SlideShare a Scribd company logo
Security
Lecture 3
Difference between Active attack and Passive
attack
What is cryptographic Security Attack?
A cryptographic attack is a method for circumventing the security
of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol
or key management scheme. This process is also called “cryptanalysis ”
.
Types of Security Attack
There are two types of Security Attack in cryptography: Active Attack dna Passive Attack.
Types of Active Attack:lpeR ,edareuqsaM
ay Attack, Modification of message, Denial of Services.
Types of Passive Attack: sisylanA ciffarT ,tnetnoc egassem fo esaeleR
.
Passive Attack
• The goal of the attacker is to obtain information that is being
transmitted. A telephonic conversation, an electronic mail message
and a transferred file may contain sensitive or confidential
information. In this type of passive attack, message cannot modify by
attacker. Attacker just read the message and then release the
message. There may be a delay to reach message at receiver end.
• For example, B sent message to A, A receives message. But before
receiving message, message was read by unauthorized person.
• This kind of passive attack cannot by recognize/identified during
massage transmission. It does not affect the system, just monitor data
in network.
Passive Attack Release of message content
• Intruders checks the contents of message or other information, even
if they captured the message but could not extract the information
from the message. The opponent might observe a pattern of message
to get the location, or any clue regarding the origin of message.
Passive attack is very difficult to detect, because they do not involve
any alteration of the data.
Traffic Analysis
Active Attack
• Masquerade
• A masquerade take place when an attacker pretends to be an
authentic user. Authentication sequence can be captured & replayed
after a valid authentication sequence has taken place. It generally
done to gain access to a system, or steal information from system.
•
Active Attack
• Replay Attack
• Replay involves the passive capture of data unit and its subsequent
retransmission to produce an unauthorized effect. A replay attack is also
known as playback attack where attacker repeatedly keeps on transmitting
valid data again and again to make the network jam or delayed the
transmission of data.
• For example, A and C have bank account in Bank B. A send request to bank
B for fund transfer in C’s account. C capture the message produce
unauthorized effect of message and get benefits twice for fund transfer.
One is from original message and second is from unauthorized message.
Active Attack
Active Attack
• Modification of Message
Some portion message is altered, or that message is delayed or recorded to produce unauthorized effect. When content
of message modified after sender sends it but before it reaches to concerned receiver, such type of attack is called
modification of message.
For example, A message is “Virat will play and also captain in next match” is modified to “Rohit will play and also captain
in next match.”
Active Attack
• Denial of Services
• Denial of service attack means making the network unavailable for
the user those who want to communicate securely. Flood the entire
network or server with traffic until shutdown occurs because if
overload.
Difference between Active Attack and Passive Attack
• Hill Cipher is polyalphabetic substitution cipher. This technique was developed
by mathematician Laster Hill. Hill cipher based on linear algebra. Input of this
technique are keyword and plain text. Keyword is given in matrix form.
Hill Cipher
Rules of encryption is as follows:
Step-1: Assign a number to each character of the Plain-Text, like
(a = 0, b = 1, c = 2, … z = 25). As per given table.
For Example, Plain Text = SUNDAY ⇒ S = 18, U = 20, N = 13, D = 3,
A = 0, Y = 24
Hill Cipher
Step-2: 2x2 or 3x3 key matrix is given,
Hill Cipher
• Step-3: Make a group of plain text as per given key matrix size. Each
pair of plain text multiply with key matrix.
• For Example, Plain Text = SUNDAY
• If key matrix is 2 x 2, Plain text divided in into group of 2 alphabets:
SU ND AY
• If key matrix is 3 x 3, Plain text divided in into group of 3 alphabets:
SUN DAY
Hill Cipher
• Step-4: Multiplication of plain text matrix and key word matrix
generate new matrix.
• Step-5: Newly generated matrix values modules with 26.
• Step-6: After modules 26, matrix values assign characters using rule
no 1 table. It generates final cipher text.
•
Rules of decryption for Hill Cipher
• Step-1: Assign a number to each character of the cipher text, like (a =
0, b = 1, c = 2, … z = 25). As per given table.
• For Example, Cipher Text = SUNDAY ⇒ S = 18, U = 20, N = 13, D = 3, A
= 0, Y = 24
Rules of decryption for Hill Cipher
• Step-2: Find the inverse of given key matrix (2x2 or 3x3),
• Step-3: Make a group of Cipher text as per given key matrix size. Each pair of Cipher text multiply with
inverse key matrix.
• For Example, Plain Text = SUNDAY
• If key matrix is 2 x 2, Plain text divided in into group of 2 alphabets: SU ND AY
• If key matrix is 3 x 3, Plain text divided in into group of 3 alphabets: SUN DAY
• Step-4: Multiplication of cipher text matrix and inverse key word matrix generate new matrix.
• Step-5: Newly generated matrix values modules with 26.
• Step-6: After modules 26, matrix values assign characters using rule no 1 table. It generates final plain text.
Example of Hill Cipher (Key Matrix 2x2)
• Encryption Process
Example of Hill Cipher (Key Matrix 2x2)
• Decryption Process
Example of Hill Cipher (Key Matrix 3x3)
• The Columnar Transposition Cipher is a form of transposition cipher in
which plain text represent in matrix form. Columnar Transposition
involves writing the plaintext out in rows, and then reading the
ciphertext off in columns one by one. Here I have explained
encryption and decryption process of columnar transposition cipher.
Columnar Transposition Cipher
Rules of Encryption Process
Example: = htgnel yeK( KCAH = yeK ,NEERG SI EERT :txeTnialP
4
)
Step-1 :Width of the rows and the permutation of the columns are usually defined by a keyword
Columnar Transposition Cipher
Step-2: Keyword HACK is of length 4 (so the rows are of length 4), and the permutation is defined by the alphabetical
order of the letters in the keyword. In this case, the order would be “3 1 2 4”.
Step-3: The message is written out in rows of a fixed length.
Step-4: Any spare spaces are filled with nulls or left blank or placed by a character (Example: _)
Columnar Transposition Cipher
Step-5: Finally, the message is read off in columns, in the order specified by the keyword.
Rules of Decryption Process for Columnar
Transposition Cipher
As per above example:
Cipher Text: R I R _ E S E _ T _ G N E _ E_
Key = HACK (Key length= 4)
Step1: To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length.
Rules of Decryption Process for Columnar
Transposition Cipher
• Step-2: Then, write the cipher text in columns again, then re-order
the columns by reforming the keyword. Read matrix row wise to get
plain text.

