# NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY

Size: px
Start display at page:

Download "NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY"

## Transcription

1 NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY 1. What types of information might be derived from a traffic analysis attack? The following types of information can be derived from traffic analysis attack: Identities of partners How frequently the partners are communicating Message pattern, message length, or quantity of messages that suggest important information is being exchanged The events that correlate with special conversations between particular partners. 2. What is Rail fence Transposition Technique In this technique plaintext is written down as a sequence of diagonals and then read off as a sequence of rows. 3. How many keys are required for two people to communicate via a cipher? If both sender and receiver use the same key, the system is referred to as symmetric, single key, secret key, or conventional encryption. If the sender and receiver each use a different key, the system is referred to as asymmetric, two-key, or public-key encryption. 4. What is the difference between a block cipher and a stream cipher? A block cipher processes the input one block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along. 5. What are the two approaches to attacking a cipher? The two approaches to attack a cipher are: Cryptanalysis Brute-force attack 6. What is the difference between an unconditionally secure cipher and a computationally secure cipher? An unconditionally secure cipher is a scheme such that if the cipher text generated by the scheme does not contain enough information to determine uniquely the corresponding plain text, no matter how much cipher text is available. A computationally secure scheme is such that the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information. 7. Briefly define the Caesar cipher. The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet. For example: Plain: meet me after the toga party Cipher: PHHW PH DIWHU WKH WRJD SDUWB

2 8. Briefly define the monoalphabetic cipher? A monoalphabetic cipher maps from a plain alphabet to cipher alphabet. Here a single cipher alphabet is used per message. 9. Briefly define the playfair cipher. The best-known multiple-letter encryption cipher is the playfair, which treats digrams in the plain text as single units and translates these units into cipher text digrams. 10. What are the two problems with one-time pad? 1.It makes the problem of making large quantities of random keys. 2.It also makes the problem of key distribution and protection. 11. What is a transposition cipher? Transposition cipher is a cipher, which is achieved by performing some sort of permutation on the plaintext letters. 12. What is Steganography? A plain text may be hidden in one of two ways. The methods of steganography conceals the existence of the message. 13. Why is it important to study feistel cipher? This cipher can be used to approximate the simple substitution cipher by utilizing the concept of a product cipher, which is the performing of two or more basic ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the component ciphers. 14. Why is it not practical to use an arbitrary reversible substitution cipher? An arbitrary reversible cipher for a large block size is not practical, however, from an implementation and performance point of view. Here the mapping itself is the key. 15. What is the difference between diffusion and confusion? In diffusion, the statistical structure of the plain text is dissipated into long-range statistics of the cipher text. This is achieved by permutation. In confusion, the relationship between the statistics of the cipher text and the value of the encryption key is made complex. It is achieved by substitution. 16. Which parameters and design choices determine the actual algorithm of a feistel cipher? Block size Key size Number of rounds Sub key generation algorithm Round functions Fast software encryption or decryption Ease of analysis 17. What is the purpose of the S-boxes in DES? Each row of a S-box defines a general reversible substitution. It consists of a set of eight S-boxes, each of which accepts 6 bits as input and produces 4 bits as output.

3 18. Explain the avalanche effect. It is that a small change in either the plaintext or the key should produce a significant change in the cipher text. A change in one of the bit of the plaintext or one bit of the key should produce a change in many bits of the cipher text. 19. What is the difference between a mono alphabetic cipher and a poly alphabetic cipher? Mono alphabetic cipher: In this, a single cipher alphabet is used per message. Poly alphabetic cipher: In this, a set of related mono alphabetic substitution rules is used. 20. What was the original set of criteria used by NIST to evaluate candidate AES cipher? The original set of criteria used by NIST to evaluate candidate AES cipher was: Security Actual Security Randomness Soundness Other security factors Cost Licensing Requirements Computational Efficiency Memory Requirements Algorithm And Implementation Characteristics Flexibility Hardware and software suitability Simplicity 21. What was the final set of criteria used by NIST to evaluate candidate AES ciphers? The final set of criteria used by NIST to evaluate candidate AES ciphers was: General Security Software Implementations Restricted-Space Environments Hardware Implementations Attacks On Implementations Encryption vs. Decryption Key Agility Other Versatility And Flexibility Potential for Instruction-Level Parallelism 22. What is power analysis? Power analysis is the power consumed by the smart card at any particular time during the cryptographic operation is related to the instruction being executed and to the data being processed. Eg) Multiplication consumes more power than addition and writing 1s consumes ore power than writing 0s. 23. What is the purpose of the State array? A single 128-bit block is depicted as a square matrix of bytes. This block is copied into the State array, which is modified at each stage of encryption or decryption. After the

