0% found this document useful (0 votes)
18 views19 pages

Practice

Uploaded by

ajayderangula78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views19 pages

Practice

Uploaded by

ajayderangula78
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

2 MarkS CNS

)) The fouY ate gosigs rurihy thrads e:


*iract
* qntexachon ndhect
vet led
fabriaion Con diHenal

Message
N B T ZA R
key

Encaypted Meesage- p& Nx SEDRY

3) Gco (21,300) 21 l4)+ 6


Gc0 (2i,300)
Q1:6(3)+3
6-32) +6, .

he Gco, 21300 ; ,

) pimaly est
The pimalthy test s an algorn Used in'OrCupogapny
Nlot
that cetexmine INhelher a uen numbex fs
peime

Tubo types 5 primahy test they ave

) Probab proabliskc
Conecthy ceci de f a numer s
Detesmigisfc tat aluagd
,

psime o (omposite
O:fhosion Confusioó
* t (on be achieved by x Gt Con be acheved by
Pettring prumutakon on Subshhuk on algorithrn.
the data
St is the KelaHonShip bekween
phintest eceer Cpher text and key.
behuen
text ts a techrique-ukkied b (seake
*t is cnployed to geneae Cipher fext
Coyphie paintext
* aaqueness is incleased
Redncancy is being
n(oeased
6) euler's heoseni
# Fyon's heoren Sates fhat tor Qvery a an do that are
telakuely pr'me
Thebtemn Notaion:

ascn|modn
* Esgr's thessern is USed in RSA Encuup kon Sstern. Which is
Wiely sed for SeCuse Commonicakon Over the intex net
4 Co- pime Numbers (an be Coxeked to poide a Value that Cao be
Used. as a hash ualue ercuyphon key
) Rale a fash tonc on i Secur hy:
used to enSore daa integsiky. Such Secue
nodiaton end GeCutely Store
Oginst Un autosized
ass uordS
ino a hre d
xA oncton hat Mapsa Message at any length
hosh Volue .hhich Seves a, he auitenßoos
altesnahve authenication technique nuohes he USe q
An bleck q data enown
a Smal fxed Snge
Srcuiy key to geneate ts apfendcl bo
o Mac tht
a yplogtoaghc CheckSunm
MAC- Ck(m)

Dequisements
key gneraton algoit1n
ASigning algoriti
*Vernhying algaitr)
,

infect ofer piotam by Modificaon


that an
A Virus S a poqam progarm. Which an hen go on b
Vtus
that incudes a Copy O the
infect otex progra
Types
arasihc
Memory aesident
Boot Sectox
r

Polynophic

1:SarahoreDefechon
Aramty Detec h'on
crrpbve Blocking
3 pre
d deteckori,
4. Hybi
9 051 Securihy kcilechure
Ds Aopen Sslem Gnter (onneçkon)
ranspost the cota trorn the Sender fo
*051 msdel is Ubed to
Kecelvex
layerd the cafa ia
0S1 Model (ontains 4 laye Using these 4
tansfer rom Sendex to xeceivex:
* The s 1 rcuriky achitrc kure deknes providin Setueihy at each
bye
051 Securiky Architechre oeus on three (oncepts:

2- Securhy Servica
3 Secunhy Mechanism.
Jarern3
Architechure

Securi hy
Aftack |Securihy (Secarihy
Seruice
|Mechonis
tSe cuihy Atack
ASecurihy Attack iS ao
atfnpt by.a hocker tox)
Person to dspt the Srcurihy 4a Stern tox)
Nekuork (or) device.

