0% found this document useful (0 votes)
164 views

Cryptography and Network Security: Fifth Edition by William Stallings

The document discusses key concepts in computer and network security including security standards organizations, security objectives of confidentiality, integrity and availability, levels of impact from security breaches, examples of security requirements, the OSI security architecture, aspects of security including security attacks and security services, and specific security services like authentication, access control, data confidentiality, data integrity, and non-repudiation.

Uploaded by

Sankar Mangattu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
164 views

Cryptography and Network Security: Fifth Edition by William Stallings

The document discusses key concepts in computer and network security including security standards organizations, security objectives of confidentiality, integrity and availability, levels of impact from security breaches, examples of security requirements, the OSI security architecture, aspects of security including security attacks and security services, and specific security services like authentication, access control, data confidentiality, data integrity, and non-repudiation.

Uploaded by

Sankar Mangattu
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Cryptography and Network

Security
Overview

Fifth Edition
by William Stallings
The art of war teaches us to rely not on the
likelihood of the enemy's not coming, but on our
own readiness to receive him; not on the chance
of his not attacking, but rather on the fact that we
have made our position unassailable.

The Art of War, Sun Tzu


Standards / Organizations
 National Institute of Standards & Technology
(NIST)
 Internet Society (ISOC)
 International Telecommunication Union
Telecommunication Standardization Sector (ITU-T)
 International Organization for Standardization
(ISO)
 RSA Labs (de facto)
Computer Security
 The protection afforded to an automated
information system in order to attain the
applicable objectives of preserving the integrity,
availability and confidentiality of information
system resources (includes hardware, software,
firmware, information / data, and
telecommunications)
Three key objectives that are at the heart of computer
security are:
Confidentiality
 Data confidentiality: Assures that private or
confidential information is not made available or
disclosed to unauthorized individuals.
 Privacy: Assures that individuals control or
influence what information related to them may be
collected and stored and by whom and to whom
that information may be disclosed.
Integrity
 Data integrity: Assures that information and
programs are changed only in a specified and
authorized manner.
 System integrity: Assures that a system performs
its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized
manipulation of the system.
Availability: Assures that systems work promptly
and service is not denied to authorized users.
Key Security Concepts / Goals
Levels of Impact
 FIPS PUB 199 define 3 levels of impact from a
security breach:
 Low

 Moderate

 High
Low Impact
 The loss could be expected to have a limited
adverse effect on organizational operations,
organizational assets, or individuals.
 A limited adverse effect might
Eg: the loss of confidentiality, integrity, or availability
(i) cause a degradation in mission capability to an extent
and duration that the organization is able to perform its
primary functions, but the effectiveness of the functions
is noticeably reduced;
(ii) result in minor damage to organizational assets;
(iii) result in minor financial loss; or
(iv) result in minor harm to individuals.
Moderate Impact
 The loss could be expected to have a serious
adverse effect on organizational operations,
organizational assets, or individuals.
 the loss might:
(i) cause a significant degradation in mission capability
to an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of
the functions is significantly reduced;
(ii) result in significant damage to organizational assets;
(iii) result in significant financial loss; or
(iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
High Impact
 The loss could be expected to have a severe or
catastrophic adverse effect on organizational
operations, organizational assets, or individuals.
 The loss might
(i) cause a severe degradation in or loss of mission
capability to an extent and duration that the organization
is not able to perform one or more of its primary
functions;
(ii) result in major damage to organizational assets;
(iii) result in major financial loss; or
(iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
Examples of Security
Requirements
 confidentiality – student grades

 integrity – patient information

 availability – authentication service


 authenticity – admission ticket

 non-repudiation – stock sell order


OSI Security Architecture
 ITU-T X.800 “Security Architecture for OSI”
defines a systematic way of defining the
requirements for security and characterizing the
approaches to satisfying those requirements.
 The OSI security architecture is useful to managers as a
way of organizing the task of providing security.
 Because this architecture was developed as an
international standard, computer and communications
vendors have developed security features for their
products and services that relate to this structured
definition of services and mechanisms.
Aspects of Security
 The OSI security architecture focuses on 3 aspects of
information security:
1. security attack : Any action that compromises the
security of information owned by an organization.
2. security mechanism (control): A process or a
device that is designed to detect, prevent, or recover
from a security attack.
3. security service: A processing or communication
service that enhances the security of the data
processing systems and the information transfers of
an organization.
Definitions taken from RFC 2828, Internet Security
Glossary.
 Threat – possible danger that might exploit a
vulnerability.
 vulnerability – a way by which loss can happen
 Attack –An assault on system security that derives
from an intelligent threat.
 an intelligent act that is a deliberate attempt
(especially in the sense of a method or technique)
to evade security services and violate the security
policy of a system.
SECURITY ATTACKS
A useful means of classifying security attacks,
used both in X.800 and RFC 2828, is
1. passive attacks
2. active attacks
 A passive attack attempts to learn or make use of
information from the system but does not affect
system resources.
 An active attack attempts to alter system resources
or affect their operation.
Passive Attack - Interception
Passive Attack: Traffic Analysis