4 final stage, State is copied to an output matrix. 24. How is the S-box constructed? The S-box is constructed in the following fashion: Initialize the S-box with the byte values in ascending sequence row by row. The first row contains {00}, {01}, {02},.., {0F}; the second row contains {10},{11},etc; and so on. Thus, the value of the byte at row x, column y is {x y}. Map each byte in the S-box to its multiplicative inverse in the finite field GF (28); the value {00} is mapped to itself. Consider that each byte in the S-box consists of 8 bits labeled (b7,b6,b5,b4,b3,b2,b1,b0).apply the following transformation to each bit of each byte in the S-box. 25. Briefly describe Sub Bytes. Sub byte uses an S-box to perform a byte-by-byte substitution of the block. The left most 4 bits of the byte are used as row value and the rightmost 4 bits are used as a column value. These row and column values serve as indexes into the S-box to select a unique 8- bit value. 26. Briefly describe Shift Rows. In shift row, a row shift moves an individual byte from one column to another, which is a linear distance of a multiple of 4 bytes. In Forward Shift Row, each row perform circular left shift. Second Row a 1-byte circular left shift is performed. Third Row a 2-byte circular left shift is performed. For the Fourth Row a 3-byte circular left shift is performed. In Inverse Shift Row, each row perform circular right shift. 27. Briefly describe Mix Columns. Mix Column is substitution that makes use of arithmetic over GF(28).Mix Column operates on each column individually. Each byte of a column is mapped into a new value that is a function of all four bytes in the column. The Mix Column Transformation combined with the shift row transformation ensures that after a few rounds, all output bits depend on all input bits. 28. Briefly describe Add Round Key. In Add Round Key, the 128 bits of State are bit wise XORed with the 128 bits of the round key. The operation is viewed as a column wise operation between the 4 bytes of a State column and one word of the round key; it can also be viewed as a byte-level operation. The Add Round Key transformation is as simple as possible and affects every bit of State. 29. Briefly describe the Key Expansion Algorithm. The AES key expansion algorithm takes as input a 4-word(16-byte) key and produces a linear array of 44 words(156 bytes). This is sufficient to provide a 4-word round key for the initial Add Round Key stage and each of the 10 rounds of the cipher. 30. What is the difference between Sub Bytes and Sub Word? Sub Bytes: Sub Bytes uses an S-box to perform a byte-by-byte substitution of the block. Sub Word: Sub Word performs a byte substitution on each byte of its input word,using the Sbox.

5 31. What is the difference between Shift Rows and Rot Word? Shift Rows: Shift Row is simple permutation. It shifts the rows circularly left or right. Rot Word: Rot word performs a one-byte circular left shift on a word. This means that an input word [b0,b1,b2,b3] is transformed into [b1,b2,b3,b0]. 32. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption? Some block cipher modes of operation only use encryption because the input is set to some initialization vector and the leftmost bits of the output of the encryption function are XORed with the first segment of plain text p1 to produce the first unit of cipher text C1 and it is transmitted. While in decryption, the cipher text is XORed with the output of the encryption function to produce the plain text. 33. What is triple encryption? Tuchman proposed a triple encryption method that uses only two keys [TUCH79]. The function follows an encrypt decrypt encrypt (EDE) sequence. C=Ek1[Dk2[Ek1[P]]] There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES: C=Ek1[Dk2[Ek1[P]]] = Ek1[P] 34. What is a meet-in-the-middle attack? Meet-in-the-middle attack, was first described in [DIFF77]. It is based on the observation that, if we have C=Ek2[Ek1[P]] Then X=Ek1[P]=Dk2[C] Given a known pair, (P,C), the attack proceeds as follows. First, encrypt P for all 256 possible values of K1. Store these results in a table and then sort the table by the values of X. Next, decrypt C using all 256 possible values of K2. As each decryption is produced, check the result against the table for a match. If a match occurs, then test the two resulting keys against a new known plaintext-ciphertext pair. If the two keys produce the correct ciphertext, accept them as the correct keys. 35. How many keys are used in triple encryption? Tuchman proposed a triple encryption method that uses only two keys [TUCH79]. 36. What is the key size for Blowfish? Blowfish makes use of a key that ranges from 32 bits to 448 bits (one to fourteen 32-bit words). That key is used to generate bit subkeys and four 8*32 S-boxes containing a total of bit entries. The total is bit values, or 4168 bytes. 37. What primitive operations are used in Blowfish? Blowfish uses two primitive operations: Addition: Addition of words, denoted by +, is performed modulo Bit wise exclusive-or: This operation is denoted by.

