Cryptography and Network Security
Cryptography and Network Security
ABSRACT
Cryptography and Network security are two complicated subjects.As people become “wired”, an
increasing number of people need to understand the basics of security in a networked
world.Cryptography helps in making the data to be secure over an insecure network. Network
security helps in maintaining the network to be in secured mode.We discussed on to consider risk
management, network threats, firewalls, and more special-purpose secure networking devices.
1
1. INTRODUCTION TO CRYPTOGRAPHY
Cryptography has been employed for keeping secrets since the time of Caesar. From
the simplest ciphers of shifting letters, to mathematically provably secure ciphers of
today, cryptography has progressed a long way. Cryptography makes it possible to
keep data secure over an insecure network. The basic idea of cryptography is to take a
plaintext message, combine it with a key, and get ciphertext output. The process of
encrypting plaintext messages is encryption. Getting the plaintext back from the
ciphertext is decryption. The process of trying to break a cryptosystem is
cryptanalysis.
2.FOUNDATIONS OF CRYPTOGRAPHY
The earliest use of cryptography was used by Caesar to transmit vital commands to
and from his officers. The method he use was simple, but highly effective for the
time. The idea was to take each letter, and shift it by a number of characters. So for a
shift of 2, A would become C, E would become G, M would become O, and so on.
Another variant of the same scheme is just to randomly replace one letter for another,
or the transposition cipher. The advantage here is that instead of 25 possible ways to
permute the text, there are 25! .The primary method used to transposition ciphers on
language text is to use a frequency table.
The beginning of modern cryptography is the use of the XOR digital operation. XOR
is an invertible bit level manipulation. It is defined by the following table.
Input1 Input2 Output
0 0 0
0 1 1
1 0 1
1 1 0
2
If a key of length equal to the message you want to encrypt is used and securely
transmitted, then the encrypted message is perfectly secure. The use of a very long
key in a set of repeated XOR operations is called a One Time Pad (OTP).
3
CTR: Plaintext -> |Combine| -> |Encryptor| -> Ciphertext
Counter -------^
3. KEY DISTRIBUTION
The problem with the crypto-systems of past was keeping the key secure, and
securely communicating the key to the other party. The general problem of this is key
distribution.Public key has solved the problem of key distribution. In a public key
cryptography system, there are two keys. One is for encrypting, and the other is for
decrypting.
4. KEY SERVICES
The only problem with public key cryptography is ensuring that the person who is
giving you their key, is really them, and it is their key.
5. USE OF CRYPTOSYSTEMS
The most commonly used is the hash function. The idea is that a small message can
be created to determine if a message is the same as the one that was used to generate
the hash. The most common message hash algorithm is MD5, and is used for many
distributors of programs as their hash algorithm of choice for their packages.Thus
Cryptography helps in making the data to be secure over an insecure network.
6. INTRODUCTION TO NETWORKING
A “network” is defined as “any set of interlinking lines resembling a net, a network of
roads or an interconnected system, a network of alliances.” This definition suits our
purpose well: a computer network is simply a system of interconnected computers.
4
6.2.UUCP
UUCP (Unix-to-Unix CoPy) was originally developed to connect Unix hosts together.
UUCP has since been ported to many different architectures, including PCs, Macs,
Amigos, Apple IIs, VMS hosts, everything else you can name.
UUCP and similar systems are batch-oriented systems: everything that they have to
do is added to a queue, and then at some specified time, everything in the queue is
processed.
7.1.Open Design
One of the most important features of TCP/IP isn't a technological one: The protocol
is an “open” protocol , and anyone who wishes to implement it may do so freely.
Engineers and scientists from all over the world participate in the IETF (Internet
Engineering Task Force) working groups that design the protocols that make the
Internet work. Their time is typically donated by their companies, and the result is
work that benefits everyone.
8. INTERNET PROTOCOL
5
As noted, IP is a “network layer” protocol. This is the layer that allows the hosts to
actually “talk” to each other. Such things as carrying datagram, mapping the Internet
address (such as 10.2.3.4) to a physical network address (such as 08:00:69:0a:ca:8f),
and routing, which takes care of making sure that all of the devices that have Internet
connectivity can find the way to each other.[1]
8.1 Understanding IP
IP has a number of very important features which make it an extremely robust and
flexible protocol. For our purposes, though, we're going to focus on the security of IP,
or more specifically, the lack thereof.
8.2.1.IP Spoofing
This is where one host claims to have the IP address of another. Since many systems
(such as router access control lists) define which packets may and which packets may
not pass based on the sender's IP address, this is a useful technique to an attacker: he
can send packets to a host, perhaps causing it to take some sort of action.
6
Additionally, some applications allow login based on the IP address of the person
making the request (such as the Berkeley r-commands). These are both good
examples how trusting non-trustable layers can provide security that is -- at best --
weak.
After a few seconds of this, if the attack is successful, naughty person has ``hijacked''
the session of our user. Anything that the user can do legitimately can now be done by
the attacker, illegitimately. As far as G knows, nothing has happened.
