unit4-EEE-DATA COMPRESSION AND NETWORK SECURITY
unit4-EEE-DATA COMPRESSION AND NETWORK SECURITY
unit4-EEE-DATA COMPRESSION AND NETWORK SECURITY
Plaintext Original
Ciphertext
Plaintext
Encryption Decryption
Asymmetric KE KD
Plaintext Original
Ciphertext
Plaintext
Encryption Decryption
Types of Symmetric key Cryptography:
Symmetric key cryptography is the traditional algorithm
which is character oriented, then the later modern symmetric
is bit oriented.
Types of Symmetric key cryptography;
1)Substitution Cipher: A Substitution cipher uses one symbol
replaces with another.
If the plain text is alphabetic we use characters. Eg- A with D.
If the plain text is numeric we use another digit. Eg- 3 with 7.
2)Monoalphabetic ciphers: In monoalphabetic cipher a
character in plain text is always changed to same character in
cipher text.
Eg- A is changed with D , also every place of A is replaced with D
3) Polyalphabetic Ciphers: In Polyalphabetic Ciphers each
occurrence of a character may have a different substitute.
Eg- A is changed to D at first. N at middle, E at last.
4)Transposition Ciphers: In Transposition Ciphers, there is
no substitution of character, instead their location is
changed.
Eg- A character in first position of plain text may appear in
tenth position of cipher text.
5) Modern Symmetric Key Ciphers: the Tradition ciphers
we seen so-far is character oriented cipher. With advent of
modern computer algorithms the bit oriented approaches is
used. Since information contain not only text, it has
symbols, audio, videos etc.
Modern symmetric Key ciphers
Mixing a large number of symbols increase security A
modern cipher is block cipher or stream cipher.
BLOCK CIPHER:
Here n-bit of block of plain text is encrypted to n-bit of cipher
text. CBC(Cipher Block Chaining)
ABCDEFGHIJKLMNOPQRSTUVWXY
Z
BCDEFGHIJKLMNOPQRSTUVWXYZ
A
CDEFGHIJKLMNOPQRSTUVWXYZA
B
DEFGHIJKLMNOPQRSTUVWXYZAB
C
EFGHIJKLMNOPQRSTUVWXYZABC
D
FGHIJKLMNOPQRSTUVWXYZABCD
E
GHIJKLMNOPQRSTUVWXYZABCDE
F
HIJKLMNOPQRSTUVWXYZABCDEF
G
IJKLMNOPQRSTUVWXYZABCDEFG
H
JKLMNOPQRSTUVWXYZABCDEFG
ASYMMETRIC KEY CIPHER:(Public Key)
In Asymmetric key user uses two keys 1)one private 2)one
public. Asymmetric key cryptography is based on personal
secrecy.
Asymmetric key cipher uses 2 algorithm namely;
Yes
Signature Generate
Required? Signature Yes
Confidentiality Decrypt the
required? Message
No
No
Compress the
Message Decompress the
Message
No
No
Message Message
Ready to send Ready to use
PGP Authentication
At Sender Alice Side:
Alice create a session key and concatenate it with the
identity of the algorithm.
Alice encrypt the message(email) using public key.
Attaches the signature to message
At Receiver Bob Side: The following steps used by bob’s
side after receive PGP header,
Bob uses his private key to decrypt the combination of
session key and message.
Bob uses Alice public key to Decrypt the Digest.
If both are identical he accept the message otherwise
discarded.
SSH(Secure Shell)
Secure Shell(SSH) is a secure application program that can
be used for remote logging and file transfer.
TELNET(Terminal Network) was replaced by SSH.
Components of SSH:
SSH is an application layer protocol with 3 components
1. SSH Transport Layer(SSH-TRANS)
2. SSH Authentication protocol( SSH-AUTH)
3. SSH Connection Protocol(SSH-CONN)
1) SSH Transport Layer(SSH TRANS): Since TCP is not
a secure. SSH first create a secured channel on top of TCP.
When SSH is implemented on TCP protocol, the
implemented TCP is called as SSH-Trans.
Some services provided are;
a)Privacy
b)Data Integrity
c)Server Authentication.
d)Compression of message.
2)SSH Authentication (SSH-AUTH): After the secure
channel is established between client and server, the server
is authenticate for client. SSH can call another procedure for
Authenticate client for the server.
3)SSH-Connection protocol (SSH-CONN): After the secured
channel is established between both server and client. SSH can
call a Multiplexing procedure which can create multiple
connection for remote logging, file transfer etc.
According to figure;
1)Incoming packet from network 131.34.0.0 are blocked.
2)Incoming packet destined from (PORT 23) are blocked.
3)Incoming packet Destined for host 194.78.20.8 are blocked.
4) Outgoing packet destined for server (PORT 80) are blocked.
PROXY FIREWALL
The Packet header firewall is based on information available
in network and transport layer. Sometimes we need to filter
message based on information available in message itself.
It is called as application GATEWAY, which stand between
customer and organization.