6 38. What common mathematical constants are used in RC5? W :Word size in bits. RC5 encrypts 2-word blocks. 16,32,64 r: Number of rounds. 0,1,.,255 B Number of 8-bit bytes (octets) in the secret key K. 0,1,., What primitive operations are used in RC5? RC5 uses three primitive operations (and their inverse): Addition: Addition of words, denoted by +, is performed modulo 2w. The inverse operation, denoted by -, is subtraction modulo 2w. Bitwise exclusive-or: This operation is denoted by. Left cicular rotation: The cyclic rotation of word x left by y bits is denoted by x<<<y. The inverse is the right circular rotation of word x by y bits, denoted by x>>>y. 40. List important design considerations for a stream cipher. 1.The encyption sequence should have a large period. 2.The keystream should approximate the properties of a true random number stream as close as possible. 3.The output of the pseudorandom number generator is conditioned on the value of the input key. 41. What primitive operation is used in RC4? The primitive operation used in RC4 is bit wise Exclusive-OR (XOR) operation. 42. For a user workstations in a typical business environment, list potential locations for confidentiality attacks. LANs in the same building that are interconnected with bridges and routers. The wiring closet itself is vulnerable. Twisted pair and coaxial cable can be attacked using either invasive taps or inductive devices that monitor electromagnetic emanation. In addition to the potential vulnerability of the various communications links, the various processors along the path are themselves subject to attack. 43. What is the difference between link and end-to-end encryption? Link Encryption End-to-end Encryption Applied by sending host Applied by sending process Transparent to user User applies encryption Host maintains encryption facility User must determine algorithm One facility for all users User selects encryption scheme Can be done in hardware Software implementation All or no messages encrypted User chooses to encrypt, or not, for each message

7 44. What is traffic padding and what is its purpose? Traffic padding produces ciphertext output continuously, even in the absence of plaintext. A continuous random data stream is generated. When plaintext is available, it is encrypted and transmitted. When input plaintext is not present, random data are encrypted and transmitted. 45. List ways in which secret keys can be distributed to two communicating parties. A can select a key and physically deliver it to B. A third party can select the key and physically deliver it o A and B If A and B have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B 46. What is the difference between a session key and a master key? Session key Communication between end systems is encrypted using temporary key, often referred to as a session key. The session key is used for the duration of a logical connection, such as a frame relay connection or transport connection, and then discarded. Master key Session keys are transmitted in encrypted form, using master key that is shared by the keys distribution center and an end system. For each end system or user, there is a unique master key that it shares with the key distribution center. These master keys must be distributed in some fashion. 47. What is nonce? Consider A issues a request to the KDC for a session key to protect a logical connection to B. The message includes the identity of A and B and a unique identifier, N1, for this transaction, which we refer to as nonce. The nonce may be a timestamp, a counter, or a random number. 48. What is key distribution center? A key distribution center is responsible for distributing keys to pairs of users such as hosts, processes, applications. Each user must share a unique key with the key distribution center for purposes of key distribution. 49. What is the difference between statistical randomness and unpredictability? In applications such as reciprocal authentication and session key generation the requirement is not so much that the sequence of numbers be statistically random but that the successive numbers of the sequence are unpredictable. With true random sequences each number is statistically independent of other numbers in the sequence and therefore unpredictable. 50. What is the difference between Rijndael and AES? AES was developed by NIST.AES is a symmetric block cipher that is intended to replace DES.NIST selected rijndael as the proposed AES algorithm. The two researchers who developed and submitted Rijndael for the AES are the both cryptographers from Belgium.

