information security assignment- 01 what do you know about standards for information security? ...
TRANSCRIPT
Information SecurityAssignment- 01
What do you know about standards for information Security? Suppose you are working in a Information Security department
of an organization, how would you get your organization’s Information Security System ISO certified? (step by step explanation)
Research Articles Summary Writing (Details of your findings after reading three articles published in the Year 2012)o Select three articles (Justify them why you selected particular articles)o Study them carefullyo Write in your own words the summary and main findings of these articles
Part 1 Cryptography 1
Part 1 Cryptography 2
Part I: Crypto
Chapter 2: Crypto BasicsMXDXBVTZWVMXNSPBQXLIMSCCSGXSCJXBOVQXCJZMOJZCVC
TVWJCZAAXZBCSSCJXBQCJZCOJZCNSPOXBXSBTVWJCJZDXGXXMOZQMSCSCJXBOVQXCJZMOJZCNSPJZHGXXMOSPLH
JZDXZAAXZBXHCSCJXTCSGXSCJXBOVQX
plaintext from Lewis Carroll, Alice in Wonderland
The solution is by no means so difficult as you might
be led to imagine from the first hasty inspection of the characters.
These characters, as any one might readily guess,
form a cipher that is to say, they convey a meaning…
Edgar Allan Poe, The Gold Bug
Part 1 Cryptography 3
Part 1 Cryptography 4
Crypto Cryptology The art and science
of making and breaking “secret codes”
Cryptography making “secret codes”
Cryptanalysis breaking “secret codes”
Crypto all of the above (and more)
Part 1 Cryptography 5
How to Speak Crypto
A cipher or cryptosystem is used to encrypt the plaintext
The result of encryption is ciphertext We decrypt ciphertext to recover plaintext A key is used to configure a cryptosystem A symmetric key cryptosystem uses the
same key to encrypt as to decrypt A public key cryptosystem uses a public
key to encrypt and a private key to decrypt
Part 1 Cryptography 6
Crypto Basic assumptions
o The system is completely known to the attacker
o Only the key is secreto That is, crypto algorithms are not secret
This is known as Kerckhoffs’ Principle Why do we make this assumption?
o Experience has shown that secret algorithms are weak when exposed
o Secret algorithms never remain secreto Better to find weaknesses beforehand
Part 1 Cryptography 7
Crypto as Black Box
plaintext
keykey
plaintext
ciphertext
A generic view of symmetric key crypto
encrypt decrypt
Part 1 Cryptography 8
Simple Substitution Plaintext:
fourscoreandsevenyearsago Key: 3
a b c d e f g h i j k l mn o p q r s t u v w x y
DE F G H I J K L M N O P Q R S T U V WX Y Z A B
z
C
Ciphertext: IRXUVFRUHDQGVHYHQBHDUVDJR
Shift by 3 is “Caesar’s cipher”
Plaintext
Ciphertext
Part 1 Cryptography 9
Ceasar’s Cipher Decryption
Plaintext: spongebobsquarepants
a b c d e f g h i j k l mn o p q r s t u v w x y
DE F G H I J K L M N O P Q R S T U V WX Y Z A B
z
C
Plaintext
Ciphertext
Suppose we know a Ceasar’s cipher is being used:
Given ciphertext:VSRQJHEREVTXDUHSDQWV
Part 1 Cryptography 10
Not-so-Simple Substitution
Shift by n for some n {0,1,2,…,25} Then key is n Example: key n = 7
a b c d e f g h i j k l mn o p q r s t u v w x y
HI J K L M N O P Q R S T U V WX Y Z A B C D E F
z
G
Plaintext
Ciphertext
Part 1 Cryptography 11
Cryptanalysis I: Try Them All
A simple substitution (shift by n) is usedo But the key is unknown
Given ciphertext: CSYEVIXIVQMREXIH How to find the key? Only 26 possible keys try them all! Exhaustive key search Solution: key is n = 4
Part 1 Cryptography 12
Least-Simple Simple Substitution
In general, simple substitution key can be any permutation of letterso Not necessarily a shift of the alphabet
For example
a b c d e f g h i j k l mn o p q r s t u v w x y
J I C A X S E Y V D K WB Q T Z R H F M P N U L G
z
O
Plaintext
Ciphertext
Part 1 Cryptography 13
Cryptanalysis: Terminology
Cryptosystem is secure if best know attack is to try all keyso Exhaustive key search, that is
Cryptosystem is insecure if any shortcut attack is known
But then insecure cipher might be harder to break than a secure cipher!o What the … ?
Part 1 Cryptography 14
Double Transposition Plaintext: attackxatxdawn
Permute rowsand columns
Ciphertext: xtawxnattxadakc Key is matrix size and
permutations: (3,5,1,4,2) and (1,3,2)