0% found this document useful (0 votes)
15 views5 pages

Course Activity Report Cns PDF

Uploaded by

Riddhi Jathar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

Course Activity Report Cns PDF

Uploaded by

Riddhi Jathar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Course Activity Report:

Animated Explanation of Public-Key


Cryptography
Subject: Computer Networks and Security (CNS)

Topic: Public-Key Cryptography (PKC)


Presented by:
23CO057 Sejal Jagtap,
23CO060 Riddhi Jathar,
23CO067 Sayali Kale

1. Introduction and Activity Objective


The core objective of this course activity was to create a presentation utilizing animation to
effectively demonstrate and explain the functioning of a complex system within Computer
Networks and Security.

Goal: To move beyond static diagrams and employ dynamic visual storytelling to illustrate the
multi-step, technical process of secure communication, thereby improving audience
comprehension and engagement.

1.1 Rationale for Topic Selection: Public-Key Cryptography (PKC)


We selected Public-Key Cryptography (PKC), also known as Asymmetric Cryptography,
for the following reasons:
1. Fundamental Importance: PKC is the backbone of modern internet security, facilitating
the secure exchange of keys for HTTPS (SSL/TLS), secure shell (SSH), and digital
signatures. Explaining it is essential for understanding web security.
2. Visual Potential: The mechanism involves a pair of distinct, yet mathematically linked,
keys (Public and Private). This concept, often difficult to grasp textually, translates
perfectly into the animated metaphor of a "lock" (Public Key) and a "unique key" (Private
Key) .
3. Contrast with Symmetric Cryptography: PKC addresses the key distribution problem
inherent in symmetric systems, where a shared secret key must be securely exchanged
beforehand. PKC’s reliance on two separate keys simplifies secure initial contact between
parties.

2. Animation Breakdown and Concept Explanation


The animation successfully narrates the flow of a secure message between two parties, Bob
(Sender) and Alice (Receiver), highlighting the three critical stages: Key Generation,
Encryption, and Decryption.

2.1 Stage 1: Key Generation (Alice's Setup)

Animation Action Cryptographic Concept Technical Detail and


Annotation

Alice Generates Key Pair Asymmetric Key Creation Alice runs a cryptographic
algorithm (like RSA or ECC)
that creates two large,
mathematically related
prime numbers.

Private Key Stored Private Key () This key is kept secret and
Securely is essential for decryption.
It is mathematically
impossible (within current
computational limits) to
derive this private key from
the public key.

Public Key Shared Widely Public Key () Alice distributes copies of


this key publicly over the
internet. Anyone, including
Bob, can use it to encrypt
messages specifically for
Alice.

Relationship Trapdoor Function The relationship between


the two keys is based on a
trapdoor function: easy to
compute in one direction
(encryption with the public
key) but extremely difficult
to reverse without the
secret piece of information
(the private key).
2.2 Stage 2: Encryption and Transmission (Bob's Action)

Animation Action Cryptographic Concept Technical Detail and


Annotation

Bob Composes Message Plaintext The original, readable


message (e.g., "Hello").

Bob Selects Public Key Encryption Key Selection Bob finds and utilizes one
of Alice's public keys.

Message Encrypted Ciphertext Creation Bob applies the encryption


algorithm using Alice's to
convert "Hello" into an
unreadable ciphertext, like
"Xq$zP!". This visually
represented as the
message being "locked" by
the public key.

Message in Transit Secure Channel The encrypted message


(TLS/SSL) travels over a network
secured by the Transport
Layer Security (TLS)
protocol (which uses PKC
for the initial handshake),
ensuring the message is
protected during its
journey.

2.3 Stage 3: Decryption (Alice's Action)

Animation Action Cryptographic Concept Technical Detail and


Annotation

Ciphertext Arrives Encrypted Data Receipt Alice receives the "locked"


ciphertext "Xq$zP!".

Alice Applies Private Key Decryption Process Alice uses her unique and
secret. She applies the
decryption algorithm,
which is the inverse
function of the encryption
algorithm.

Decrypted Message Plaintext Retrieval Since the private key is the


Revealed only one that matches the
public key used for locking,
the message is
successfully decrypted
back into the original
plaintext: "Hello".

3. Analysis of Security Threats Highlighted in the


Animation
Your animation correctly identified the risk of a Man-in-the-Middle (MITM) attack, where an
unauthorized party attempts to intercept and potentially modify the communication. The
presentation effectively highlights the challenges an attacker faces due to encryption, but
also introduces vectors used to bypass or compromise the security framework.

3.1 Man-in-the-Middle (MITM) Attack Vectors

Attack Vector Mechanism Impact on PKC/TLS

Fake Certificates The attacker (Eve) Bob's browser may issue a


generates an illegitimate warning, but if Bob
digital certificate for a accepts, he establishes a
trusted site (e.g., seemingly secure,
[Link]) that is not encrypted connection with
signed by a trusted the attacker, who can then
Certificate Authority decrypt and re-encrypt
(CA). Eve presents this traffic to the true
fake certificate to the client destination. This defeats
(Bob). the authentication promise
of PKC.

SSL Stripping The attacker intercepts the This bypasses the need for
initial connection attempt the attacker to decrypt the
and deliberately message entirely. Since
downgrades a secure Bob's data is now sent in
HTTPS connection to an plaintext, the attacker can
unencrypted HTTP read or modify it
connection. effortlessly before
forwarding.

DNS Spoofing The attacker intercepts the Bob's computer, believing


DNS request (which the attacker's IP is the true
translates a domain name destination, initiates the
like [Link] to an IP secure key exchange
address) and sends a false process (PKC) with the
IP address belonging to attacker's machine. This
the attacker's server. enables the attacker to
become an active MITM by
impersonating the
legitimate server.

4. Conclusion
The animated presentation successfully demystified Public-Key Cryptography by using
compelling visual metaphors and clearly outlining the roles of the key pair. It went beyond the
basic concept to address real-world vulnerabilities inherent in the communication layer
(TLS/SSL).

Strengths of the Animation:


● Clarity of the Key Pair: The use of the lock and key motif clearly illustrates that the
Public Key locks, and only the Private Key can unlock.
● Contextual Relevance: The inclusion of attack vectors (Fake Certificates, SSL Stripping,
DNS Spoofing) grounds the academic concept in current cybersecurity challenges.
Overall, the activity demonstrated a strong understanding of both the fundamental
cryptographic principles and the network security protocols that leverage them.

You might also like