8 51. Why is the middle portion of 3DES a decryption rather than an encryption? Decryption requires that the keys be applied in reverse order: P=Dk1[Ek1[P]] This results in a dramatic increase in cryptographic strength.the use of DES results in a mapping that is not equivalent to a single DES encryption. 52. What is the difference between the AES decryption algorithm and the equivalent inverse cipher? In AES decryption, we use inverse shift rows inverse sub bytes, add round key, inverse mix columns. But in equivalent inverse cipher, we interchange inverse shift rows and inverse sub bytes. 53. Differentiate public key encryption and conventional encryption. Conventional Encryption 1. Same algorithm and same key is used for encryption & decryption. 2. Sender & receiver must share the algorithm and key. 3. Key must be kept secret. Public-key encryption: 1.one algorithm is used for encryption and decryption with pair of keys. 2.The sender and receiver must each have one of the matched pair of keys(not the same one) 3.one of two keys must be kept secret. 54. Specify the application of public key cryptography. Encryption/Decryption. Digital signature. Key exchange. 55. Determine the gcd(24140,16762) using Euclid s algorithm. Soln: We know, gcd(a,b)=gcd(b,a mod b) gcd(24140,16762)=gcd(16762,7378) gcd(7378,2006)=gcd(2006,1360) gcd(1360,646)=gcd(646,68) gcd(68,34)=34 gcd(24140,16762) = Perform encryption and decryption using RSA alg. For the following. P=7; q=11; e=17; M=8. Soln: n=pq n=7*11=77 ö(n)=(p-1) (q-1) =6*10 = 60 e=17 d =27 C= Me mod n C = 817 mod 77 = 57 M = Cd mod n = 5727 mod 77

9 = User A & B exchange the key using Diffie Hellman alg. Assume á=5 q=11 XA=2 XB=3. Find YA, YB, K. Soln: YA = áxa mod q =52 mod 11 = 3 YB = áxb mod q = 53 mod 11 = 4 KA = YBXA mod q = 42 mod 11 = 5 KB = YAXB mod q = 33 mod 11 = 5 58.What is message authentication? It is a procedure that verifies whether the received message comes from assigned source has not been altered. 59. Define the classes of message authentication function. Message encryption: The entire cipher text would be used for authentication. Message Authentication Code: It is a function of message and secret key produce a fixed length value. Hash function: Some function that map a message of any length to fixed length which serves as authentication. 60. What you meant by MAC? MAC is Message Authentication Code. It is a function of message and secret key which produce a fixed length value called as MAC. 61. Specify the techniques for distribution of public key. Public announcement. Publicly available directory. Public key authority. Public key certificate. 62. Specify the requirements for message authentication. i. Disclosure. ii. Traffic analysis. iii. Masquerade. iv. Content Modification. v. Sequence Modification. vi. Timing modification. vii. Repudiation.

10 63. Differentiate internal and external error control. Internal error control: In internal error control, an error detecting code also known as frame check sequence or checksum. External error control: In external error control, error detecting codes are appended after encryption. 64. What you meant by hash function? Hash function accept a variable size message M as input and produces a fixed size hash code H(M) called as message digest as output. It is the variation on the message authentication code. 65. Differentiate MAC and Hash function? MAC: In Message Authentication Code, the secret key shared by sender and receiver. The MAC is appended to the message at the source at a time which the message is assumed or known to be correct. Hash Function: The hash value is appended to the message at the source at time when the message is assumed or known to be correct. The hash function itself not considered to be secret. 66.Define Kerberos. Kerberos is an authentication service developed as part of project Athena at MIT.The problem that Kerberos address is, assume an open distributed environment in which users at work stations wish to access services on servers distributed throughout the network. 67.In the content of Kerberos, what is realm? A full service Kerberos environment consisting of a Kerberos server, a no. of clients, no.of application server requires the following: The Kerberos server must have user ID and hashed password of all participating users in its database. The Kerberos server must share a secret key with each server. Such an environment is referred to as Realm. 68.Assume the client C wants to communicate server S using Kerberos procedure. How can it be achieved? a) C AS: [IDC PC IDV] b) AS C: Ticket c) C V: [IDC ADC IDV] Ticket = EKV [IDC ADC IDV] 69. Any three hash algorithm. MD5 (Message Digest version 5) algorithm. SHA_1 (Secure Hash Algorithm). RIPEMD_160 algorithm.

