SlideShare a Scribd company logo
1
SECURIT
Y
The term operating system (OS) security refers to practices and measures that can
ensure the confidentiality, integrity, and availability (CIA) of operating systems.
GROUP
MEMBERS
3
Group E
Muhammad Abdullah Hashmi 20021519-
016
Muhammad Yaseen 20021519-
051
Eman Mir 20021519-099
Sheharyar Tariq Butt 20021519-108
CRYPTOGRAPHY AS A SECURITY TOOL
• Broadest security tool available
• Source and destination of messages cannot be trusted without cryptography
• Means to constrain potential senders (sources) and / or receivers (destinations) of
messages
• Based on secrets (keys)
4
SECURE
COMMUNICATION
OVER INSECURE
MEDIUM
5
ENCRY
PTION
Encryption algorithm consists of
--> Set of K keys
--> Set of M Messages
--> Set of C ciphertexts (encrypted messages)
--> A function E : K → (M→C). That is, for each k K,
E(k) is a function for generating ciphertexts from
messages.
--> Both E and E(k) for any k should be efficiently computable
functions.
--> A function D : K → (C → M). That is, for each k K, D(k) is a
function for generating messages from ciphertexts.
--> Both D and D(k) for any k should be efficiently computable
functions.
6
An encryption algorithm must provide this essential property: Given a
ciphertext c  C, a computer can compute m such that E(k)(m) = c only if it
possesses D(k).
--> Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to produce
them, but a computer not holding D(k) cannot decrypt ciphertexts.
--> Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be
infeasible to derive D(k) from the ciphertexts
SYMMETRIC ENCRYPTION
• Same key used to encrypt and decrypt
• E(k) can be derived from D(k), and vice versa
• DES is most commonly used symmetric block-encryption algorithm (created by US
Govt)
• Encrypts a block of data at a time
• Triple-DES considered more secure
• Advanced Encryption Standard (AES), twofish up and coming
• RC4 is most common symmetric stream cipher, but known to have vulnerabilities
• Encrypts/decrypts a strem of bytes (i.e wireless transmission)
• Key is a input to psuedo-random-bit generator
• Generates an infinite keystream
7
ASYMMETRIC ENCRYPTION
• Public-key encryption based on each user having two keys:
• public key – published key used to encrypt data
• private key – key known only to individual user used to decrypt data
• Must be an encryption scheme that can be made public without making it easy to figure
out the decryption scheme
• Most common is RSA block cipher
• Efficient algorithm for testing whether or not a number is prime
• No efficient algorithm is know for finding the prime factors of a number
8
ASYMMETRIC ENCRYPTION
• Formally, it is computationally infeasible to derive D(kd , N) from E(ke , N), and so E(ke ,
N) need not be kept secret and can be widely disseminated
• E(ke , N) (or just ke) is the public key
• D(kd , N) (or just kd) is the private key
• N is the product of two large, randomly chosen prime numbers p and q (for example,
p and q are 512 bits each)
• Encryption algorithm is E(ke , N)(m) = mke mod N, where ke satisfies kekd mod (p−1)(q
−1) = 1
• The decryption algorithm is then D(kd , N)(c) = ckd mod N
9
ASYMMETRIC ENCRYPTION EXAMPLE
• For example. make p = 7and q = 13
• We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72
• We next select ke relatively prime to 72 and< 72, yielding 5
• Finally , we calculate kd such that kekd mod 72 = 1, yielding 29
• We how have our keys
• Public key, ke, N = 5, 91
• Private key, kd , N = 29, 91
• Encrypting the message 69 with the public key results in the cyphertext 62
• Cyphertext can be decoded with the private key
• Public key can be distributed in cleartext to anyone who wants to communicate with holder of public
key
10
ENCRYPTION AND
DECRYPTION USING
RSA ASYMMETRIC
CRYPTOGRAPHY
11
CRYPTOGRAPHY
• Note symmetric cryptography based on transformations, asymmetric based on
mathematical functions
• Asymmetric much more compute intensive
• Typically not used for bulk data encryption
12
13

More Related Content

PPT
Chapter 15 - Security
PPTX
Security - ch3.pptx
PPTX
Security - ch3.pptx
PPT
Network Security and Cryptography
PPT
CISSP EXAM PREPARATION FOR A PASSED SCORE
PPTX
Cryptography
PPTX
Unit 7 : Network Security
PPTX
Cryptography
Chapter 15 - Security
Security - ch3.pptx
Security - ch3.pptx
Network Security and Cryptography
CISSP EXAM PREPARATION FOR A PASSED SCORE
Cryptography
Unit 7 : Network Security
Cryptography

Similar to OS ppt Modified.pptx (20)

