Page 234 - DCAP403_Operating System
P. 234

Unit 12: Security Solution




          Aside from key length and encryption approach, other factors and variables impact the success of   Notes
          a cryptographic system. For example, different cipher modes, in coordination with initialization
          vectors and salt values, can be used to modify the encryption method. Cipher modes defi ne the
          method in which data is encrypted. The stream cipher mode encodes data one bit at a time. The
          block cipher mode encodes data one block at a time. Although block cipher tends to execute more
          slowly than stream cipher.


          12.2 How Encryption Works?

          Encryption or encoding information helps prevent it by unauthorized user. Both the sender and
          receiver have to know what set of rules (called cipher) was used to transform original information
          in to its cipher text (code) form – cipher text.
          Simple cipher might to be add an arbitrary number of characters to all the character in the
          message.


                Example: Say “Udupa”—is the original name
          “Irida”—is the cipher text (arbitrary no. chosen is “!2”)
          1 2 3 4 5 6 7 8 9 10 11 12

          A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
          The decrypt (decode) “Irido”, First, start counting letter “I” & replace the letter “I” in the coded
          text with the letter which comes after the count 12. So, “I” is replaced by “U”, similarly for other
          letters to get back the original name “udupa” It is clear from the above example that both the
          sender and recipient has to know the arbitrary number chosen in order to encrypt & decrypt the
          original message.
          Basically encryption has two parts:
          1.   Algorithm-a cryptographic algorithm is mathematical function.
          2.   Key-string of digit.
          In the above example counting forward (to decrypt) & backward (encrypt) is the algorithm part.
          Key used is 12.
          Cryptographic algorithm combines the plain text or other intelligible information with a string
          of digit called key’s to produce unintelligible cipher text. But some encryption algorithms does
          not use a key.
          Encryption on key-based system offers two important advantages.


          1.   It is difficult to come up with new-algorithm each time to communicate privately with
               new correspondent. By using a key, same algorithm can be used with many people with
               different key for each correspondent.
          2.   It is easy to change the key in case of any mal-practice rather than going for a new
               algorithm.
          The number of keys each algorithm can support depends on the number of bits in the key. Ex-8
                                                                           8
          bit key allows only 256 possible numeric combinations, each key is called a key of 2 . Hence more
          the digits (bit – length) more the possible keys and more difficult to crack an encrypted message.

          For example, to unlock a physical number zero and nine, at one stage the lock-gets unlocked.
          If it is a three digit decimal number, the p[ossible combinations vary from 000-999. Similarly if
          a 1000 bit (binary) key wre used on a computer which is capable of guessing one million keys
          every second could still take many centuries to discover the right key hence the security of the
          encryption algorithm correlates with the length of the key. Trying each possible key to fi nd the
          right one to get back original message is called Brute—force method.


                                           LOVELY PROFESSIONAL UNIVERSITY                                   227
   229   230   231   232   233   234   235   236   237   238   239