Sie sind auf Seite 1von 11

CYBER SECURITY

Internet

are potential targets for eaves

dropping and destruction/tampering of data.


Websites

become non-functional resulting in

denial of services.
Masqueraders
Threat

pretend to be authorized users.

is much higher from within the

organization.
People

lose trust in Internet economy and

computer network.

CYBER ATTACKS
Executable based or Network based attacks.

Trojan

Virus

Worm

Spam

AUTHENTICITY AND DATA INTEGRITY


Paper based documents and Electronic based documents.

Confidentiality

Integrity

Authenticity

Non-Repudiability

CRYPTOGRAPHY-BASED SOLUTIONS

Cryptography comprises Encryption and Decryption of


data.
Encryption is the process of making the information
unintelligible to the unauthorized reader.
Decryption is the process of making the information
intelligible again to the authorized reader.
A simple encryption scheme is which all the numbers and
characters are shifted by a fixed number of positions in
the encrypted text.

5 character shift encryption scheme


Character
Represented as
A
F
B
G
C
H
V
A
W
B
X
C
Y
D
Z
E

CRYPTOSYSTEMS

Symmetric Cryptosystems
Began in 1977.
Work in single key or secret key shared between two
communicating parties.

DOCUME
NT

SENDE
R

ENCODE
D
DOCUME
DES
NT
ENCRYPTION

ENCODE
D
DOCUME
NT

SYMMETRIC KEYS

DOCUME
NT

DES
DECRYPTION

RECEIVE
R

Symmetric systems operate either in block cipher or in


stream cipher code.

Block cipher code: Data is encrypted in 64-bit blocks


using 56-bit key.

This is passes through 16 rounds of processing.

Triple DES: uses 3 56-bit key

International Data Encryption Algorithm(IDEA): uses


128-bit key for encryption.

Advanced Encrytion Standard algorithn(AES):


uses 128, 192, 256 bit keys.

To support integrity and authentication checksum is


generated.

Message Authentication Code in 1986 for banking and


financial sector.

For problems of loss of message, Message serial


numbers are incorporated.

ASYMMETRIC CRYPTOSYSTEMS

Asymmetric or public key cryptosystems has a pair of


keys------a public key and a private key.

One key is used to encrypt the message and the


corresponding key is used to decrypt it.

To send a confidential message from User A to User B.

1.

User A encrypts the message using User Bs public key.

2.

User B on receiving the encrypted message decrypts


using User Bs private key.

Message

ENCRYPTION

SENDER
A
(PKA,SKA
)
PKB

Ciphertex
t

DECRYPTION

Message
RECEIV
ER
(PKB,SK
B)
SKB

To send a authenticated message from User A to User B.


Message is encrypted using User As private key
At the recipient end, the encrypted message is decrypted
by User As public key.

Message

SIGNING

SKA

Message
Signatur
e

VERIFICATIO
N

Signature
valid

PKA

Digital Signatures

The RSA Algorithm


1.

Developed in 1978 by Ron Rivest, Adi shamir and


LenAdleman of MIT.

2.

To encrypt the message M using the public key(N,e).The


Private key (N,d) is used to decrypt the message.

Das könnte Ihnen auch gefallen