Aksum University College of Engineering & Technology: Department of Computing-Information Systems
Aksum University College of Engineering & Technology: Department of Computing-Information Systems
Aksum University
“The most secured computers are those not connected to the Internet and shielded from any interference”
By: MezgebeMehari
1
Information System Security - INSY3073 Year III and IV
CHAPTER – Four
Security Techniques
4.1. Cryptography
4.1.1. Introduction
In 1973, the NBS (National Bureau of Standards, now called NIST - National Institute of
Standards and Technology) published a request for an encryption algorithm that would
meet the following criteria:
have a high security level
be easily understood
not depend on the algorithm's confidentiality
be adaptable and economical
be efficient and exportable
In late 1974, IBM proposed "Lucifer", which was then modified by NSA (National
Security Agency) in 1976 to become the DES (Data Encryption Standard). DES was
approved by the NBS in 1978. The DES was standardized by the ANSI under the name
of ANSI X3.92, also known as DEA (Data Encryption Algorithm).
The vulnerability of DES was practically demonstrated in 1997, where RSA Security
sponsored a series of contests, offering a $10,000 prize to the first team that broke a
message encrypted with DES for the contest. That contest was won by the DESCHALL
Project, led by Rocke Verser, Matt Curtin, and Justin Dolske, using idle cycles of
thousands of computers across the Internet.
The feasibility of cracking DES quickly was demonstrated in 1998 when a custom DES-
cracker was built by the Electronic Frontier Foundation (EFF), a cyberspace civil rights
group, at the cost of approximately US$250,000. Their motivation was to show that DES
was breakable in practice as well as in theory.
2
Information System Security - INSY3073 Year III and IV
3
Information System Security - INSY3073 Year III and IV
Hence does not protect sender from receiver forging a message & claiming is sent by sender.
4
Information System Security - INSY3073 Year III and IV
5
Information System Security - INSY3073 Year III and IV
Comparisons
Public Key
Conventional
X = D(PRb, Y)
Secrecy
Authentication
Steps:
A prepares a message to B and encrypts it using A's private key
B can decrypt the message using A's public key
Therefore, the entire encrypted message serves as a digital signature
7
Information System Security - INSY3073 Year III and IV
8
Information System Security - INSY3073 Year III and IV
Result:
Keep all the values d, p, q and φ secret
e is known as the public key exponent
d is known as the private key exponent
RSA - Encryption:
Sender A does the following
Obtains the recipient B's public key (n, e)
Represents the plaintext message as a positive integer m
Computes the cipher-text c = me mod n
Sends the cipher-text c to B
RSA- Decryption:
Recipient B does the following
Uses his private key (n, d) to compute m = cd mod n
Extracts the plaintext from the message representative m
9
Information System Security - INSY3073 Year III and IV
10
Information System Security - INSY3073 Year III and IV
In the same way that a decimal number can be represented as the sum of powers
of ten, e.g. 135 = 1 x 102 + 3 x 101 + 5, we could represent our blocks of three
characters in base 26 using A=0, B=1, C=2, ..., Z=25
11