Information Security
Department of Computer Science
and
Name :Turai Swathi
Admin No: 25EG305A54
Course1 : Seminar Review-2
Supervisor
Name : Dr.Yeddu Kondalu
Designation:Assistant Professor
Agenda
• Introduction
• What is Information Security
• CNSS Security Model
• Components of Information System
• Balancing Information Security and Access.
• Approaches
• Security System Development Life Cycle
• Cryptography
• Symmetric vs. Asymmetric Cryptography
• Steganography
• Data Encryption Standard (DES)
• Variants of DES(Triple DES)
• Block Cipher Modes of Operation
• Advanced Encryption Standard
• RSA & Diffie-Hellman Key Exchange
Data Encryption Standard (DES) - Structure
Block Cipher Encryption
DES operates as a block cipher,
meaning it encrypts data in
fixed-size blocks (64 bits). Each
block undergoes multiple
rounds of complex
transformations, mixing and
permuting the data based on the
key.
Multiple Rounds
The encryption process in DES
involves 16 identical rounds of
operations, including
substitution, permutation, and
key mixing. These rounds
enhance the security by
diffusing and confusing the
input data.
56-Bit Key Length
DES utilizes a 56-bit key for its
operations. While this was
considered robust at the time
of its invention (1970s),
modern computing power has
made this key length
vulnerable to brute-force
attacks.
Ex: A 16-Step Safe Lock
Think of DES like a safe with 16
distinct locking steps. To open
it, you need to correctly navigate
each step. The more steps, the
more complex the process.
DES - Analysis & Security
Despite its historical significance, the Data Encryption
Standard (DES) is no longer considered secure for
protecting sensitive information today. Its primary
vulnerability lies in its relatively short 56-bit key length.
Modern computing power, including specialized hardware
and cloud computing, can perform a brute-force attack on a
56-bit key within a matter of hours or even minutes.
Therefore, DES is now primarily used for educational
purposes or as a component within more secure, enhanced
cryptographic systems.
Example: An Old-Style Lock
Consider DES as an old-style lock that, with enough
effort and the right tools (modern computing power),
can be picked. While it served its purpose in its era,
it's no match for today's sophisticated lock-picking
techniques.
Variants of DES: Extending Security with 3DES
To address the security vulnerabilities of the original DES due to its
short key length, a more robust variant called Triple DES (3DES or
TDES) was developed. 3DES significantly enhances security by
applying the DES algorithm multiple times.
Instead of a single encryption pass, 3DES typically uses three
applications of the DES algorithm with either two or three distinct
keys. This multi-layered encryption process makes brute-force
attacks significantly more computationally intensive, thus
improving its resistance to attacks compared to single DES.
Example: Three-Locked Suitcase
Imagine locking your suitcase three times with
different, unique keys. An attacker would need to
unlock it three separate times, each with a different
key, making it far more secure than just one lock.
DES Enhancements(Simple Process)
The Power of Three (3DES)
To overcome the security limitations of the original DES, the Triple DES (3DES) algorithm was
developed. This variant applies the DES encryption algorithm three times in succession, using either two
or three different keys, significantly increasing its security.
Key 1 Encryption
The plaintext is encrypted with the
first key.
Key 2 Decryption
The result is then decrypted with the
second key.
Key 3 Encryption
Finally, the output is encrypted again
with the third (or first) key.
This triple application makes 3DES much harder to crack than the original DES, providing a significantly larger
effective key length.
Block Cipher Modes of Operation
Block cipher modes of operation define how a block cipher algorithm (like DES or AES) should be used
to encrypt data longer than a single block. They describe how to divide plaintext into blocks and how to
process those blocks securely.
1
ECB (Electronic Codebook) Mode
In ECB mode, each plaintext block is encrypted
independently using the same key. This
simplicity comes at a cost: identical plaintext
blocks will produce identical ciphertext blocks,
making patterns detectable and vulnerable to
analysis.
2
CBC (Cipher Block Chaining) Mode
CBC mode introduces a chaining mechanism.
Each plaintext block is XORed with the previous
ciphertext block before encryption. This
dependency ensures that identical plaintext
blocks produce different ciphertext blocks,
significantly improving security and hiding
patterns.
Think of sending multiple letters. With ECB, each letter is
sealed separately. If you send the same letter twice, it
looks identical.
With CBC, each letter's sealing process is mixed with
details from the previous letter, so even if you send the
same message twice, the sealed version looks different,
making it harder for an attacker to spot patterns.
Example: Mixing Up Letters
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is the current standard
for symmetric-key encryption, adopted worldwide by governments,
banks, and major corporations for securing sensitive information. It
was established by the National Institute of Standards and
Technology (NIST) in 2001 to replace DES.
AES supports key lengths of 128, 192, or 256 bits, offering
significantly higher security than DES. The number of encryption
rounds varies with the key length: 10 rounds for 128-bit keys, 12 for
192-bit keys, and 14 for 256-bit keys. Its design prioritizes both speed
and security.
Example: High-Tech Digital Vault
Imagine AES as a high-tech digital vault protecting your credit card
details when you shop online. Its robust design and strong keys ensure
your financial information remains secure from unauthorized access.
RSA & Diffie-Hellman Key Exchange
RSA (Rivest–Shamir–Adleman)
An asymmetric encryption algorithm using a pair
of keys: a public key for encryption and a private
key for decryption. It relies on the computational
difficulty of factoring large prime numbers.
• Use: Secure data transmission, digital signatures,
key exchange.
Diffie-Hellman Key Exchange
A method for two parties to establish a shared secret
key over an insecure communication channel without
transmitting the key itself. It relies on the difficulty of
the discrete logarithm problem.
• Use: Establishing secure session keys for symmetric
encryption.
