0% found this document useful (0 votes)
18 views129 pages

Module 1 Introduction

The document provides an overview of cryptography, including its definitions, terminology, and types such as symmetric and asymmetric key cryptography. It discusses the importance of computer security, the impact of security breaches, and various types of security attacks, including passive and active attacks. Additionally, it emphasizes the need for confidentiality, integrity, and availability in information systems, along with challenges faced in implementing effective security measures.

Uploaded by

todera1089
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views129 pages

Module 1 Introduction

The document provides an overview of cryptography, including its definitions, terminology, and types such as symmetric and asymmetric key cryptography. It discusses the importance of computer security, the impact of security breaches, and various types of security attacks, including passive and active attacks. Additionally, it emphasizes the need for confidentiality, integrity, and availability in information systems, along with challenges faced in implementing effective security measures.

Uploaded by

todera1089
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Cryptography and Network Security ECS401

Arif Mohammad Abdul

GITAM
(Deemed to be University)
The art of secret writing

ajkw okf 34kfj 4ojf 4Akakk


jruidjo nsjeoj njoe nof
lkdieun menr nokr eojr koit
roj toek.

Non Readable
CRYPTOGRAPHY
Ancient Greek Language

CRYPT GRAPHY

Hidden Writing

Hidden Writing
Alice, Bob and Eve Framework

Public Network

Sender

Receiver

Attacker
CRYPTOGRAPHY

Public Network
Message

Message

Cryptography

An Enemy , A very smart Person


CRYPTOGRAPHY

Definition

Cryptography is the practice and study of


techniques for securing communication and data in
the presence of adversaries
CRYPTOGRAPHY

Definition

Cryptography is the art of achieving security by


encoding messages (plain text) to make them non-
readable (cipher text).
CRYPTOGRAPHY TERMINOLOGY

Public Network
m

An Enemy , A very smart Person


m : Plain Text
Clear text or plain text signifies that can be understood by the sender,
the receiver, and also anyone else who gets an access to that message
CRYPTOGRAPHY TERMINOLOGY

Public Network
m
E C
𝑲𝒆

C : Cipher Text An Enemy , A very smart Person

When a plain text message is codifies using any suitable technique, the
resulting message is called as cipher text.
CRYPTOGRAPHY TERMINOLOGY

Public Network
m
E C
𝑲𝒆

: Encryption Key An Enemy , A very smart Person

E: Encryption Algorithm
Encryption
CRYPTOGRAPHY TERMINOLOGY

Public Network
m
E C
𝑲𝒆 C
D m
𝑲𝒅

An Enemy , A very smart Person

: Decryption Algorithm
Decryption
: Decryption Key
CRYPTOGRAPHY TERMINOLOGY

Public Network
m
E C ¿
𝑲𝒆 𝐶
D error

𝑲𝒅

An Enemy , A very smart Person


CRYPTOGRAPHY TERMINOLOGY

Public Network
m
E C
𝑲𝒆 𝐶
m : Plain Text C : Cipher Text Encryption E: Encryption Algorithm
D m

𝑲𝒅
: Encryption Key Decryption : Decryption Algorithm : Decryption Key
An Enemy , A very smart Person

Crypto System
SYMMETRIC KEY CRYPTOGRAPHY

Public Network
m
E C
𝑲𝒆 𝐶
. D m

.
𝑲𝒅
An Enemy , A very smart Person

Symmetric Key Cryptography

: Encryption Ke : Decryption Key


SYMMETRIC KEY CRYPTOGRAPHY
• Symmetric key also called Symmetric Encryption, which requires
both the sender and the recipient to have the same key.
SYMMETRIC KEY CRYPTOGRAPHY

One Key On
Key eK
e ey
On

One Key
Key On
ne eK
O ey
One Key

One Key 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑘𝑒𝑦𝑠=( 𝑁 ∗( 𝑁 −1))/2