11 70. Specify the four categories of security threats Interruption Interception Modification Fabrication 71. Differentiate symmetric and Asymmetric Encryption Symmetric Encryption:Sender and receiver use the same key. Asymmetric:Sender and receiver uses different key. 72. What are the services provided by PGP services Digital signature Message encryption Compression compatibility Segmentation 73. Explain the reasons for using PGP? a) It is available free worldwide in versions that run on a variety of platforms, including DOS/windows, UNIX, Macintosh and many more. b) It is based on algorithms that have survived extensive public review and are considered extremely secure. E.g.) RSA, DSS and Diffie-Hellman for public key encryption, CAST-128, IDEA, 3DES for conventional encryption, SHA-1for hash coding. c) It has a wide range of applicability from corporations that wish to select and enforce a standardized scheme for encrypting files and communication. d) It was not developed by nor is it controlled by any governmental or standards organization. 74. Why compatibility function in PGP needed? Electronic mail systems only permit the use of blocks consisting of ASCII text. To accommodate this restriction PGP provides the service converting the row 8- bit binary stream to a stream of printable ASCII characters. The scheme used for this purpose is Radix-64 conversion. 75. Name any cryptographic keys used in PGP? a) One-time session conventional keys. b) Public keys. c) Private keys. d) Pass phrase based conventional keys. 76. Define key Identifier? PGP assigns a key ID to each public key that is very high probability unique with a user ID. It is also required for the PGP digital signature. The key ID associated with each public key consists of its least significant 64bits. 77. List the limitations of SMTP/RFC 822? a) SMTP cannot transmit executable files or binary objects. b) It cannot transmit text data containing national language characters.

12 c) SMTP servers may reject mail message over certain size. d) SMTP gateways cause problems while transmitting ASCII and EBCDIC. e) SMTP gateways to X.400 network cannot handle non textual data included in X.400 messages. 78. Define S/MIME? Secure/Multipurpose Internet Mail Extension(S/MIME) is a security enhancement to the MIME Internet format standard, based on technology from RSA Data Security. 79. What are the elements of MIME? Five new message header fields are defined which may be included in an RFC 822 header. A number of content formats are defined. Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system. 80. What are the headers fields define in MME? MIME version. Content type. Content transfer encoding. Content id. Content description. 81. What is MIME content type &explain? It is used to declare general type of data. Subtype define particular format for that type of the data. It has 7 content type & 15 subtypes. They are, 1. Text type Plain text. Enriched. 2. Multipart type Multipart/mixed. Multipart/parallel. Multipart/alternative. Multipart/digest. 3. Message type Message/RFC822. Message/partial. Message/external. 4. Image type JPEG. CIF. 5. Video type. 6. Audio type. 7. Application type Post script. Octet stream.

13 82.What are the key algorithms used in S/MIME? Digital signature standards. Diffi Hellman. RSA algorithm. 83. Give the steps for preparing envelope data MIME? Generate Ks. Encrypt Ks using recipient s public key. RSA algorithm used for encryption. Prepare the recipient info block. Encrypt the message using Ks. 84. What you mean by versioned certificate? Mostly used issue X.509 certificate with the product name versioned digital id. Each digital id contains owner s public key, owner s name and serial number of the digital id. 85. What are the function areas of IP security? Authentication Confidentiality Key management. 86. Give the application of IP security? Provide secure communication across private & public LAN. Secure remote access over the Internet. Secure communication to other organization. 87. Give the benefits of IP security? Provide security when IP security implement in router or firewall. IP security is below the transport layer is transparent to the application. IP security transparent to end-user. IP security can provide security for individual user. 88. What are the protocols used to provide IP security? Authentication header (AH) protocol. Encapsulating Security Payload(ESP). 89. Specify the IP security services? Access control. Connectionless interpretty. Data origin authentication Rejection of replayed packet. Confidentiality. Limited traffic for Confidentiality.

