Professional Documents
Culture Documents
1
12/17/2010
2
12/17/2010
3
12/17/2010
Model for Network Access Security Model for Network Access Security
• using this model requires us to:
– select appropriate gatekeeper functions to
identify users
– implement security controls to ensure only
authorised users access designated
information or resources
• trusted computer systems can be used to
implement this model
4
12/17/2010
Symmetric Encryption
Chapter 2 – Classical Encryption
Techniques • or conventional / private-key / single-key
• sender and recipient share a common key
Many savages at the present day regard • all classical encryption algorithms are
their names as vital parts of themselves, private-key
and therefore take great pains to conceal
• was only type prior to invention of public-
their real names, lest these should give to
key in 1970’s
evil-disposed persons a handle by which
to injure their owners. —The Golden
Bough, Sir James George Frazer
5
12/17/2010
Requirements Cryptography
• two requirements for secure use of • can characterize by:
symmetric encryption: – type of encryption operations used
– a strong encryption algorithm • substitution / transposition / product
– a secret key known only to sender / receiver – number of keys used
Y = EK(X) • single-key or private / two-key or public
6
12/17/2010
7
12/17/2010
• first attested use in military affairs • mathematically give each letter a number
a b c d e f g h i j k l m
• replaces each letter by 3rd letter on 0 1 2 3 4 5 6 7 8 9 10 11 12
n o p q r s t u v w x y Z
• example: 13 14 15 16 17 18 19 20 21 22 23 24 25
meet me after the toga party • then have Caesar cipher as:
PHHW PH DIWHU WKH WRJD SDUWB C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
8
12/17/2010
9
12/17/2010
10
12/17/2010
11
12/17/2010
12
12/17/2010
13
12/17/2010
Steganography Summary
• an alternative to encryption • have considered:
• hides existence of message – classical cipher techniques and terminology
– monoalphabetic substitution ciphers
– using only a subset of letters/words in a
longer message marked in some way – cryptanalysis using letter frequencies
– Playfair ciphers
– using invisible ink
– polyalphabetic ciphers
– hiding in LSB in graphic image or sound file
– transposition ciphers
• has drawbacks – product ciphers and rotor machines
– high overhead to hide relatively few info bits – stenography
14