This can be solved by replacing standard telnet-type applications with encrypted
versions of the same thing. In this case, the attacker can still take over the session, but
he'll see only ``gibberish'' because the session is encrypted. The attacker will not have
7
the needed cryptographic key(s) to decrypt the data stream from G, and will,
therefore, be unable to do anything with the session.
8.3 TCP
TCP is a transport-layer protocol. It needs to sit on top of a network-layer protocol,
and was designed to ride atop IP. ( Just as IP was designed to carry, among other
things, TCP packets.) Because TCP and IP were designed together and wherever you
have one, you typically have the other, the entire suite of Internet protocols is known
collectively as “TCP/IP”. TCP itself has a number of important features that we'll
cover briefly.
This is suited well toward a number of applications, such as a telnet session. A user
wants to be sure that the remote host receives every keystroke, and that it gets every
packet sent back, even if this means occasional slight delays in responsiveness while a
lost packet is resent, or while out-of-order packets are rearranged.
It is not suited well toward other applications, such as streaming audio or video,
however. In these, it doesn't really matter if a packet is lost (a lost packet in a stream
of 100 won't be distinguishable) but it does matter if they arrive late (i.e., because of a
host resending a packet presumed lost), since the data stream will be paused while the
lost packet is being resent. Once the lost packet is received, it will be put in the proper
slot in the data stream, and then passed up to the application.
8
8.4 UDP
UDP (User Datagram Protocol) is a simple transport-layer protocol. It does not
provide the same features as TCP, and is thus considered “unreliable.” Again,
although this is unsuitable for some applications, it does have much more
applicability in other applications than the more reliable and robust TCP.
9
any connections will work. Now, to connect D to the network, a connection must be established with
at least one of the hosts on the network, and so on.
In a UUCP network, users are identified in the format host!Userid. The “!” character
(pronounced “bang” in networking circles) is used to separate hosts and users.
9. POPULARITY
UUCP connections are typically made hourly, daily, or weekly, there is a fair bit of delay in getting
data from one user on a UUCP network to a user on the other end of the network. UUCP isn't very
flexible, as it's used for simply copying files Interactive protocols.
10. SESURITY
UUCP has security tradeoffs. Some strong points for its security is that it is fairly
limited in what it can do, and it's therefore more difficult to trick into doing something
it shouldn't; it's been around a long time, and most its bugs have been discovered,
analyzed, and fixed;.UUCP works by having a system-wide UUCP user account and
password. Any system that has a UUCP connection with another must know the
appropriate password for the UUCP or NUUCP account.[1]
10.2.1.Denial-of-Service
10
DoS (Denial-of-Service) attacks are probably the nastiest, and most difficult to
address. These are the nastiest, because they're very easy to launch, difficult to track,
and it isn't easy to refuse the requests of the attacker.
Some things that can be done to reduce the risk of being stung by a denial of service
attack include.
Not running your visible-to-the-world servers at a level too close to capacity using
packet filtering to prevent obviously forged packets from entering into your network
address space.
10.2.2.Unauthorized Access
“Unauthorized access” is a very high-level term that can refer to a number of different
sorts of attacks. The goal of these attacks is to access some resource that your
machine should not provide the attacker.
11
The data fiddler is likely the worst sort, since the fact of a break-in might not be
immediately obvious. Perhaps he's toying with the numbers in your spreadsheets, or
changing the dates in your projections and plans.
12. FIREWALLS
In order to provide level of separation between an organization's intranet and the
Internet, firewalls have been employed. A firewall is simply a group of components
that collectively form a barrier between two networks.
A number of terms specific to firewalls and networking are:
12.2 Router
A special purpose computer for connecting networks together. Routers also handle
certain functions, such as routing, or managing the traffic on the networks they
connect.
12
Many routers now have the ability to selectively perform their duties, based on a
number of facts about a packet that comes to it. This includes things like origination
address, destination address, destination service port.
12.5 Proxy
This is the process of having one host act in behalf of another. A host that has the
ability to fetch documents from the Internet might be configured as a proxy server ,
and host on the intranet might be configured to be proxy clients
.
13. TYPES OF FIREWALLS
There are three basic types of firewalls, and we'll consider each of them.[2]
13
13.3 Hybrid Systems
In some systems, new connections must be authenticated and approved at the
application layer. Once this has been done, the remainder of the connection is passed
down to the session layer.
15.CONCLUSION
14
We discussed about the UUCP, Risk Management, Types and Sources of Threats,
Types of Fire walls, Security Network Devices.
Thus we come to know that Network Security is most useful for better way of using
the internet without any problems. Network security helps in maintaining the network
to be in secured mode.
16.REFERENCES
[1] RSA Security’s Complete Reference – Burnett
[2] www.cryptography.com
[3] IEEE Network Security Journal Vol. 32 Paper. 4
[4] Handbook of Applied Cryptography
15