On ey
eK e K
ey
On
ASYMMETRIC KEY CRYPTOGRAPHY

Public Network
m
E C
𝑲𝒆 C
. D m

.
𝑲𝒅
An Enemy , A very smart Person

Asymmetric Key Cryptography y


ph
o g ra
t
: Encryption Ke : Decryption Key C r yp
Key
li c
Pub
ASYMMETRIC KEY CRYPTOGRAPHY
• Asymmetric key also called Asymmetric Encryption, it uses two
different keys – a public key used for encryption and a private key
used for decryption.
ASYMMETRIC KEY CRYPTOGRAPHY
Sender
Receiver

Public key

Public key
Public key
Key pair
Private Key

Public key
Public key

Private key Public key

Public key Public key

Public key Public key


ASYMMETRIC KEY CRYPTOGRAPHY
Key pair Key pair
Key Pair

Key Pair
Key Pair

Public
keys

Key Pair Key Pair


Key Pair

𝑵𝒖𝒎𝒃𝒆𝒓 𝒐𝒇 𝒌𝒆𝒚𝒔=𝟐∗ 𝑵
Key Pair
Real Time Scenario

HTTPS (Hyper Text Transfer Protocol)

Symmetric Key Cryptography Asymmetric Key Cryptography

AES ECDHE

Advance Encryption Standard Elliptic Curve Diffie-Hellman


Computer Security
 The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability, and
confidentiality of information system resources
(includes hardware, software, firmware,
information/data, and telecommunications)
Heart of Computer Security
Confidentiality
Integrity
Availability

Along with the CIA additional concepts are Authenticity and Accountability
Levels of Impact
 candefine 3 levels of impact from a
security breach

Low

Moderate

High
Low Impact
 The loss could be expected to have a limited adverse
effect on organizational operations, organizational
assets, or individuals.
 A limited adverse effect means that, for example, the
loss of confidentiality, integrity, or availability might

(i) cause a degradation in mission capability to an
extent and duration that the organization is able to
perform its primary functions, but the effectiveness of
the functions is noticeably reduced;

(ii) result in minor damage to organizational assets;

(iii) result in minor financial loss; or

(iv) result in minor harm to individuals.
Moderate Impact
 The loss could be expected to have a serious adverse effect
on organizational operations, assets, or individuals.
 A serious adverse effect means that, e.g., the loss might

(i) cause a significant degradation in mission capability to
an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of the
functions is significantly reduced;

(ii) result in significant damage to organizational assets;

(iii) result in significant financial loss; or

(iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
High Impact
 The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
 A severe or catastrophic adverse effect means that, for
example, the loss might

(i) cause severe degradation in or loss of mission
capability to an extent and duration that the
organization is not able to perform one or more of its
primary functions;

(ii) result in major damage to organizational assets;

(iii) result in major financial loss; or

(iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
Examples of Security
Requirements
 confidentiality – student grades
 integrity – patient information
 availability – authentication service
 authenticity – admission ticket
 non-repudiation – stock sell order
Computer Security Challenges
1. not simple – easy to get it wrong
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived to be of benefit until it fails
8. requires regular monitoring a process, not an
event
9. too often an after-thought
10. regarded as impediment to using system
“Unusable security is not secure”
OSI Security Architecture
Kerckhoff's Principle
Crypto System
m : Plain Text

C : Cipher Text

E: Encryption Algorithm

Information Information : Decryption Algorithm

:Encryption Key

: Decryption Key

• Kerckhoff's principle states that Eve knows the system that Alice and Bob use for
information transfer including the coding scheme, the algorithm, the protocol,
and so on. Only unknown to Eve is Key.
Security
Attacks
Security
Attacks

• Security attack: Any action that compromises the security of

information owned by an organization.

