Network Security Lab 6

Published on July 2016 | Categories: Documents | Downloads: 51 | Comments: 0 | Views: 305
of 4
Download PDF   Embed   Report

Network Security Lab 6

Comments

Content


1|Page Please provide references. Don’t ignore PLAGIARISM, avoid it!

Department of Computer Science and Computer Engineering

NSW Assignment Stage 06 (Prac 06)
Individual Submission: Hard copy/ Soft copy shown to the tutor/lecturer
Deadline: End of this lab session
Worth: 1% for lab work + 0.5% BONUS for at least 1 hour attendance


Objectives:
(1) To understand and learn more about computer and IT security based on lecture
notes and internet sources.
Exercise 1
1. Explain the ways by which the cryptographic systems are categorized.
Ans:
Mainly in three ways:
a. type of encryption operations used
i. substitution (for example, in case of alphabet as well twenty replace t
by z and w by a y)
ii. transposition ,changing the position of the data or the character
iii. product, multiply data with secret code.
b. number of keys used
i. single-key or private(same key for encryption and decryption)
ii. two-key or public (different key for encryption and decryption)
c. way in which plaintext is processed
i. block (take a known sized block of data to encrypt)
ii. stream (encryption is performed on each byte or word sequentially)



2. Explain the following:
i. Plain text: Original message that needed to be sent.
2|Page Please provide references. Don’t ignore PLAGIARISM, avoid it!

ii. Cipher text: When the plain text is converted in to a coded message using the
encryption operations.
iii. Cipher: Cipher Algorithm is used to execute the cryptographic systems. Key
iv. Encipher-The procedure of converting plain text to cipher text.
v. Decipher: recovering/ retrieving the plain text from cipher.
vi. Cryptography: study of encryption principles/methods.
vii. Cryptanalysis: (code breaking) - study of principles/ methods of deciphering cipher
text without knowing key.



3. Explain the Symmetric Cipher Model.
Detail the five ingredients of the symmetric cipher model, shown in Stallings Figure

Plaintext - original message


Encryption algorithm – performs substitutions/transformations on plaintext


Secret key – control exact substitutions/transformations used in encryption
algorithm

ciphertext - scrambled message


Decryption algorithm – inverse of encryption algorithm


Recover Plaintext - original message

Its requirements
 a strong encryption algorithm
 a secret key known only to sender / receiver




Transmitting end
Receiving end
3|Page Please provide references. Don’t ignore PLAGIARISM, avoid it!











Exercise 2
1. Explain Feistel Cipher Structure for implementing symmetric encryption with the
help of a diagram.
Feistel Cipher Structure : used for Multiple encryption


Design elements of Feistel Cipher
4|Page Please provide references. Don’t ignore PLAGIARISM, avoid it!

The exact realization of a Feistel network depends on the choice of the following parameters
& design features:
• Block size
• key size - increasing size improves security, makes exhaustive key searching harder,
but may slow cipher
• number of rounds - increasing number improves security
• Sub-key generation algorithm - greater complexity can make analysis harder, but
slows cipher
• Round function - greater complexity can make analysis harder, but slows cipher fast
• Software en/decryption - more recent concern for practical use
• Ease of analysis - for easier validation & testing of strength

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close