14 90. What do you mean by Security Association? Specify the parameters that identifies the Security Association? An association is a one-way relationship between a sender and receiver that affords security services to the traffic carried on. A key concept that appears in both the authentication and confidentiality mechanism for ip is the security association (SA). A security Association is uniquely identified by 3 parameters: Security Parameter Index (SPI). IP Destination Address. Security Protocol Identifier. 91. What does you mean by Reply Attack? A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination. Each time a packet is send the sequence number is incremented. 92. Explain man in the middle attack? If A and B exchange message, means E intercept the message and receive the B s public key and b s userid,e sends its own message with its own public key and b s userid based on the private key and Y.B compute the secret key and A compute k2 based on private key of A and Y 93. Steps involved in SS L required protocol? 1. SSL record protocol takes application data as input and fragments it. 2. Apply lossless Compression algorithm. 3. Compute MAC for compressed data. 4. MAC and compression message is encrypted using conventional alg. 94. What is mean by SET? What are the features of SET? Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit card transaction on the internet. Features are: 1. Confidentiality of information 2. Integrity of data 3. Cardholder account authentication 4. Merchant authentication 95. What are the steps involved in SET Transaction? 1. The customer opens an account 2. The customer receives a certificate 3. Merchants have their own certificate 4. The customer places an order. 5. The merchant is verified. 6. The order and payment are sent. 7. The merchant requests payment authorization. 8. The merchant confirm the order. 9. The merchant provides the goods or services. 10. The merchant requests payment.

15 96. What is dual signature? What it is purpose? The purpose of the dual signature is to link two messages that intended for two different recipients. To avoid misplacement of orders 97. List the 3 classes of intruder? Classes of Intruders 1) Masquerader 2) Misfeasor 3) Clandestine user 98. Define virus. Specify the types of viruses? A virus is a program that can infect other program by modifying them the modification includes a copy of the virus program, which can then go on to infect other program. Types: 1) Parasitic virus 2) Memory-resident virus 3) Boot sector virus 4) Stealth virus 5) Polymorphic virus 99. What is application level gateway? An application level gateway also called a proxy server; act as a relay of application-level traffic. The user contacts the gateway using a TCP\IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed List the design goals of firewalls? 1. All traffic from inside to outside, and vise versa, must pass through the firewall. 2. Only authorized traffic, as defined by the local security policy, will be allowed to pass. 3. The firewall itself is immune to penetration Define a Bastion Host? A bastion host is a system identified by the firewall administrator as a critical strong point in the network s security. Bastion host serves as a platform for an application level or circuit level gateway. PART-B 1.Explain the OSI Architecture. 2.Explain Classical Encryption Techniques. 3.Explain DES Algorithm. 4.Explain AES. 5.Describe about Traffic Confidentiality. 6.Explain about the various Key management techniques. 7.Describe Diffie-Hellman Key Exchange. 8.Explain RSA algorithm and state approaches for attacking RSA algorithm and

16 the counter measures for the same. 9.Describe Public Key Cryptography. 10.Explain Elliptic Curve Architecture. 11.Explain Authentication Functions. 12.Describe HMAC algorithm. 13.Explain any one of approach and algorithm for Digital Signatures. 14.Ilustrate with appropriate diagrams the basic uses of Hash Function. 15.Explain Authentication protocols. 16.Discuss in detail Kerberos 4 message Exchanges for providing authentication. 17.Explain X.509 Authentication Services. 18. Explain with suitable diagrams how authentication and confidentiality is provided in Electronic Mail. 19.Explain about PGP services. 20.Describe S/MIME. 21.Explain Intrusion Detection. 22.State and Explain Password Management and password selection strategies. 23.Explain the Firewall Design Principles 24.Describe about Trusted Systems. 25.Name some Viruses and worms. Explain it.

### Cryptography and Network Security

PART-A Questions 1. Name the aspects to be considered of information security. 2. What is meant by deciphering? 3. What are the two different uses of public key cryptography related to key distribution?