An Attacker , A very smart Person


Categories Security
Attacks

An Attacker , A very smart Person

The way in which attacker can launch the attack

Interruption Modification Fabrication Interception


Alice, Bob and Eve
Framework

Message Message
Public Network

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interruption

Public Network
Message Message

• Attack on Availability – breaking the communication link

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interruption

Message Public Network


Message

• Attack on Availability – breaking the communication link

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interruption

Message Public Network


Message

• Attack on Availability – Overload at the receiver end

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interruption
Modification

Public Network
Message

Message

• Attack on Confidentiality

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Modification
Fabrication

Public Network
Message
We won lottery

Message

• Attack on Integrity (authorization)

I am Alice

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Fabrication
Interceptio
n

Public Network
Message

Message

• Attack on Confidentiality – Read the message

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interception
Message
Message
Public Network

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Interceptio
n
Types of
Attacks

Passive
attacks Active
attacks
Passive Attack

• A passive attack attempts to learn or make use of information from the


system but does not affect system resources.
• Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions.
• The goal of the opponent is to obtain information that is being
transmitted.
Passive
attack

Public Network
Message

Message

Read the
message
• Attack on Confidentiality – Read the message

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Types of Passive
Attack

Release of message
Passive attacks
(Interception)
contents

Traffic analysis
Release of message
contents

Observe

Listen the
Communication
Release of Message
Content
Message Public Network

Message

Read the message transmitted


An Enemy , A very smart Person
between Alice and Bob

Alice, Bob, Eve Framework


Traffic Analysis

• Traffic analysis – Attacker Monitor encrypted traffic flow to


determine

1. location and identity of communicating hosts

2. Frequency and length of messages

This information might be useful in guessing the nature of the


communication that was taking place
Traffic Analysis

Message Public Network

Message

Guessing the nature of the


communication

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Passive Attacks

• Passive attacks are difficult to detect because they do not involve any
alteration of the data.

• Neither the sender nor receiver is aware that a third party has read the
messages or observed the traffic pattern

Interception Confidentiality

• Passive attacks can be prevented by applying encryption


Active
Attacks
• Active attacks involve some modification of the data stream or the creation of a false
stream.

Active attacks

Masquerades Denial of Service


Modification
(Fabrication) (Interruption)

Replay attacks Alterations


Active Attacks
• Active attacks
• The aim of attacker is to make some modification to the information
that is being transmitted.
(or)
• creation of a false information and send it to destination by behaving as
genuine sender

Modification Integrity

Interruption Availability

Fabrication Authentication 62
Active Attacks

1. Masquerade of one entity as some other

2. Replay previous messages

3. Modify/alter (part of) messages in transit to produce an unauthorized effect

4. Denial of service - prevents or inhibits the normal use or management of


communications facilities

.
Masquerade (Fabrication)

• Masquerade takes place when one entity pretends to be a


different entity

• A masquerade attack is an attack that uses a fake identity, such


as a network identity, to gain unauthorized access to personal
computer information through legitimate access identification.
Masquerade (Fabrication)

Public Network
Message

Message

I am Alice

Acting as sender An Enemy , A very smart Person

Alice, Bob, Eve Framework


Masquerade (Fabrication)

Masquerade takes place when one entity pretends to be a


different entity

• Attacker sends the email to receiver and sign it as sender.


Here just attacker changes the sender identity.

• In internet, an attacker changes the IP address of the sending


messages. Example (IP SPOOFING)
Masquerade (Fabrication)

• Masquerade attacks can be performed using

1. stolen passwords and logons,

2. By locating gaps in programs,

3. By finding a way around the authentication process..


Replay Attack (Modification)

Replay involves the passive capture of a data unit and its subsequent retransmission

to produce an unauthorized effect.

• An attacker detects a data transmission and fraudulently has it delayed or

repeated.

• An attacker captures the network traffic and then sends the communication to its

original destination, acting as an original sender.

• It is the combination of two attacks i.e., interception and masquerade.


Replay Attack (Modification)
Replay Attack (Modification)

Message Public Network

Message

1. Captures the message


An Enemy , A very smart Person
2. Later sends the message

Alice, Bob, Eve Framework


Masquerade (Fabrication)
Replay Attack (Modification)

• Example: - Sender asks the destination to pay Rs. 1000, the

information is captured by the attacker and he also send the same

message to receiver that the pay Rs. 1000. Now receiver receive

the two messages and he believe that Rs. 2000 should be paid to

sender.
Modification Attack

• An attacker intercepts the messages and changes the contents of

the messages and send it to receiver.

• Attacker changes the some portion of a message or that message

is delayed or reordered to produce an unauthorized effect.


