Notes of Unit-1 Information Security
Notes of Unit-1 Information Security
Tech
Subject Name: Information Security
Subject Code: 2240425/2280425
Branch: - AIR/AIML IV Sem
[Type here]
Substitution
ciphers Caesar
Cipher
It is a mono-alphabetic cipher wherein each letter of the plaintext is substituted by another letter to form
the ciphertext. It is the simplest form of substitution cipher scheme. This cryptosystem is generally
referred to as the Shift Cipher. The concept is to replace each alphabet by another alphabet which is
‘shifted’ by some fixed number between 0 and 25. For this type of scheme, both sender and receiver
agree on a ‘secret shift number’ for shifting the alphabet. This number which is between 0 and 25
becomes the key of encryption. The name
‘Caesar Cipher’ is occasionally used to describe the Shift Cipher when the ‘shift of three’ is used.
The process of Shift Cipher
To encrypt a plaintext letter, the sender positions the sliding ruler underneath the first set of
plaintext letters and slides it to LEFT by the number of positions of the secret shift.
The plaintext letter is then encrypted to the ciphertext letter on the sliding ruler underneath. The
result of this process is depicted in the following illustration for an agreed shift of three positions.
In this case, the plaintext ‘tutorial’ is encrypted to the ciphertext ‘WXWRULDO’. Here is the
ciphertext alphabet for a Shift of 3 −
Poly-alphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain alphabet may
be different at different places during the encryption process. The next two examples, playfair and
Vigenere Cipher are polyalphabetic ciphers.
Playfair Cipher
In this scheme, pairs of letters are encrypted, instead of single letters as in the case of simple
substitution cipher. In Playfair cipher, initially, a key table is created. The key table is a 5×5 grid of
alphabets that acts as the
key for encrypting the plaintext. Each of the 25 alphabets must be unique, and one letter of the alphabet
(usually J) is omitted from the table as we need only 25 alphabets instead of 26. If the plaintext contains
J, then it is replaced by I. The sender, and the receiver decides on a particular key, say ‘tutorials.' In a
key table, the first characters (going left to right) in the table is the phrase, excluding the duplicate
letters. The rest of the table will be filled with the remaining letters of the alphabet, in the natural order.
The key table works out to be −
He now shifts each plaintext alphabet by the number written below it to create ciphertext as
shown below. −
The ciphertext is obtained by reading column vertically downward from first to the last column.
The ciphertext is ‘gnuneaoseenvltiltedasehetivc’.
To decrypt, the receiver prepares a similar table. The number of columns is equal to the key number.
The number of rows is obtained by dividing the number of total ciphertext alphabets by key value
and rounding of the quotient to the next integer value.
The receiver then writes the received ciphertext vertically down and from left to right column. To
obtain the text, he reads horizontally left to right and from top to bottom row.
Block Ciphers
In this scheme, the plain binary text is processed in blocks (groups) of bits at a time; i.e., a block of
plaintext bits is selected, a series of operations are performed on this block to generate a block of
ciphertext bits. The number of bits in a block is fixed. For example, the schemes DES and AES have
block sizes of 64 and 128, respectively.
Stream Ciphers
In this scheme, the plaintext is processed one bit at a time, i.e., one bit of plaintext is taken, and a series
of operations are performed on it to generate one bit of ciphertext. Technically, stream ciphers are block
ciphers with a block size of one bit.
Fig 1.11: Stream Cipher
The basic scheme of a block cipher is depicted as follows −
The objective of cryptanalysis: the goal of cryptanalysis is to find weaknesses in or otherwise defeat
cryptographic algorithms, cryptanalysts' research results are used by cryptographers to improve and
strengthen or replace flawed algorithms. Both cryptanalysis, which focuses on deciphering encrypted
data, and cryptography, which focuses on creating and enhancing encryption ciphers and other
algorithms, are aspects of cryptology, the mathematical study of codes, ciphers and related algorithms.
Cryptanalysis techniques and attacks: There are many different types of cryptanalysis attacks and
procedures, which vary depending on how much information the analyst has about the ciphertext being
analysed. Some cryptanalytic methods include:
In a ciphertext-only attack, the attacker only has access to one or more encrypted messages
but knows nothing about the plaintext data, the encryption algorithm being used or any data
about the cryptographic key being used.
In a known plaintext attack, the analyst may have access to some or all of the plaintext of the
ciphertext; the analyst's goal, in this case, is to discover the key used to encrypt the message
and decrypt the message. Once the key is discovered, an attacker can decrypt all messages
that had been encrypted using that key.
In a chosen plaintext attack, the analyst either knows the encryption algorithm or has access
to the device used to do the encryption. The analyst can encrypt the chosen plaintext with the
targeted algorithm to derive information about the key.
A differential cryptanalysis attack is a type of chosen plaintext attack on block ciphers that
analyses pairs of plaintexts rather than single plaintexts, so the analyst can determine how the
targeted algorithm works when it encounters different types of data.
Integral cryptanalysis attacks are similar to differential cryptanalysis attacks, but instead of
pairs of plaintexts, it uses sets of plaintexts in which part of the plaintext is kept constant, but the
rest of the plaintext is modified.
A dictionary attack is a technique typically used against password files and exploits the human
tendency to use passwords based on natural words or easily guessed sequences of letters or
numbers. The dictionary attack works by encrypting all the words in a dictionary and then
checking whether the resulting hash matches an encrypted password stored in the SAM file
format or another password file.
Other types of cryptanalytic attacks can include techniques for convincing individuals to reveal their
passwords or encryption keys, developing Trojan horse programs that steal secret keys from victims'
computers and send them back to the cryptanalyst or tricking a victim into using a weakened
cryptosystem.
Security Goal:
Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide
policies for information security within an organisation. The model is also sometimes referred to as the
AIC triad (availability, integrity, and confidentiality) to avoid confusion with the Central Intelligence
Agency.
Confidentiality:
Confidentiality is roughly equivalent to privacy. Measures were undertaken to ensure
confidentiality is designed to prevent sensitive information from reaching the wrong people while
making sure that the right people can get it: Access must be restricted to those authorised to
view the data
An excellent example of methods used to ensure confidentiality is an account number or routing
number when banking online.
Integrity:
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over
its entire lifecycle.
Data must not be changed in transit, and steps must be taken to ensure that data cannot be
altered by unauthorised people (for example, in a breach of confidentiality).
Availability:
Availability is a guarantee of reliable access to the information by authorized people
Availability is best ensured by rigorously maintaining all hardware, performing hardware repairs
immediately when needed and maintaining a correctly functioning operating system environment
that is free of software conflicts.
It’s also important to keep current with all necessary system upgrades.
To prevent data loss from such occurrences, a backup copy may be stored in a geographically-
isolated location, perhaps even in a fireproof, waterproof safe.
Extra security equipment or software such as firewalls and proxy servers can guard against
downtime and unreachable data due to malicious actions such as denial-of-service (DoS)
attacks and network intrusions.