M Yunis2
M Yunis2
Introduction to information
security
Theory
Lecture one
[email protected]
q
Outline
• Meaning of computer security.
• Some important terms used in computer
security.
computer security
• The meaning of the term computer
security has evolved in recent years.
Before the problem of data security
became widely publicized in the media,
most people’s idea of computer security
focused on the physical machine.
Traditionally, computer facilities have
been physically protected for three
reasons:
– To prevent theft of or damage to the
hardware
– To prevent theft of or damage to the
Computer security
• Computer security is security applied to computing
devices such as computers and smartphones, as
well as computer networks such as private and
public networks, including the whole Internet.
• It includes physical security to prevent theft of
equipment, and information security to protect the
data on that equipment. It is sometimes referred to
as "cyber security" or "IT security", though these
terms generally do not refer to physical security.
Some important terms used in
computer security.
INTRODUCTION TO
INFORMATION SECURITY
Theory
Second lecture
[email protected]
Information security
Outline:
• Top 10 Cybercrime Prevention Tips.
• Principle security.
Information security
3. Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook,
Twitter, Youtube, MSN, etc.) are set to private. Check your
security settings. Be careful what information you post online.
Once it is on the Internet, it is there forever!
4. Secure your Mobile Devices
Be aware that your mobile device is vulnerable to viruses and
hackers. Download applications from trusted sources.
5. Install the latest operating system updates
Keep your applications and operating system (e.g. Windows,
Mac, Linux) current with the latest system updates. Turn on
automatic updates to prevent potential attacks on older software.
Information security
Principle security.
• There are five principles of security. They are as follows
1. Confidentiality
The principle of confidentiality specifies that only the
sender and the intended recipient should be able to access
the content of the message.
Information security
2. Integrity
• Integrity means that data is protected from unauthorized
changes to ensure that it is reliable and correct.
3. Authentication:
• Authentication mechanism helps in establishing proof of
identification.
4. Access control:
Access control specifies and control who can access what.
Attacks
• We want our security system to make sure that no
data are disclosed to unauthorized parties.
Ø Data should not be modified in illegitimate ways
Ø Legitimate user can access the data.
Types of attacks
Attacks are grouped into two types:
Ø Passive attacks: does not involve any modification to
the contents of an original message
Ø Active attacks: the contents of the original message
are modified in some ways.
Information security
INFORMATION SECURITY
Theory
Third lecture
[email protected]
Information security
Outline:
• Substitution and Transposition method
• Caeser cipher
• Monoalphabetic cipher
• Vigenere Cipher
• Polybius cipher
Information security
Substitution:
• This is a classical method of cryptography
• We use substitution when the Plaintext are replaced with
Ciphertext.
• When the letters are represented by other letter by someone to
hide real words.
• There is a method which is used with substitution method called
Caesar cipher
Information security
Caesar cipher
• For two thousand years ago this method has been invented by
the Roman Empire (Julius Caesar).
• This is use to hide messages
• How to use?
Answer: take a letter go three long alphabetic and replaced with a
letter for instance.
P: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
C: D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
H O W A R E Y O U
Example:
K R Z D U H B R X
• Plaintext c(x) = this find the cypher text of (this) if key =3?
ABCDEFGHI J K LMNOPQRSTUVWXYZ
0 1 2 3 4 5 6 7 8 9 10………………..…………… ……..25
Solution:
c(x)= (t+k) mod 26
c(t)=(19+3) mod 26 = 22 w
c(h)=(7+3) mod 26 = 10 k
c(i)=(8+3) mod 26 = 11 l
c(s)=(18+3) mod 26 = 21 v
Information security
• P(wlkv)= this
Information security
Solution
Caesar Cipher is broken either with brute force or frequency analysis.
Using Frequency Analysis, the letter ‘m’ is repeated, and single letter words are
scarce in English; examples are ‘a’ and ‘I’.
To decipher the rest of the text, we find the shift needed to turn ‘m’ to ‘a’ and
‘m’ to ‘I’, whichever produces a meaningful sentence is the correct shift.