The Securiy Attack hoher Classifed into 26ub Catagoriqs:


|: passie AHack
2. Achve attack
Pa56iNe AHack:
4The Atackex observing, (or)monioying Re Nehwotk (or)device.
infamakonThen
lihoot discuçling the informakon t
and the
Send to ecejves
ttx Sender ond KeCeivex have' No clue ttat
* Hese both
|Cata i5 oCcesoible to Some, tird paxy
MesSage about
tfese fs No nfosmalion provided
* Ihis i5 Vety tsks as
4te attack hagperng in the Comuni Cahog.prees$
2 hypis? Contents
· Release i MeSsage
2. Trafte nalysis.
Secusity Atacks
fAcAveotäce
assiveaHack
Masqusde

<Trafc
Release'a
| MesEage ontent Analyis yModk caHon
MeSsage
(Denai l Message

Senck the to eceiver 4hetuoh


Sender o
The.MeIage is
Media Then tte aftacker ttacathe meSSage
ComtouniaHoo
infosmation and aeSend t tte eceiver.
and ptes
Jiaqrartt
Sen de'
SReceiver

Sencer (Message
. *, Ihe afacker aftaces and ttei faotmako -Qbut hÇ
’>length q MeSEage ’Tne
’type dhta
’ Size. Packet

9 Masquerade attáck:
+t is a hype q attack in lhich the atfackes affack fhe
neSSage witheot Modifcoio0 tte me6Soge sedend ,
*Unauthotlzed ata act as autbesined. daka
Dosom Atacker
(Sendes) Receivar
) Regly attock i
attack in hich the affaçker Qtaces
is.àbype
fhe mesage <gnd Send Muliple Copies cata Send to
Receiver,
e The aecelver Side Con ussio n s 0uY hhat is the ac'
L

Dicgtarn' Atactes92, pQr

Sen ded Receiver


,

Mo dhHalion MesSoge i
The attackes modiyng the ttarsnitted neSsager
and Send the modihing teage to GeCe0ve
AHacker
(Sehder PAr12eceive
attacker attacs, e meSsage and brak he (ommunil
The
eceas is pot predent:feorm.Sender o leceive

Sendey Receive
(Sender Attackes
tRéceive
Secusihy Sevitesi
kecniqueA are USe d o piouide te'Secuity.
*Some g the
9AthenicoHon
Sdenkhy
+Athericakon Means Veriirig' U6er
Sen der checkS he nésinge is eCeived to (orwect or
The
Not
is Sknd by Cötsect perSoo)
ReCeiver che(d tthe meStage
The
o Not
Vexiicaton wll cone.
) (onfenhakky$ hich is hansmit#on
for the data
* sovidiq Secuihy
ves
to Sender to ece tansfer Secexely.
cata wil!
Sender fo decever he
)Data iotegi 6e done Cuxing te fansmision
No modk aton Shoold
yHcess onko|:
accesS Control wll be provdi by he Quboited
The

persans
5) Nlon- Repetaion+
Vafld or Nlot
3) Secusiky Mec hanisnm:
Mechanism i6 a' proSs that iden hky, cr data
* becuniy ke(overy the cata
i5 lracked from thisd pai ky to) Ntotand

to protect data it is kansmitfed


* fncayphon Can be UEe d
Ovex a Netiork.
Converted into binary form in Nehuork
The meSGngc Can be be
se ceive MS9 thet til}
lhen -the xcejver
1

decoygked.
gtot Gpalere? Rouing Conkol:
The Sender Send the gnessaqe,. to the, secevex rave!
diffexent Koutes.

Bt Shu ffingr
Aymiehic achvatty Means if alorks on tiso diffeent keys
(ie) pobRc key and piate key
Alsoriimi P3 -5 'My e:3.
p prime.. )p:3:9-5
j Calculate npr
3) Calculote oen) p-)(9-1)
( DO) (3- 1) (5 -)
4) 5elect 'e.l<a2 n)
s) Calculate d= e-'mod øn)

(n)
v) dxe Imod$
9 public key pu: Se,n mod8
3 =
Pivate key PRr Bdn 3:9mod E
ld-3)
Encyploni Encryphion:
plan eet m
C= mmod n
Ciphex text, Ç memodn
Decoplon: :6y mod I5
Cipher,text. C
plain fe xt Cmodo
putliiey privafe key Decygbr:
.m: cmodo
mod s
) Fire all:
*F-irelatts"aefiequenty used to pesent unduthesiLed
Intänet uôRTS from a cessng pivate Nekuork CGnneched, to the nent
*Ht Meseges Cheving or leaning the intenet passes thiugh he
tewatl Nhich erorncs ach Me%age ebiocks hese do not
meet he SRked Seciaity Criteoia
policy ard
Machines euse that opeate under a Gommen Secary

chancteiskcs? Nice Versg MUst pass threugh:the


* trattc trern inside o Dutside{
Areuall.
zed traftc tiu be alaued o pass.
4 Doy.autesi peneta~orn
Gt5er f' naune

