrypted is processed in blocks of k bits • To encode a block, the cipher uses a one-to- one mapping to map the k-bit block of cleartext to a k-bit block of ciphertext • If k = 3 , then one possible mapping is table • 2^3 (= 8) possible inputs • 8! = 40,320 permutations • For 64 bit key, both users should have table of 2^64 possible inputs
  • 12. Challenge • For k = 64 and for a given mapping, Alice and Bob would need to maintain a table with 2^64 input values, which is an infeasible task • What’s the solution
  • 13.
  • 14. Popular Block Ciphers 1. DES (standing for Data Encryption Standard) 2. 3DES 3. AES (standing for Advanced Encryption Standard) • Each of these standards uses functions, rather than predetermined tables • DES uses 64-bit blocks with a 56-bit key. • AES uses 128-bit blocks, can operate with keys that are 128, 192, and 256 bits long • An algorithm’s key determines “mini-table” mappings and permutations within the algorithm’s internals • A machine that crack 56-bit DES ( all 2^56 keys) in 1 second will take 149 trillion years for 128- bit AES key
  • 15. Cipher-Block Chaining • Two identical plaintext blocks will produce identical cipher text blocks • Solution is to use cipher text of previous block while encrypting new block
  • 16.
  • 18. RSA Algorithm Ron Rivest, Adi Shamir, and Leonard Adleman
  • 19. RSA Algorithm 1. Choose two large prime numbers, p and q. (5,7) 2. Compute n = pq and z = (p – 1)(q – 1). N=35, z=24 3. Choose a number, e, less than n, that has no common factors (other than 1) with z. e=5 4. Find a number, d, such that ed – 1 is exactly divisible (that is, with no remainder) by z. d=29 as (5x29) – 1 = 144. And 144 is exactly divisible by 24 We can also say ed mod z = 1 (5x29) mod 24 = 1 5. The public key that Bob makes available to the world, KB+, is the pair of numbers (n, e); his private key, KB–, is the pair of numbers (n, d) public(35,5) private(29)
  • 20. RSA encryption Plain Text letter m: numeric representation m^e Ciphertext c = m e mod n F 6 7776 6 I 9 59049 4 R 18 1889568 23 S 19 2476099 24 T 20 3200000 20 RSA encryption e=5, n=35
  • 21. RSA Decryption Cipher Text c^d m=c^d mod n plain text 6 36845653286788892983296 6 F 4 288230376151711744 9 I 23 3.09105864309353752279954583854e+39 18 R 24 1.062E+40 19 S 20 5.36871E+37 20 T Decryption d=29, n=35
  • 22. Session keys • RSA is slow • In practice it is used to encrypt session keys at start of communication • Actual communication is encrypted using DES or some other technique
  • 25. Digital Signature • Whoever signed the message must have used the private key, K–B, in computing the signature K-B(m), such that K+B(K –B(m)) = m. • The only person who could have known the private key, K–B, is Bob
  • 26. Public key certification • An important application of digital signatures is public key certification, that is, certifying that a public key belongs to a specific entity • Binding a public key to a particular entity is typically done by a Certification Authority (CA), whose job is to validate identities and issue certificates
  • 28. Integrity • Bob takes message m and applies his private key to it: dB(m). • Bob sends the pair (m,dB(m)) to Alice. • Alice uses Bob’s public key and applies it to the second half of the pair, eB(dB(m)), checking to see whether the result matches the first half, i.e. eB(dB(m)) = m. If this is the case then: • only Bob could have sent the message (why?) • the message was not modified in transit (again, why?).
  • 29. Digest • encryption/decryption using public key cryptography is computationally complex. Data needs to • be tested that the sender of the data is as claimed • be tested that it has not been changed since the sender created and signed the data. • solution is only to encrypt a shortened version (aka digest)
  • 30. Digest • Digest is obtained by many to one Hash function. It has 2 properties 1. Given a message digest value, x, it is computationally infeasible to find a message, y, such that H(y) = x. In other words, it is computationally infeasible to reconstruct the whole message knowing its digest. 2. It is computationally infeasible to find any two messages x and y such that H(x) = H(y). In other words it is extremely unlikely that two messages have the same abstract
  • 31. Digital Signature via Hash • Bob takes message m and applies the hashing function, obtaining H(m). • He then applies his private key to it: dB(H(m)). • Bob sends the pair (m,dB(H(m))) to Alice. • Alice uses Bob’s public key and applies it to the second half of the pair, eB(dB(H(m))), and applies the hashing function to the first half of the message, obtaining H(m). She then checks to see if the result of the two computations are identical, i.e. that eB(dB(H(m))) = H(m).
  • 33. Secure email • Use public/private key • Excellent but infeasible with long messages • Use symmetric session keys
  • 34.
  • 35. Sending message Alice 1. selects a random symmetric session key, KS, 2. encrypts her message, m, with the symmetric key, 3. encrypts the symmetric key with Bob’s public key, KB+, 4. concatenates the encrypted message and the encrypted symmetric key to form a “package,” and 5. sends the package to Bob’s e-mail address
  • 36. Receiving message Bob 1. uses his private key, KB –, to obtain the symmetric key, KS, and 2. uses the symmetric key KS to decrypt the message m

Editor's Notes

  1. Cryptographic Components
  2. Block cipher
  3. Cipher Block Chaining
  4. Symmetric session key with public/private key