Fours shifts backwards are needed to turn ‘m’ to ‘I’, continuing to shift each of
the letters of the cipher text 4 shifts backwards produces the decrypted text:
I think, therefore I exist
Information security
Monoalphabetic Cipher
q Rather than just shifting the alphabet, shuffle (jumble) the letters
arbitrarily ﮔۆﺮﯾﻦ
q Each plaintext letter maps to a different random ciphertext letter
q Hence key is 26 letters long
• Plain: abcdefghijklmnopqrstuvwxyz
• Cipher: DKVQFIBJWPESCXHTMYAUOLRGZN
• Plaintext: ifwewishtoreplaceletters
• Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
Solution
a b c d e f g h i j k l m n o p q r s t u v w x y Z
P A C K M Y B O X W I T H F V E D Z E N L Q U R J S
• UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETS
XAIZ
• VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
• EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
Breaking the Monoalphabetic Cipher
Solution
By analyzing the ciphertext, the most commonly occurring letter is M, followed by X. If we assume
that M is equivalent to e and X is equivalent to t we do not get a meaningful phrase. Thus, we can
estimate that M = t and X = e. Analysis confirms that this is a shift of 19 letters in both substitutions.
Using this same shift for all letters gives the plaintext
The fault, dear Brutus is lies not in our stars but in ourselves
Vigenère Cipher
q key: d e c e p t i v e d e c e p t i v e d e c e p t i v e
q plaintext: we a r e d i s c o v e r e d s a v e y o u r s e l f
q ciphertext:
Z I C V T WQ N G R Z G V T WA V Z H C Q Y G L M G J
Plaintext
Key
Breaking the Vigenère Cipher
CDBBEBBBED
Transposition
• With transposition method the letter are stable they are not change,
only their letter’s position are going to change.
• According to its columns we can make changes.
Transposition example
• Change the bellow plaintext to ciphertext regarding using
transposition method by four columns:
• “How are you mate”
• 4-col-type
4 col-type ciphertext
howa hrueoemxwyaxaotx
reyo
Umat
E xxx
• Decrypt the message = “AES EAO OIT VUI NNN NEE RLC
FTE LNV LER LS ” using a tabular transposition cipher with
row of length 4 characters.
• since there are 10 * 3 + 2 = 32 characters and row as 4
characters, 32/4= 8. means we need 8 row.
N T O A
A N T O
C A K T
S A E B
M A P C
INFORMATION SECURITY
Theory
Fourth lecture
[email protected]
Information security
Outline:
• Making good encryption algorithm.
• Properties of "Trustworthy" Ecryption Systems
• Symmetric·Key Cryptography
• Asymmetric-Key Cryptography
• Private key crypto system
Information security
5. The size of the enciphered text should be no larger than the text
of the original message.
The idea behind principle 5 is that a cipher text that expands dramatically in size
can not possibly carry more information than the plaintext, yet it gives the
cryptanalyst more data from which to infer a pattern. Furthermore, a longer cipher
text implies more space for storage and more time to communicate.
Information security
1. Symmetric·Key Cryptograph
• In symmetric-key cryptography, the same key is used by both
parties. The sender uses this key and an encryption algorithm to
encrypt data; the receiver uses the same key and the
corresponding decryption algorithm to decrypt the data.
Information security
2. Asymmetric-Key Cryptography:
• In asymmetric or public-key cryptography, there are two keys: a
private key and a public key. The private key is kept by the
receiver. The public key is announced to the public.
Information security
Lecture 5
Younus Muhammed
Outline
n Main components of modern Symmetric
cryptography
n
— 76
Modern Block Ciphers (I)
n A modern block cipher encrypts an n-bit block of plaintext
or decrypts an n-bit block of ciphertext.
n The encryption or decryption algorithm uses a k-bit key.
n The decryption algorithm must be the inverse of the
encryption algorithm and both operations must use the
same secret key.
A 5 × 5 P-Box
A 5 × 3 P-Box A 3 × 5 P-Box
An Introduction to Modern Symmetric Encryption Techniques — 82
P-Box(III)
n Straight P-Boxes
n A straight P-Box with n inputs and n outputs is
a permutation.
n There are n! possible mappings.
Some of the inputs are blocked and do not reach the output
Output
Input
Note that inputs 7, 8, 9, 15, 16, 23, 24. and 25 are blocked.
Based on the table, an input of 010 yields the output 01. An input of 101
yields the output of 00.
00 0010 1100 0100 0001 0111 1010 1011 0110 1000 0101 0011 1111 1101 0000 1110 1001
Oute 01 1110 1011 0010 1100 0100 0111 1101 0001 0101 0000 1111 1010 0011 1001 1000 0110
r bits 10 0100 0010 0001 1011 1010 1101 0111 1000 1111 1001 1100 0101 0110 0011 0000 1110
11 1011 1000 1100 0111 0001 1110 0010 1101 0110 1111 0000 1001 1010 0100 0101 0011