Technisues to Conirot acesst


Seruce Con tolType untes onet Servce that Can be accesse d.
oitializecd alleued
et ortol- partua Selvice qets
aceS to fe DttherSde h.
Rhio haue
)USer Gvtol-Auhe Uters
firecsatr':"
an
)Betauicural Gontrol- paricular Sebuices are dsed for
applicaRon
Lni taionS?
rside attacks
Cannot prskect agist
hcIeased fnter Conech uity makes atfack's frorn inside
*

Applakon- level Gateuhys


Oreuit -(euel Goteay

packet - Alfesing frealis


O
'Aitenng freuay,. is, the, most basie fypz g frewat.
’A packet ka ffic
it acts like a Management program fhaf, toonitoYS nefwósk
Packets ba&ed on Configd Seluihy sales
and Gllers intaming
axe Ceoigned to blbck Nehwosk fafkc Gp patcols
’ The¿e fe waS
and a poxt Nunber îfa chta pcket coel not
nd padess
matchh fhe 26tablished aue Set

Lo cal packetIkr
Nekuoxk

Advantage
*Slmlcihy
Fåst opeafons.

fireual! poy tresal!


laye as an nkermediate device fo Aiker
Gplcakon
Opeate at fe SsternS.
behueen hio end
irCornhnq kraffe
Why fhese fxewal's ie Catled " Apliakon leve l
That's
galeways.
intenct
proxy
Crcut - ievel qple layt
easily Con iguntd to allog o oock ftafie wi h out
Thar (an be Ms
Corouming Signikant Compaing TeSoortES- These ost model
qtfem Sesoion. leve' a fhe
THPicaly pesate a thie
by Veitig tcp (onnechon and 56sions.
eafabl'shed
kircuit leyel phesayae desiqned to ersyre. at. thi
Sessiond
Nehwor k'
1.,

Sever Ciresit- level


fakuay
Congusaton:
* proper Con iguaton is gsenial b Sppori ngnternal
heuerk and Saie hol packet fnspecho n.
Secue he fie ual!
Gecusing a Hre wa l! is te Vital trst sSBep oensue
onlg quth0r0 2ed administatorS..have, aTed tot,..

,
Estolish froua(! LoneS: and an ip. add$s Stuchore

that must be protected

defermine hich
’ Aces5 (ontrol lists @nable Organi1oion to Zone.
q. eaçh
affic is alowed fo fouw o and out

0Per Arewa|l: Seuices flogging


Svices
yGome fre als an be Confured to Spport dffex
.. Rke DHCP Îps NTP.

Tes the Freunli niguna Hon


The (onigusaon Can be,.fested tpreugh fechrique kke
Sanig
Penetakng. tesing an d Volnesabiliy
Manage frewat GenHinoally
fireuall Manogernentf Moni tori ng ase enßuing tfat
#
he fiieWar Coniniues to tunckon as inerded.
S09 Certkate
is the publie key CerfitaBe asSocialed
The 509 Scherme
uwith each Use.
as5ued tp be Crated by Sorme trste
Theoe User (eatkatel aue the direc oy by he Ch or by e
paced. in.
Cer tkcaton qúterìy
USer

Version
Cesihcat
Serial Number
Sgnaure aoithm
Agosihm idenkfiex
Version-9 paamefers
-3
NersionNesibn issues Namè
Not be fore
Not aftes validihy
SubjectNane
Algoi thms Subjechs
parameters Ubic key info
key
SSsueS Unique
i denk Aer
Subjed unique identier
Uersins extension
al Patamehers Signahre
Gncrypcd