Observe traffic pattern


 Passive attacks are very difficult to detect,
 they do not involve any alteration of the data.
 Typically, the message traffic is sent and received
in an apparently normal fashion, and neither the
sender nor receiver is aware that a third party has
read the messages or observed the traffic pattern.

 However, it is feasible to prevent the success of


these attacks, by means of encryption.

 Thus, the emphasis in dealing with passive attacks


is on prevention rather than detection.
Active Attacks
 Active attacks involve some modification of the
data stream or the creation of a false stream and
can be subdivided into four categories:
1. masquerade,
2. replay,
3. Modification of messages, and
4. denial of service.
Active Attack: masquerade
A masquerade takes place when one entity
pretends to be a different entity
 A masquerade attack usually includes one of the
other forms of active attack.
Eg: authentication sequences can be captured and
replayed after a valid authentication sequence has
taken place, thus enabling an authorized entity with
few privileges to obtain extra privileges by
impersonating an entity that has those privileges.
Masquerading
Active Attack: Replay
 Replay involves the passive capture of a data unit
and its subsequent transmission to produce an
unauthorized effect.
Active Attack: Modification
• Modification of messages : some portion of a
legitimate message is altered, or that messages are
delayed or reordered, to produce an unauthorized effect.

Modify message
Active Attack: DoS
 The denial of service prevents or inhibits the
normal use or management of communications
facilities .
 Denial of service attacks do profit from
fundamental weaknesses of TCP/IP protocols, as
well as from incorrect implementations of TCP/IP
protocol stacks.
 This attack may have a specific target.
Eg: an entity may suppress all messages directed to a
particular destination
Handling Attacks
 Passive attacks – focus on Prevention
• Easy to stop
• Hard to detect
 Active attacks – focus on Detection and
Recovery
• Hard to stop due to vulnerabilities
• Easy to detect
Security Service
 Enhances security of data processing systems and
information transfers of an organization
 intended to counter security attacks
 use one or more security mechanisms
 often replicates functions normally associated with
physical documents
• Eg: have signatures, dates; need protection from
disclosure, tampering, or destruction; be notarized
or witnessed; be recorded or licensed
Security Services
 X.800:
“a service provided by a protocol layer of
communicating open systems, which ensures
adequate security of the systems or of data
transfers”

 RFC 2828:
“a processing or communication service provided
by a system to give a specific kind of protection
to system resources”
 X.800 divides the security services into 5
categories and 14 specific services.
1. Authentication
2. Access control
3. Data confidentiality
4. Data integrity
5. Nonrepudiation
6. Availability service
Authentication
 Concerned with assuring that a communication is
authentic:
 The recipient of the message should be sure that the
message came from the source that it claims to be -
Peer Entity Authentication
 All communicating parties should be sure that the
connection is not interfered with by unauthorized
party- Data-Origin Authentication
Eg: consider a person, using online banking service.
Both the user and the bank should be assured in
identities of each other
Access control
This service controls :

 who can have access to a resource;

 under what conditions access can occur;

 what those accessing are allowing to do.