Modification Attack

Message Public Network

Message

1. Interrupt
2. Fabricate An Enemy , A very smart Person
3. Sends modified
message
Alice, Bob, Eve Framework
Modification Attack
Modification Attack

• For example, a message meaning “Allow JOHN to read

confidential file X” is modified as “Allow Smith to read

confidential file X”.

• An attacker needs to block the direct communication (DNS

hijacking) and then act as a masquerade


Denial of Service Attack

• The aim of the attacker to block the usage of network

resources. Such resources can be computers or end users or

laptops or servers or network links.


DOS (Denial of Service)
DOS (Denial of
Service)
Denial of Service

Message Public Network


Message

• Attack on Availability – Overload at the receiver end

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Denial of Service

• Example: - An attacker want to overload any computer. He sends the

repeated messages to the computer so as to create heavy load on the

computer. Attacker uses intermediate system as the amplifier to generate the

one packet to 50 are more packets, and also it hides the IP address of the

attacker. If attacker uses the multiple amplifier then the attack called as

distributed denial of service attack.

• Denial of service (DoS). It may slow down or totally interrupt the service of a system
Need of
Security

Protects
personal
Surveillance identification
information

Enables the Protects


safe sensitive
operation of data
applications
Safeguarding
technology
assests in
organizations
Security Services Related to a message
• Confidentiality: It specifies that only the sender and
the intended recipient(s) should be able to access a
message.
Confide Attack- Interception
ntiality • Integrity: It ensures that the contents of the message
remains unaltered when it reaches the recipient.
Non- Attack- Modification
repudiat Integrity
• Authentication: It helps to establish proof of identities.
ion Attack- Fabrication
Security • Non-repudiation: It does not allow the sender of a
message to refute the claim of not sending that
Principles message.

Authenti Availabili Related to the overall system


• Access control: It specifies and controls who can access
cation ty what.
• Availability: It states that resources (i.e. information)
Access should be available to authorized parties at all times.
control Attack- Interruption
Authentication
• Assures recipient that the message is from the source that it claims to
be from.
• Ensures that the origin of a message or electronic document is correctly
identified, with an assurance that the identity is not false.

Two types of Authentication:

1. Peer entity authentication


It provides mutual confidence in the identities of the parties involved in a
connection. Both communicating entities provide each other with assurance
of their identity.
2. Data origin authentication
It insures the assurance about the source of the received data.
Authentication
User Device

1 Identity Table containing


I entries
I, H(P)
2
Password
P H = Hash
3

H
4
H(P)
=?

Decision
Access Control
The prevention of unauthorized use of a resource (i.e. this service controls
who can have access to a resource, under what conditions access can occur,
and what those accessing the resource are allowed to do).

Monitor

Access Request Guard Resources


Confidentiality
It is the protection of information from unauthorized disclosure (against eavesdropping).
Four types of Confidentiality:
1. Connection Confidentiality
The protection of all user data on a connection.
2. Connectionless Confidentiality
The protection of all user data in a single data block.
3. Selective-Field Confidentiality
The confidentiality of selected fields within the user data on a connection or
in a single data block.
4. Traffic-flow Confidentiality
The protection of the information that might be derived from observation of
traffic flows
Connection
Confidentiality

Public Network
Data
Data

Message

The protection of all user data on a connection.

Data protected from Eve


An Enemy , A very smart Person

Alice, Bob, Eve Framework


Connectionless
Confidentiality

Public Network
Data Data

The protection of all user data in a


single data block.
Data protected from Eve
An Enemy , A very smart Person

Alice, Bob, Eve Framework


Selective-Field
Confidentiality
Data Public Network
Data Data
Data
Data

Message

The confidentiality of selected fields


within the user data on a connection
Or in a single data block.
Data protected from Eve
An Enemy , A very smart Person

Alice, Bob, Eve Framework


Selective-Field
Confidentiality

Data Public Network


Data
Data

Message

Read the message transmitted


An Enemy , A very smart Person
between Alice and Bob

Alice, Bob, Eve Framework


Traffic-flow
Confidentiality

Public Network
Data SSaffe Paassswoordd
Data

Message

The protection of the information that


might be derived from observation of
traffic flows. An Enemy , A very smart Person
Data protected from Eve
Alice, Bob, Eve Framework
Data Integrity

Assurance that data received are exactly as sent by an


authorized sender i.e. no modification, insertion, deletion or
replay.
Data Integrity
Five types of Integrity:
Connection Integrity with Recovery

Connection Integrity without Recovery

Selective-Field Connection Integrity

Connectionless Integrity

Selective-Field Connectionless Integrity


Non-repudiation

It is the concept of protection against denial by one of the parties in a


communication.

