CH 1
CH 1
• Pay-TV
• ATM systems
• E-commerce
• E-governments
• E-voting
• Email clients
• Network Security
• Attendence: bonus
• Quizes 10 Degree
• Programs: 15 Degree
Cryptology: Is the study of techniques for ensuring the secercy and/or authenticity
of information.
Cryptanalysis: which deal with the defeating such techniques to recover information
or forging information that will be accepted as authentic
:Is where security engineering meets mathematics it provide us with the tools
that underline most modern security protocols
History
• Cryptography has a history of at least 4000 years ago when ancient
Egyptians encipher some of their hieroglyphic writing on monuments
• 2000 years ago “Julius Ceaser” used a simple substitution cipher “ceaser
cipher”
•1460 Loan Alberti devised a cipher wheel (first substitution cipher machine)
•Invisible ink
•Pin puncture
Replay
Security Service
Service that is provided by a system to give a
specific kind of protection to system resources
intended to counter security attacks
using one or more security mechanisms
often replicates functions normally associated
with physical documents
• which, for example, have signatures, dates; need
protection from disclosure, tampering, or
destruction; be notarized or witnessed; be
recorded or licensed
Security Services (X.800)
Authentication - assurance that the
communicating entity is the one claimed
Access Control - prevention of the
unauthorized use of a resource(who can have
access to a resource, under what condition
access can occur)
Data Confidentiality –protection of data from
unauthorized disclosure
Data Integrity - assurance that data received is
as sent by an authorized entity(no modification)
Non-Repudiation - protection against denial by
one of the parties in a communication
Security Mechanism
feature designed to detect, prevent, or
recover from a security attack
no single mechanism that will support all
services required
however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
hence our focus on this topic
Security Mechanisms (X.800)
specific security mechanisms:
encipherment, digital signatures, access