Eg: in online banking a user may be allowed to see


his balance, but not allowed to make any
transactions for some of his accounts
Data confidentiality
 The protection of data from unauthorized disclosure
(from passive attacks).
 Connection confidentiality : The protection of all
user data on a connection.
 Connectionless confidentiality: The protection of all
user data in a single data block
 Selective field confidentiality: The confidentiality of
selected fields within the user data on a connection
or in a single data block.
 Traffic -Flow Confidentiality : The protection of the
information that might be derived from observation
of traffic flows.
Data Integrity
• The assurance that data received are exactly as sent
by an authorized entity, i.e.
 no modification
 no insertion
 no deletion
 no replay
 Protection from active attacks
1. Connection Integrity with Recovery : Provides for
the integrity of all user data on a connection and
detects any modification, insertion, deletion, or replay
of any data within an entire data sequence, with
recovery attempted.
2. Connection Integrity without Recovery : As
above, but provides only detection without
recovery.
3. Selective-Field Connection Integrity: Provides for
the integrity of selected fields within the user data
of a data block transferred over a connection and
takes the form of determination of whether the
selected fields have been modified, inserted,
deleted, or replayed.
4. Connectionless Integrity : Provides for the
integrity of a single connectionless data block and
may take the form of detection of data
modification.
5. Selective-Field Connectionless Integrity :
Provides for the integrity of selected fields within
a single connectionless data block; takes the form
of determination of whether the selected fields
have been modified.
Nonrepudiation
 Protection against denial by one of the entities
involved in a communication of having participated
in the communication.
 Nonrepudiation can be related to:
 Origin: proof that the message was sent by the
specified party
 Destination: proof that the message was received by
the specified party
Eg: Imagine a user of online banking who has made a
transaction, but later denied that. How the bank can
protect itself in a such situation?
Availability service
 Protects a system to ensure its availability
 Particularly, it addresses denial-of-service attacks
 Depends on other security services: access control,
authentication, etc
 Both X.800 and RFC 2828 define availability to be
the property of a system or a system resource
being accessible and usable upon demand by an
authorized system entity, according to
performance specifications for the system.
Security Mechanism
 Control features designed to detect, prevent, or
recover from a security attack
 no single mechanism that will support all services
required
 however one particular element underlies many of
the security mechanisms in use:
 cryptographic techniques
 our focus on this topic
Security Mechanisms (X.800)
 The mechanisms are divided into :
 those that are implemented in a specific protocol
layer and
 those that are not specific to any particular protocol
layer or security service.
 specific security mechanisms:
 encipherment, digital signatures, access controls,

data integrity, authentication exchange, traffic


padding, routing control, notarization
 pervasive security mechanisms:
 trusted functionality, security labels, event
detection, security audit trails, security recovery
Homework
1. Consider an automated teller machine (ATM) in
which users provide a personal identification
number (PIN) and a card for account access.
 Give examples of confidentiality, integrity,
and availability requirements associated with that
system.
2. Relationship Between Security Services and
Mechanisms
Model for Network Security
Model for Network Security
 using this model requires us to:
1. design a suitable algorithm for the security related
transformation
2. generate the secret information (keys) used by the
algorithm
3. develop methods to distribute and share the secret
information
4. specify a protocol enabling the principals to use
the transformation and secret information for a
security service
Model for Network Access
Security
Model for Network Access Security
 using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information or
resources
 note that model does not include:
1. monitoring of system for successful penetration
2. monitoring of authorized users for misuse
3. audit logging for forensic uses, etc.
Summary
 topicroadmap & standards organizations
 security concepts:
 confidentiality, integrity, availability
 X.800 security architecture
 security attacks, services, mechanisms
 models for network (access) security
CLASSICAL ENCRYPTION
TECHNIQUES
Symmetric Encryption
 or conventional / private-key / single-key
 sender and recipient share a common key
 all classical encryption algorithms are private-
key
 was only type prior to invention of public-key
in 1970’s
 and by far most widely used (still)
 is significantly faster than public-key crypto
Basic Terminologies
 plaintext - original message
 ciphertext - coded message
 cipher - algorithm for transforming plaintext to
ciphertext
 key - info used in cipher known only to
sender/receiver
 encipher (encrypt) - converting plaintext to
ciphertext
 decipher (decrypt) - recovering plaintext from
ciphertext
 cryptography - study of encryption principles/
methods
 cryptanalysis (codebreaking) - study of
principles/ methods of deciphering ciphertext
without knowing key
 cryptology - field of both cryptography and
cryptanalysis
Symmetric Cipher Model
 Requirements for secure use of symmetric
encryption:
1. a strong encryption algorithm
 At a minimum, an opponent who knows the algorithm
and has access to one or more ciphertexts would be
unable to decipher the ciphertext or figure out the key.
 In a stronger form, the opponent should be unable to
decrypt ciphertexts or discover the key even if he or
she has a number of ciphertexts together with the
plaintext for each ciphertext
2. a secret key known only to sender / receiver
 Sender and receiver must have obtained copies of the
secret key in a secure fashion and must keep the key
secure. If someone can discover the key and knows the
algorithm, all communication using this key is
readable.
 assume encryption algorithm is known
 Kerckhoff’s Principle: security in secrecy of
key alone, not in obscurity of the encryption
algorithm
 implies a secure channel to distribute key
 Central problem in symmetric cryptography
Model of Symmetric
Cryptosystem
 The essential elements of a symmetric encryption scheme
is described here:

You might also like