There are two types of non-repudiation:

1. Origin non-repudiation
It is the proof that the message was sent by the specified party.

2. Destination non-repudiation
It is the proof that the message was received by the specified party.
Origin non-repudiation
Destination non-repudiation
Security Mechanisms

Encipherment

Data Integrity

Digital Signature

Authentication Exchange

Traffic Padding

Access Control

Notarization

Routing Control
98
Encipherment

• Encipherment is the process of translating plaintext into ciphertext.

The two main types of Encryption are:

• Asymmetric encryption

• Symmetric encryption
Encipherment - Asymmetric encryption

Public Network
Data Data

Public Key Private Key


Public Key Private Key

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Encipherment - Symmetric encryption

Shared Key

Public Network

Data Data

An Enemy , A very smart Person

Alice, Bob, Eve Framework


Data Integrity

Assurance that data received are exactly as sent by an


authorized sender i.e. no modification, insertion, deletion or
replay.
Digital
Signature

• Digital signatures are the public-key Encryption


primitives.

• Message authentication. It proves


source authentication (Assures recipient
that the message is from the source)

• Data Integrity. It provides integrity of the Hash Decryption


data.

• Protect against intruder.


Digital Signature

Public Network
Data Data

Bob received the


data with signature
Public Key Private Key attached
Public Key Private Key
Verify the signature Bob hash the
Initially, Data will be hashed and use Alice using Alice Public Key received data and
Private Key to sign the data. compares.
An Enemy , A very smart Person

Alice, Bob, Eve Framework


Authentication
Exchange

• A mechanism intended to ensure the identity of an entity by means of


information exchange
Traffic
Padding
Public Network
Data SSaffe Paassswoordd
Data

Message

The protection of the information that


might be derived from observation of
traffic flows. An Enemy , A very smart Person
Data protected from Eve
Alice, Bob, Eve Framework
Access Control
The prevention of unauthorized use of a resource (i.e. this service controls
who can have access to a resource, under what conditions access can occur,
and what those accessing the resource are allowed to do).

Monitor

Access Request Guard Resources


Notarization

• The use of trusted third party to assure certain properties of a data


exchange.
• The receiver involved a third party to store the sender request in
order to prevent the sender from later denying that he has not made such
request
Routing Control

Enables selection of particular physically secure routes for certain data and allows
routing changes, especially when a breach of security is suspected.

109
Relationship between security
services and mechanisms

110
Relationship between security
services and mechanisms
Relationship between security
services and Attacks
CRYPTANALYSIS

m Public Network
E C C
𝑲𝒆
D m

𝑲𝒅

An Enemy , A very smart Person

The process of trying to break any cipher text message to obtain the
original plain text message itself is called as Cryptanalysis, and the
person attempting a cryptanalysis is called a cryptanalyst
A
CRYPTANALYSIS
Knowledge
and Methods

st
a l y
tan C m is
y p lys
Cr a
tan
yp
Cr
An Attacker , A very smart Person

The process of trying to break any cipher text message to obtain the
original plain text message itself is called as Cryptanalysis, and the
person attempting a cryptanalysis is called a cryptanalyst
A
CRYPTANALYTIC ATTACKS

• Based on the amount of information known to Cryptanalyst, apply


various types of cryptanalytic attacks. Few of them are:

1. Ciphertext Only
2. Known plaintext
3. Chosen plaintext
4. Chosen Ciphertext
CIPHERTEXT ONLY
CRYPTANALYSIS -
Knowledge
and Methods CRYPTANALYTIC ATTACK Crypto System

m
m : Plain Text
st
a l y
tan C C : Cipher Text
y p
Cr
E: Encryption Algorithm

An Attacker , A very smart Person : Decryption Algorithm

:Encryption Key

Cipher Text Only : Decryption Key

A copy of cipher text is known to the cryptanalyst.


CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACKS

Methods used in Ciphertext-Only attack :


1. Brute force Attack
2. Statistical Attack
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACK
Brute force Attack

• The attacker tries every possible key on a piece of cipher text until an intelligible
translation into plaintext is obtained. On average, half of all possible keys must be
tried to achieve success.

• If the key space is very large, brute force attack becomes impractical.
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACKS

DES
AES
Triple
DES

considers the results for a system that can process 1 million keys per microsecond.
As you can see,
at this performance level, DES can no longer be considered computationally secure
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACK

Statistical Attack

• Thus, the opponent must rely on an analysis of the ciphertext itself,


generally applying various statistical tests to it.

• To use this approach, the opponent must have some general idea of the
type of plaintext that is concealed, such as English or French text, an
EXE file, a Java source listing, an accounting file, and so on.
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACK
Relative frequency of the letters in English text

For Example: Letter E is the most frequently used letter in English text

Early to bed, and early to rise, makes a man healthy, wealthy and wise.
KNOWN PLAINTEXT -
Crypto System
CRYPTANALYTIC ATTACK
Knowledge
and Methods

m : Plain Text
st
a l y
tan {m, c} Key C : Cipher Text
y p
Cr
E: Encryption Algorithm

An Attacker , A very smart Person : Decryption Algorithm

:Encryption Key

: Decryption Key

Known plain Text


The cryptanalyst has a copy of the cipher text and the
KNOWN PLAINTEXT -
CRYPTANALYTIC ATTACK

• The plaintext/ciphertext pairs have been collected earlier.


For example:
Alice has sent a secret message to Bob, but he/she has later made the
contents of the message public.
• With this knowledge, the analyst may be able to deduce the key.

• If attack succeeds in deducing the key, the effect is catastrophic.

• All future and past messages encrypted with that key are compromised.
CHOSEN PLAINTEXT -
Crypto System
CRYPTANALYTIC ATTACK
Knowledge
and Methods

m : Plain Text
st
a l y
tan C : Cipher Text
yp E key
Cr
E: Encryption Algorithm

An Attacker , A very smart Person : Decryption Algorithm

:Encryption Key

: Decryption Key

Chosen Plain Text


The cryptanalysts gains temporary access to the encryption
machine
CHOSEN PLAINTEXT -
CRYPTANALYTIC ATTACK

• Method used in Chosen Plaintext attack is Differential Cryptanalysis


For example
If Eve has access to Alice’s computer, Eve can choose some
plaintext and intercept ciphertext.
CHOSEN CIPHERTEXT -
Crypto System
CRYPTANALYTIC ATTACK
Knowledge
and Methods

m : Plain Text
st
a l y
tan C : Cipher Text
yp D key
Cr
E: Encryption Algorithm

An Attacker , A very smart Person : Decryption Algorithm

:Encryption Key

: Decryption Key

Chosen Cipher Text


The cryptanalysts gains temporary access to the decryption
machine
CHOSEN CIPHERTEXT -
CRYPTANALYTIC ATTACK

• Method used in Chosen Ciphertext attack is Differential Cryptanalysis


For example
If Eve has access to Bob’s computer, Eve can chooses some
ciphertext and decrypt it to form a ciphertext/plaintext pair.
CRYPTANALYSIS

• There is no encryption algorithm that is unconditionally secure except


one time pad.
• But encryption algorithm can strive if meets one or both of the below
criteria:
1. The cost of breaking the cipher text exceeds the value
of encrypted information.
2. The time required to break the cipher exceeds the
useful lifetime of the information.
These encryption algorithm said to be computationally secure
CRYPTANALYSIS
Knowledge
and Methods

st
a l y
tan C m is
y p lys
Cr a
tan
yp
Cr
An Attacker , A very smart Person

The art or process of deciphering coded messages without


being told the key
A

You might also like