0% found this document useful (0 votes)
204 views19 pages

How A Data Can Be Transmitted Securely

This document discusses how data can be transmitted securely. It explains that transmission security ensures only the intended recipient receives an identical message. It then describes how data travels on public networks, requiring security against passive attacks like eavesdropping or active attacks like modification. The document outlines authentication, integrity, non-repudiation, and confidentiality as key security features and discusses encryption techniques like symmetric ciphers, substitution ciphers, transposition ciphers, and steganography to provide secure data transmission.

Uploaded by

Sumit0302
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views19 pages

How A Data Can Be Transmitted Securely

This document discusses how data can be transmitted securely. It explains that transmission security ensures only the intended recipient receives an identical message. It then describes how data travels on public networks, requiring security against passive attacks like eavesdropping or active attacks like modification. The document outlines authentication, integrity, non-repudiation, and confidentiality as key security features and discusses encryption techniques like symmetric ciphers, substitution ciphers, transposition ciphers, and steganography to provide secure data transmission.

Uploaded by

Sumit0302
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPS, PDF, TXT or read online on Scribd
You are on page 1/ 19

How a Data Can be

Transmitted Securely

Presented by
Ekta Agrawal
What is Transmission
Security?
Transmission security is the capability to
send a message electronically from one
computer system to another computer
system so that only the intended recipient
receives and reads the message and the
message received is identical to the
message sent. The message would not be
identical if it was altered in anyway,
whether transmitted over faulty channels
or intercepted by an eavesdropper.
Data Transmission on Public
Network
What is Network ?
“Network is a collection and
connection of autonomous systems.”
With the advance of the Internet and
development of information technologies, many
conventional off-line services such as banking,
mailing and governmental affairs are migrating to
on-line ones. e-commerce, which treats
commercial activities by on-line, is the most
prominent example and intimately associated
with our real life.
The sensitive data and code
travels on public network so it requires security
to protect the data from unauthorized access.
SECURITY ATTACKS
Passive Attack- Does not
affect system
Active Attack- Affects the
system
Passive Attacks

 Release of Message Contents-


Message can be easily understood.
examples-Telephone Conversation
Electronic mail message
 Traffic Analysis- Masking of message
Through encryption techniques.
example- A text can be written by
exchanging places of alphabets.
Active Attacks
 Masquerade- When one entity pretend
to be a different entity.
 Replay-Passive captures of a data and
its retransmission to produce an
unauthorized effect.
 Modification of Message-Some
portion of legitimate message is
altered.
Security Features
There are four aspects through which we
can provide security-
 Authentication
 Integrity
 Non-repudiation
 Confidentiality
Authentication means an authorized
user is using information. In online
transmission a registered user can transmit
the message.
Security Features
Integrity means data should be reached as
it was sent. During email whatever the
message is sent it should be reached exactly
same.
Non-repudiation means sender can
not deny after sending the message to
receiver. During email transmission a
sender can not deny for sending of that
message.
Confidentiality means message
should be kept private during transmission.
Encryption Techniques
a. Symmetric Cipher
b. Substitution Techniques
c. Transposition Techniques
d. Steganography
a. Symmetric Cipher
What is Encryption? A message in its original
form (plaintext) is encrypted into an
unintelligible form (cipher text) by a set of
procedures known as an encryption algorithm
(cipher) and a variable, called a key; and the
cipher text is transformed (decrypted) back
into plaintext using the encryption algorithm
and a key. ∆ε αρ
Dear Encryption Φρ ι ε ν Decryption Dear
δ ,
Friend, Friend,
Ι η α ϖε
I have I have
σε ε ν
seen your seen your
ψο υ ρ
message message
µ ε σσα
of … of …
γ ε ο φ

Original Symmetric Scrambled Symmetric Original


Data Key Data Key Data
What is encryption
 Encryption C = EK(P)
 Decryption P = EK-1(C)
 EK is chosen from a family of
transformations known as a cryptographic
system.
 The parameter that selects the individual
transformation is called the key K,
selected from a key space K.
b. Substitution Techniques
Letter of Plaintext are replaced by other letters
or by numbers or symbols.
 Caesar Cipher
 Hill Cipher
 Polyalphabetic cipher.
Caesar cipher involves replacing each letter
standing three place further down the alphabet.
example:
plain text : meet me
cipher text : PHHW PH
b. Substitution Techniques
Hill Cipher involves m successive plain text,
letters and substitutes for them m cipher text
letters.
C = KP mod 26
where C and P are column vectors of
length 3,representing the plain text and cipher
text, and K is a 3*3 matrix representing the
encryption key.
for example consider the plaintext ”pay”
and use the encryption key 17 17 5
21 18 21
2 2 19
b. Substitution Techniques
The letters of plaintext “pay” are represented by
the vector
15
0
24

15 375 11
K
= LNS
=
0 = 819 mod26 13
24 486 18
b. Substitution Techniques
 Polyalphabetic cipher. It uses a key that is as
long as the message. The key is a repeating
keyword.
example: if the keyword is deceptive, the message
“we are discovered save yourself” is encrypted as
follows:

key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGMGJ
c. Transposition Techniques
Each letter of plaintext are replaced by
 Rail Fence
 Columnar transposition
Rail Fence is a technique in which the plaintext
is written down as a sequence of diagonals and
then read off as a sequence of rows.
Example: To encipher the message “meet me
after the party”
m e m a t r h p r y
e t e f e t e a t
The encrypted message is
MEMATRHPRYETEFETEAT
Transposition Techniques
Columnar transposition a message is written in
a rectangle row by row and read the message off,
column by column but permute the order of
columns.
Example-
Plaintext ”meet me after the party”
Key:4 3 1 2 5 6 7
me e t m e a
f t e r t h e
p a r t y
Ciphertext : EERTRTETAMFPMTYEHAE
d. Steganography
The one of the method to hide message is
steganography. Steganography conceal the
existence of message.
Examples
 Character marking Selected letters of printed text
are overwritten in pencil. The marks are ordinarily
not visible unless the paper is held to an angle to
bright light.
 Invisible Ink A number of substances can be used
to writing but leave no visible trace until heat or
some chemical is applied to the paper.
d. Steganography
 Pin Punctures Small pin punctures on
selected letters are ordinarily not visible
unless the paper is held up in front of a
light.
 Typewriter Correction ribbon It is used
between lines typed with a black ribbon.
The results of typing with the correction
tape are visible only under a strong light.

You might also like