Thank you.

Information Security Information Security.pptx

  • 1.
    Information Security Department ofComputer Science and Name :Turai Swathi Admin No: 25EG305A54 Course1 : Seminar Review-2 Supervisor Name : Dr.Yeddu Kondalu Designation:Assistant Professor
  • 2.
    Agenda • Introduction • Whatis Information Security • CNSS Security Model • Components of Information System • Balancing Information Security and Access. • Approaches • Security System Development Life Cycle • Cryptography • Symmetric vs. Asymmetric Cryptography • Steganography • Data Encryption Standard (DES) • Variants of DES(Triple DES) • Block Cipher Modes of Operation • Advanced Encryption Standard • RSA & Diffie-Hellman Key Exchange
  • 3.
    Data Encryption Standard(DES) - Structure Block Cipher Encryption DES operates as a block cipher, meaning it encrypts data in fixed-size blocks (64 bits). Each block undergoes multiple rounds of complex transformations, mixing and permuting the data based on the key. Multiple Rounds The encryption process in DES involves 16 identical rounds of operations, including substitution, permutation, and key mixing. These rounds enhance the security by diffusing and confusing the input data. 56-Bit Key Length DES utilizes a 56-bit key for its operations. While this was considered robust at the time of its invention (1970s), modern computing power has made this key length vulnerable to brute-force attacks. Ex: A 16-Step Safe Lock Think of DES like a safe with 16 distinct locking steps. To open it, you need to correctly navigate each step. The more steps, the more complex the process.
  • 5.
    DES - Analysis& Security Despite its historical significance, the Data Encryption Standard (DES) is no longer considered secure for protecting sensitive information today. Its primary vulnerability lies in its relatively short 56-bit key length. Modern computing power, including specialized hardware and cloud computing, can perform a brute-force attack on a 56-bit key within a matter of hours or even minutes. Therefore, DES is now primarily used for educational purposes or as a component within more secure, enhanced cryptographic systems. Example: An Old-Style Lock Consider DES as an old-style lock that, with enough effort and the right tools (modern computing power), can be picked. While it served its purpose in its era, it's no match for today's sophisticated lock-picking techniques.
  • 6.
    Variants of DES:Extending Security with 3DES To address the security vulnerabilities of the original DES due to its short key length, a more robust variant called Triple DES (3DES or TDES) was developed. 3DES significantly enhances security by applying the DES algorithm multiple times. Instead of a single encryption pass, 3DES typically uses three applications of the DES algorithm with either two or three distinct keys. This multi-layered encryption process makes brute-force attacks significantly more computationally intensive, thus improving its resistance to attacks compared to single DES. Example: Three-Locked Suitcase Imagine locking your suitcase three times with different, unique keys. An attacker would need to unlock it three separate times, each with a different key, making it far more secure than just one lock.
  • 7.
    DES Enhancements(Simple Process) ThePower of Three (3DES) To overcome the security limitations of the original DES, the Triple DES (3DES) algorithm was developed. This variant applies the DES encryption algorithm three times in succession, using either two or three different keys, significantly increasing its security. Key 1 Encryption The plaintext is encrypted with the first key. Key 2 Decryption The result is then decrypted with the second key. Key 3 Encryption Finally, the output is encrypted again with the third (or first) key. This triple application makes 3DES much harder to crack than the original DES, providing a significantly larger effective key length.
  • 8.
    Block Cipher Modesof Operation Block cipher modes of operation define how a block cipher algorithm (like DES or AES) should be used to encrypt data longer than a single block. They describe how to divide plaintext into blocks and how to process those blocks securely. 1 ECB (Electronic Codebook) Mode In ECB mode, each plaintext block is encrypted independently using the same key. This simplicity comes at a cost: identical plaintext blocks will produce identical ciphertext blocks, making patterns detectable and vulnerable to analysis. 2 CBC (Cipher Block Chaining) Mode CBC mode introduces a chaining mechanism. Each plaintext block is XORed with the previous ciphertext block before encryption. This dependency ensures that identical plaintext blocks produce different ciphertext blocks, significantly improving security and hiding patterns.
  • 9.
    Think of sendingmultiple letters. With ECB, each letter is sealed separately. If you send the same letter twice, it looks identical. With CBC, each letter's sealing process is mixed with details from the previous letter, so even if you send the same message twice, the sealed version looks different, making it harder for an attacker to spot patterns. Example: Mixing Up Letters
  • 10.
    Advanced Encryption Standard(AES) The Advanced Encryption Standard (AES) is the current standard for symmetric-key encryption, adopted worldwide by governments, banks, and major corporations for securing sensitive information. It was established by the National Institute of Standards and Technology (NIST) in 2001 to replace DES. AES supports key lengths of 128, 192, or 256 bits, offering significantly higher security than DES. The number of encryption rounds varies with the key length: 10 rounds for 128-bit keys, 12 for 192-bit keys, and 14 for 256-bit keys. Its design prioritizes both speed and security. Example: High-Tech Digital Vault Imagine AES as a high-tech digital vault protecting your credit card details when you shop online. Its robust design and strong keys ensure your financial information remains secure from unauthorized access.
  • 12.
    RSA & Diffie-HellmanKey Exchange RSA (Rivest–Shamir–Adleman) An asymmetric encryption algorithm using a pair of keys: a public key for encryption and a private key for decryption. It relies on the computational difficulty of factoring large prime numbers. • Use: Secure data transmission, digital signatures, key exchange. Diffie-Hellman Key Exchange A method for two parties to establish a shared secret key over an insecure communication channel without transmitting the key itself. It relies on the difficulty of the discrete logarithm problem. • Use: Establishing secure session keys for symmetric encryption.
  • 13.