More Related Content

Similar to Difference between Active attack and Passive attack

Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
Zara Nawaz
 
Cns 1
Cns 1Cns 1
Cryptography and its types and Number Theory .pptx
Cryptography and its types and Number Theory  .pptxCryptography and its types and Number Theory  .pptx
Cryptography and its types and Number Theory .pptx
GoharCh3
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
zerihunnana
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
Kaya Ota
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
JAINAM KAPADIYA
 
NETWORK SECURITY
NETWORK SECURITY NETWORK SECURITY
NETWORK SECURITY
TouseeqHaider11
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
nagwaAboElenein
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
ChethanKrishna14
 
Abstract
AbstractAbstract
Abstract
rajugnt
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
EC-Council
 
Solutions crypto4e
Solutions crypto4eSolutions crypto4e
Solutions crypto4e
Jack Ndahiro
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.ppt
wwww63
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's traffic
Sandipan Biswas
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
Taymoor Nazmy
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 

Similar to Difference between Active attack and Passive attack (20)

Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)Information security (Symmetric encryption, cryptography, crypto-analysis)
Information security (Symmetric encryption, cryptography, crypto-analysis)
 
Cns 1
Cns 1Cns 1
Cns 1
 
Cryptography and its types and Number Theory .pptx
Cryptography and its types and Number Theory  .pptxCryptography and its types and Number Theory  .pptx
Cryptography and its types and Number Theory .pptx
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cs166 mynote
Cs166 mynoteCs166 mynote
Cs166 mynote
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
NETWORK SECURITY
NETWORK SECURITY NETWORK SECURITY
NETWORK SECURITY
 
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
security Symmetric Key Cryptography Substitution Cipher, Transposition Cipher.
 
cryptography symmentric.pptx
cryptography symmentric.pptxcryptography symmentric.pptx
cryptography symmentric.pptx
 
Abstract
AbstractAbstract
Abstract
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Solutions crypto4e
Solutions crypto4eSolutions crypto4e
Solutions crypto4e
 
14_526_topic04.ppt
14_526_topic04.ppt14_526_topic04.ppt
14_526_topic04.ppt
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's traffic
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 

More from nagwaAboElenein

Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
nagwaAboElenein
 
Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
nagwaAboElenein
 
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
nagwaAboElenein
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
nagwaAboElenein
 
brain tumor.pptx
brain tumor.pptxbrain tumor.pptx
brain tumor.pptx
nagwaAboElenein
 