PDF
Introduction to Cryptography
PPT
Ch11 Basic Cryptography
PPTX
Network security
PPT
Cryptography cse,ru
PPTX
IEDA 3302 e-commerce_secure-communications.pptx
PPTX
A study of cryptography for satellite applications
PPTX
Cryptography
PPT
Stallings Kurose and Ross
PPTX
Security
PPTX
Cryptography and network security
PPSX
Cryptography
PPTX
Cryptography
PPT
PPTX
aacyberessential3cryptography-131067585699078884.pptx
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPTX
Cryptography and Network Security
PPT
Cryptography Lecture by Sam Bowne
PPTX
Rsa Crptosystem
PPTX
Encryption algorithms
Introduction to Cryptography
Ch11 Basic Cryptography
Network security
Cryptography cse,ru
IEDA 3302 e-commerce_secure-communications.pptx
A study of cryptography for satellite applications
Cryptography
Stallings Kurose and Ross
Security
Cryptography and network security
Cryptography
Cryptography
aacyberessential3cryptography-131067585699078884.pptx
Ch12 Cryptography it-slideshares.blogspot.com
Fundamentals of Cryptography: Securing Data in the Digital Age
Cryptography and Network Security
Cryptography Lecture by Sam Bowne
Rsa Crptosystem
Encryption algorithms

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Institutional Correction lecture only . . .
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Lesson notes of climatology university.
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
PDF
Computing-Curriculum for Schools in Ghana
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Institutional Correction lecture only . . .
GDM (1) (1).pptx small presentation for students
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Lesson notes of climatology university.
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
human mycosis Human fungal infections are called human mycosis..pptx
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india
Computing-Curriculum for Schools in Ghana
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

OS ppt Modified.pptx

  • 1. 1
  • 2. SECURIT Y The term operating system (OS) security refers to practices and measures that can ensure the confidentiality, integrity, and availability (CIA) of operating systems.
  • 3. GROUP MEMBERS 3 Group E Muhammad Abdullah Hashmi 20021519- 016 Muhammad Yaseen 20021519- 051 Eman Mir 20021519-099 Sheharyar Tariq Butt 20021519-108
  • 4. CRYPTOGRAPHY AS A SECURITY TOOL • Broadest security tool available • Source and destination of messages cannot be trusted without cryptography • Means to constrain potential senders (sources) and / or receivers (destinations) of messages • Based on secrets (keys) 4
  • 6. ENCRY PTION Encryption algorithm consists of --> Set of K keys --> Set of M Messages --> Set of C ciphertexts (encrypted messages) --> A function E : K → (M→C). That is, for each k K, E(k) is a function for generating ciphertexts from messages. --> Both E and E(k) for any k should be efficiently computable functions. --> A function D : K → (C → M). That is, for each k K, D(k) is a function for generating messages from ciphertexts. --> Both D and D(k) for any k should be efficiently computable functions. 6 An encryption algorithm must provide this essential property: Given a ciphertext c  C, a computer can compute m such that E(k)(m) = c only if it possesses D(k). --> Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to produce them, but a computer not holding D(k) cannot decrypt ciphertexts. --> Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be infeasible to derive D(k) from the ciphertexts
  • 7. SYMMETRIC ENCRYPTION • Same key used to encrypt and decrypt • E(k) can be derived from D(k), and vice versa • DES is most commonly used symmetric block-encryption algorithm (created by US Govt) • Encrypts a block of data at a time • Triple-DES considered more secure • Advanced Encryption Standard (AES), twofish up and coming • RC4 is most common symmetric stream cipher, but known to have vulnerabilities • Encrypts/decrypts a strem of bytes (i.e wireless transmission) • Key is a input to psuedo-random-bit generator • Generates an infinite keystream 7
  • 8. ASYMMETRIC ENCRYPTION • Public-key encryption based on each user having two keys: • public key – published key used to encrypt data • private key – key known only to individual user used to decrypt data • Must be an encryption scheme that can be made public without making it easy to figure out the decryption scheme • Most common is RSA block cipher • Efficient algorithm for testing whether or not a number is prime • No efficient algorithm is know for finding the prime factors of a number 8
  • 9. ASYMMETRIC ENCRYPTION • Formally, it is computationally infeasible to derive D(kd , N) from E(ke , N), and so E(ke , N) need not be kept secret and can be widely disseminated • E(ke , N) (or just ke) is the public key • D(kd , N) (or just kd) is the private key • N is the product of two large, randomly chosen prime numbers p and q (for example, p and q are 512 bits each) • Encryption algorithm is E(ke , N)(m) = mke mod N, where ke satisfies kekd mod (p−1)(q −1) = 1 • The decryption algorithm is then D(kd , N)(c) = ckd mod N 9
  • 10. ASYMMETRIC ENCRYPTION EXAMPLE • For example. make p = 7and q = 13 • We then calculate N = 7∗13 = 91 and (p−1)(q−1) = 72 • We next select ke relatively prime to 72 and< 72, yielding 5 • Finally , we calculate kd such that kekd mod 72 = 1, yielding 29 • We how have our keys • Public key, ke, N = 5, 91 • Private key, kd , N = 29, 91 • Encrypting the message 69 with the public key results in the cyphertext 62 • Cyphertext can be decoded with the private key • Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key 10
  • 11. ENCRYPTION AND DECRYPTION USING RSA ASYMMETRIC CRYPTOGRAPHY 11
  • 12. CRYPTOGRAPHY • Note symmetric cryptography based on transformations, asymmetric based on mathematical functions • Asymmetric much more compute intensive • Typically not used for bulk data encryption 12
  • 13. 13