انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

Lec 12:Computer and Data security

Share |
الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       04/03/2017 05:29:56
Some Results From Information
Theory
3.1 Levels of Security
De nition 3.1.1 Unconditional Security
A cryptosystem is unconditionally secure if it cannot be broken even
with in nite computational resources.
Theorem 3.1.1 The OTP is unconditionally secure if keys are only
used once.
3.2 Computational Security
For all known practical cryptosystems we have:
De nition 3.2.1 Computational Security
A system is \computational secure" if the best possible algorithm
for breaking it requires N operations, where N is very large and known.
25
Unfortunately, all known practical systems are only computational secure for known algo-
rithms.
De nition 3.2.2 Relative Security
A system is \relative secure" if its security relies on a well studied, very
hard problem.
Example:
A system S is secure as long as factoring of large integers is hard (this is believed
for RSA).
3.3 Cryptography and Coding
There are three basic forms of coding in modern communication systems: source coding,
channel coding, and encryption. From an information theoretical and practical point of
view, the three forms of coding should be applied as follows:
Data
Source
Source
Coding
Channel
Coding
Channel
Channel
Decryption Decoding
Encryption
Source
Decoding
Data
Sink
removes
redundancy
adds
redundancy
introduces
errors and
eavesdropping
Figure 3.1: Communication coding system model
26
3.4 Confusion and Diusion
According to Shannon, there are two basic approaches to encryption.
1. Confusion | encryption operation where the relationship between cleartext and ci-
phertext is obscured. Some examples are:
(a) Shift cipher | main operation is substitution.
(b) German Enigma (broken by Turing) | main operation is smart substitution.
2. Diusion | encryption by spreading out the in
uence of one cleartext letter over
many ciphertext letters. An example is:
(a) permutations | changing the positioning of the cleartext.
Remarks:
1. Today ! changing of one bit of cleartext should result on average in the change of
half the output bits.
x1 = 001010 ! encr. ! y1 = 101110.
x2 = 000010 ! encr. ! y2 = 001011.
2. Combining confusion with diusion is a common practice for obtaining a secure scheme.
Data Encryption Standard (DES) is a good example of that.
Diff-1 Conf-1 Diff-2 Conf-2 Diff-N Conf-N
product
cipher
x y’ ............... y_out
Figure 3.2: Example of combining confusion with diusion
27

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الى لوحة التحكم