### Chapter 10. Network Security

Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

### UNIT I. 5. Define cryptanalysis? It is a process of attempting to discover the key or plaintext or both.

Subject Name : Cryptography and Network Security Subject Code : IT1352 Prepared by : S.Maria Celestin Vigila UNIT I 1. Specify the four categories of security threads? ƒinterruption ƒinterception ƒmodification

### EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

### IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

### CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

### Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

### Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

### Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

### Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

### Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

### NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security

### Network Security Technology Network Management

COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

### VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202

### CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

### 159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

### Cryptography and Security

Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all

### Chapter 6 Electronic Mail Security

Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,

### CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

### CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

### Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

### Cryptography and Network Security Chapter 15

Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North

### 7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

### Network Security Essentials Chapter 7

Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

### Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

### : Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

### Chapter 8. Network Security

Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

### CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

### The Data Encryption Standard (DES)

The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric

### AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Q.2a. Define Virus. What are the four phases of Viruses? In addition, list out the types of Viruses. A virus is a piece of software that can infect other programs by modifying them; the modification includes

### Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.

Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance

### Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure

Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by

### SECURITY IN NETWORKS

SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

### Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

### ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

### Message Authentication

Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the

1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

### Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

### Authentication requirement Authentication function MAC Hash function Security of

UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

### CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

### CRYPTOGRAPHY IN NETWORK SECURITY

ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

### CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

### 12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

### Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

### Cryptography and Network Security

Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

### Shift Cipher. Ahmet Burak Can Hacettepe University. Substitution Cipher. Enigma Machine. How perfect secrecy can be satisfied?

One Time Pad, Block Ciphers, Encryption Modes Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Basic Ciphers Shift Cipher Brute-force attack can easily break Substitution Cipher Frequency analysis

### Network Security. Outline of the Tutorial

Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and

### Properties of Secure Network Communication

Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

### Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

### Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

### Summary of PGP Services

Table 5.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with

### Summary of PGP Services

Table 15.1 Summary of PGP Services Function Algorithms Used Description Digital signature Message encryption Compression Email compatibility DSS/SHA or RSA/SHA CAST or IDEA or Three-key Triple DES with

### Public Key Cryptography Overview

Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

### ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

### Message Authentication Codes

2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,

### Network Security Part II: Standards

Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

### Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

### Stream Ciphers. Example of Stream Decryption. Example of Stream Encryption. Real Cipher Streams. Terminology. Introduction to Modern Cryptography

Introduction to Modern Cryptography Lecture 2 Symmetric Encryption: Stream & Block Ciphers Stream Ciphers Start with a secret key ( seed ) Generate a keying stream i-th bit/byte of keying stream is a function

### Evaluation of the RC4 Algorithm for Data Encryption

Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,

### Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret

### Security in Computer Networks

Security in Computer Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-10/

### Network Security. HIT Shimrit Tzur-David

Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

### Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security

### PGP from: Cryptography and Network Security

PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter

### Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

### 7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

### Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

### AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh

### Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

### Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)

### What is network security?

Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application

### Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

### Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

### Symmetric Key cryptosystem

SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single

### CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

### Network Security. Omer Rana

Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption

### Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

### Computer Security: Principles and Practice

Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

### Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

### Application Layer (1)

Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number

### INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

### Chapter 7: Network security

Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

### Electronic Mail Security

Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

### Chapter 7 Transport-Level Security

Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

### Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

### Overview of Symmetric Encryption

CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send

### Cryptography & Network Security

Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security

### Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

### Message authentication and. digital signatures

Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation

### EXAM questions for the course TTM4135 - Information Security June 2010. Part 1

EXAM questions for the course TTM4135 - Information Security June 2010 Part 1 This part consists of 6 questions all from one common topic. The number of maximal points for every correctly answered question

### Today ENCRYPTION. Cryptography example. Basic principles of cryptography

Today ENCRYPTION The last class described a number of problems in ensuring your security and privacy when using a computer on-line. This lecture discusses one of the main technological solutions. The use

### Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

### CMPT 471 Networking II

CMPT 471 Networking II Authentication and Encryption Janice Regan, 2006-2013 1 Janice Regan, 2006-2013 2 IPsec usage Host to host May use transport mode May use tunnel mode Security Gateway to Security

### CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang xwy@cs.duke.edu Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing

### Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,

### INFORMATION SECURITY PRINCIPLES AND PRACTICE

INFORMATION SECURITY PRINCIPLES AND PRACTICE Mark Stamp San Jose State University 'INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION Preface About The Author Acknowledgments xv xix xxi 1 INTRODUCTION