Lec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdfLec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdf
nagwaAboElenein
 
Lec_8_Image Compression.pdf
Lec_8_Image Compression.pdfLec_8_Image Compression.pdf
Lec_8_Image Compression.pdf
nagwaAboElenein
 
Semantic Segmentation.pdf
Semantic Segmentation.pdfSemantic Segmentation.pdf
Semantic Segmentation.pdf
nagwaAboElenein
 
lecture1.pptx
lecture1.pptxlecture1.pptx
lecture1.pptx
nagwaAboElenein
 
Lec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdfLec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdf
nagwaAboElenein
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
nagwaAboElenein
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdf
nagwaAboElenein
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
nagwaAboElenein
 
Lecture3.pptx
Lecture3.pptxLecture3.pptx
Lecture3.pptx
nagwaAboElenein
 
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdfImage Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
nagwaAboElenein
 
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdfFundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
nagwaAboElenein
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
nagwaAboElenein
 

More from nagwaAboElenein (17)

Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
 
Chapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptxChapter 1: Computer Vision Introduction.pptx
Chapter 1: Computer Vision Introduction.pptx
 
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
研究生学位论文在线提交Electronic thesis online submission(20210527).ppt
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
 
brain tumor.pptx
brain tumor.pptxbrain tumor.pptx
brain tumor.pptx
 
Lec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdfLec_9_ Morphological ImageProcessing .pdf
Lec_9_ Morphological ImageProcessing .pdf
 
Lec_8_Image Compression.pdf
Lec_8_Image Compression.pdfLec_8_Image Compression.pdf
Lec_8_Image Compression.pdf
 
Semantic Segmentation.pdf
Semantic Segmentation.pdfSemantic Segmentation.pdf
Semantic Segmentation.pdf
 
lecture1.pptx
lecture1.pptxlecture1.pptx
lecture1.pptx
 
Lec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdfLec_4_Frequency Domain Filtering-I.pdf
Lec_4_Frequency Domain Filtering-I.pdf
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdf
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
 
Lecture3.pptx
Lecture3.pptxLecture3.pptx
Lecture3.pptx
 
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdfImage Segmentation Techniques for Remote Sensing Satellite Images.pdf
Image Segmentation Techniques for Remote Sensing Satellite Images.pdf
 
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdfFundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
Fundamentals_of_Digital image processing_A practicle approach with MatLab.pdf
 
Lec_1_Introduction.pdf
Lec_1_Introduction.pdfLec_1_Introduction.pdf
Lec_1_Introduction.pdf
 

Recently uploaded

Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 

Recently uploaded (20)

Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 

Difference between Active attack and Passive attack

  • 2. Difference between Active attack and Passive attack What is cryptographic Security Attack? A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme. This process is also called “cryptanalysis ” . Types of Security Attack There are two types of Security Attack in cryptography: Active Attack dna Passive Attack. Types of Active Attack:lpeR ,edareuqsaM ay Attack, Modification of message, Denial of Services. Types of Passive Attack: sisylanA ciffarT ,tnetnoc egassem fo esaeleR .
  • 3.
  • 4. Passive Attack • The goal of the attacker is to obtain information that is being transmitted. A telephonic conversation, an electronic mail message and a transferred file may contain sensitive or confidential information. In this type of passive attack, message cannot modify by attacker. Attacker just read the message and then release the message. There may be a delay to reach message at receiver end. • For example, B sent message to A, A receives message. But before receiving message, message was read by unauthorized person. • This kind of passive attack cannot by recognize/identified during massage transmission. It does not affect the system, just monitor data in network.
  • 5. Passive Attack Release of message content
  • 6. • Intruders checks the contents of message or other information, even if they captured the message but could not extract the information from the message. The opponent might observe a pattern of message to get the location, or any clue regarding the origin of message. Passive attack is very difficult to detect, because they do not involve any alteration of the data. Traffic Analysis
  • 7. Active Attack • Masquerade • A masquerade take place when an attacker pretends to be an authentic user. Authentication sequence can be captured & replayed after a valid authentication sequence has taken place. It generally done to gain access to a system, or steal information from system. •
  • 8. Active Attack • Replay Attack • Replay involves the passive capture of data unit and its subsequent retransmission to produce an unauthorized effect. A replay attack is also known as playback attack where attacker repeatedly keeps on transmitting valid data again and again to make the network jam or delayed the transmission of data. • For example, A and C have bank account in Bank B. A send request to bank B for fund transfer in C’s account. C capture the message produce unauthorized effect of message and get benefits twice for fund transfer. One is from original message and second is from unauthorized message.
  • 10. Active Attack • Modification of Message Some portion message is altered, or that message is delayed or recorded to produce unauthorized effect. When content of message modified after sender sends it but before it reaches to concerned receiver, such type of attack is called modification of message. For example, A message is “Virat will play and also captain in next match” is modified to “Rohit will play and also captain in next match.”
  • 11. Active Attack • Denial of Services • Denial of service attack means making the network unavailable for the user those who want to communicate securely. Flood the entire network or server with traffic until shutdown occurs because if overload.
  • 12. Difference between Active Attack and Passive Attack
  • 13. • Hill Cipher is polyalphabetic substitution cipher. This technique was developed by mathematician Laster Hill. Hill cipher based on linear algebra. Input of this technique are keyword and plain text. Keyword is given in matrix form. Hill Cipher Rules of encryption is as follows: Step-1: Assign a number to each character of the Plain-Text, like (a = 0, b = 1, c = 2, … z = 25). As per given table. For Example, Plain Text = SUNDAY ⇒ S = 18, U = 20, N = 13, D = 3, A = 0, Y = 24
  • 14. Hill Cipher Step-2: 2x2 or 3x3 key matrix is given,
  • 15. Hill Cipher • Step-3: Make a group of plain text as per given key matrix size. Each pair of plain text multiply with key matrix. • For Example, Plain Text = SUNDAY • If key matrix is 2 x 2, Plain text divided in into group of 2 alphabets: SU ND AY • If key matrix is 3 x 3, Plain text divided in into group of 3 alphabets: SUN DAY
  • 16. Hill Cipher • Step-4: Multiplication of plain text matrix and key word matrix generate new matrix. • Step-5: Newly generated matrix values modules with 26. • Step-6: After modules 26, matrix values assign characters using rule no 1 table. It generates final cipher text. •
  • 17. Rules of decryption for Hill Cipher • Step-1: Assign a number to each character of the cipher text, like (a = 0, b = 1, c = 2, … z = 25). As per given table. • For Example, Cipher Text = SUNDAY ⇒ S = 18, U = 20, N = 13, D = 3, A = 0, Y = 24
  • 18. Rules of decryption for Hill Cipher • Step-2: Find the inverse of given key matrix (2x2 or 3x3), • Step-3: Make a group of Cipher text as per given key matrix size. Each pair of Cipher text multiply with inverse key matrix. • For Example, Plain Text = SUNDAY • If key matrix is 2 x 2, Plain text divided in into group of 2 alphabets: SU ND AY • If key matrix is 3 x 3, Plain text divided in into group of 3 alphabets: SUN DAY • Step-4: Multiplication of cipher text matrix and inverse key word matrix generate new matrix. • Step-5: Newly generated matrix values modules with 26. • Step-6: After modules 26, matrix values assign characters using rule no 1 table. It generates final plain text.
  • 19. Example of Hill Cipher (Key Matrix 2x2) • Encryption Process
  • 20. Example of Hill Cipher (Key Matrix 2x2) • Decryption Process
  • 21. Example of Hill Cipher (Key Matrix 3x3)
  • 22. • The Columnar Transposition Cipher is a form of transposition cipher in which plain text represent in matrix form. Columnar Transposition involves writing the plaintext out in rows, and then reading the ciphertext off in columns one by one. Here I have explained encryption and decryption process of columnar transposition cipher. Columnar Transposition Cipher Rules of Encryption Process Example: = htgnel yeK( KCAH = yeK ,NEERG SI EERT :txeTnialP 4 ) Step-1 :Width of the rows and the permutation of the columns are usually defined by a keyword
  • 23. Columnar Transposition Cipher Step-2: Keyword HACK is of length 4 (so the rows are of length 4), and the permutation is defined by the alphabetical order of the letters in the keyword. In this case, the order would be “3 1 2 4”. Step-3: The message is written out in rows of a fixed length. Step-4: Any spare spaces are filled with nulls or left blank or placed by a character (Example: _)
  • 24. Columnar Transposition Cipher Step-5: Finally, the message is read off in columns, in the order specified by the keyword.
  • 25. Rules of Decryption Process for Columnar Transposition Cipher As per above example: Cipher Text: R I R _ E S E _ T _ G N E _ E_ Key = HACK (Key length= 4) Step1: To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length.
  • 26. Rules of Decryption Process for Columnar Transposition Cipher • Step-2: Then, write the cipher text in columns again, then re-order the columns by reforming the keyword. Read matrix row wise to get plain text.