Unit 1
Unit 1
Uma Godase
Computer Science and Engineering
MIT School of Engineering
Introduction
Background
▪ traditionally provided by physical and administrative
mechanisms
▪ computer use requires automated tools to protect
files and other stored information
▪ use of networks and communication links requires
measures to protect data during transmission
Definitions
usurpation
Denial of Service Denial of service to authorized user
Security Threats
Security Attack
Types of Attack
▪ Passive
▪ Active
Passive Attack
▪ Release of message Contents
▪ Traffic Analysis
Security Attack
Active Attack
▪ Masquerade
▪ Replay
▪ Modification of message
▪ Denial of Service
Security Policy & Mechanism
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Playfair Cipher – Encryption/ Decryption
1 2 3 4 5 6 7
a t t a c k p
o s t p o n e
d u n t I l t
w o a m x y z
Product Ciphers
▪ ap-1 ≡ 1 (mod p)
▪ where p is prime and gcd(a,p)=1
▪ also known as Fermat’s Little Theorem
▪ also have: ap ≡ a (mod p)
▪ useful in public key and primality testing
Euler's Theorem