(Oves all he ofher feids o


the (esAkafes
Vesslon i ypes Uersions
’Nhere it. (onssts q Severai Gcent ker errst
tfhe îSSues Unique
The default Vexson!, f One O fwo exfenSions
ave D,
2F
the Value must be Version
VeGion 3
the VerSion Must be
SeoialNumbey:
autorty iSSues
F iS a unique Nombex hat the Certhed
SiqNahuxe lqoaitrn îdenkßer
+The algoritm U6ed to Sigo ic (atkcate .ogeher h anya6stike
fAsameler
S65UeT Nane:
’ X"500 Name q, the cA that Ceated aund Signed his
Ceatkcate
period qLaldtby
*Conslsts tu0 dates the frst. ard kst on hich the CerAkcote
is Valid.
Subject aang:
The (es i Cerifes the public key q he Sobjct uho holcs
he Cssesponding pive key
informaio:
Subject public key Should be uSed tqetter with
* S+ Gdenkfes lhieh key
any cs0Ciaed paBametd.
Ssuex Uhigue ic
ophional Sring fetd used fo îdenhky Ori gucy isSUng co
Subject Unique
ophonal bt Sning feld USed fo iknihy Uniquely
4h
the Subject
xtension vten Sions Ueze added Po VerSion .
braning the USer (erHh catest
y Uöer (extiiate genexated by a cA Fave fte tollong
chaacexit6lics
ca (ãg Venby the 8er
dny USe wib 0C(urS to the public key t
rbtc key that wa5 Certfed
Ceuttiae Quttonky (an medty the fertfee
ofhes tharn 4he
the
ohcot his being delected.
(erhtcate
Reucatien erhiate
erAate is isSued just beloe tte ePiscuhion 9he
4A Aleuw dte toliooing .xason.
expives i must be ene q
Old one be toxe if
printe key i5, asSumed t be (ompramise
* The'SerS
ekfed by fis Ce:
4 he USe is No lenqex

Aothenicationpotedure
peeduse
Y"S0 alSo încludes thiveY atex náhve Qutbenhcakao
applcakons
fhat or infende d fos Use acOSS a ariety a
i) One-Way ufhenkcalion
* One hoy authenfcahon fnvelue' a Single. fransfer
intormain from ong USer to another
OThsee-why Cuttenkcaion
Twb Way Quthenhcaton: AAnal MesSae trorn A lo 8
Thus permits both parhe in a induded lbicb tains a
Sgned Cpy Non (a:
Cornmonicahon to erihyythe idenify
Ofher
5) hta Gcsyphon Sfandrd
adopted în 1994
* psopoSed by NÍST
cata USing 56-bits keq.
* is a block Cipher f ncupts C4-bits
6- bit key
64-bit plain tex t
hital peamutahon Peomuted choice

Round pematedchuie ett Circuar shif


t-Left Circular ShitH)

Jet, [Cett Crcuar Shitt

32-bit Swap

Snver se iHal
pestmu tation

64-bit Ciptefext

Uniial pemuta ken (î P)

’ t deords . te fp. data bits


En:@p (Some Alombey )
Rndsi
fiested Cipher
f bit Sub key
4ftates 32-6it 2 half
Expands 12 to ys bits U5i ng pem

adds to Sub key USing yOR


reult
* Passes tirough S-benes o get 30-bit

J
[btbibs) keyrbis)

(32-6its)
Subslihion bone e:
#fach ght 8-bones is diffeont
H fach S. bon Reduces 6bits o 4-6s
32-bit
* 8 S-bones implement the Y6-bit to
AvoLanche ffect
t is a key cesivable properky o, hypion alho
change in one bit q pintot should produce
text.
Chonge n many bits 4 Cpher
Gnpot outpot
OtD] Hash tonchon
Ooo Hash funcioo

-56-6it keys haue 561.2 Io alues


- brute for ce Seaxcb Looked har
Analykc Attacks
’ ditfesenkal Cneyt Aralysi's
’ Lnear (rypt halyis
’ de late key attackd

Block (ieher painciple situ te Febtes in l9o's.


’ Basic princple

You might also like