Cryptography and Network
Cryptography and Network
Security is the state of being free from danger or threat. In other words, Security is the
ability of a system to protect information or data and system resources with respect to
confidentiality and integrity.
Good Security Standards follow the “90 / 10” Rule explain as 10% of security safeguards
are technical and 90% of security safeguards rely on the computer user to adhere to good
computing practices.
To prevent unauthorised access and protect the information from the attackers
The security required for protecting the information can be categorised as the following:
Ø Data security -Data security is the means of ensuring that data is kept safe from
corruption and that access to it is suitably controlled.
Computer Security – generic name for the collection of tools designed to protect data and
to thwart hackers.
Computer security: Cybersecurity is the protection of computing systems and the data
that they store or access.
Network Security – Measures to protect data during their transmission. Which means
protection of computer network and its services from unauthorised modification, destruction
or disclosure. Network security targets a variety of threats and stops them from entering or
spreading on your network.
Internet Security – Measures to protect data during their transmission over a collection of
interconnected networks.It encompasses browser security and protects against attacks over
the internet(internet based threats). Example – Ecommerce Website in which transaction
happens.
1.3 Cryptography
Cryptography (from Greek kryptós, “hidden”, and gráphein, “to write”) is, traditionally,
the study of means of converting information from its normal, comprehensible form into an
incomprehensible format, rendering it unreadable without secret knowledge — the art of
encryption.
Cryptography means art of Secret Writing The process of writing or reading secret
messages or codes. The art of protecting information (plain text) by transforming it
(encrypting it) into an unreadable format, called cipher text(unintelligible text).Science of
encoding messages so that only the sender and receiver can understand them.
The security attacks may either deliberately or unknowingly a particular person tries to
gain the control of particular system or particular network. There are no single mechanism
that will support all security required, however one particular element underlies many of the
security mechanisms in use cryptographic techniques.
The current trend in security threats are shown in the figure 1.1.Threat are nothing but the
danger or harm that exploits the system or network in the aspect of data or services. Spyware
is a piece of software that are used to gather information from your system without your
knowledge.
Ø Web contents – Content which deals with user experience on websites. It may be a text/
images/ video/animation/sound.
Ø Emails communication – Electronic mail communication is an effective way of
communication which helps in day today communication.
The main objectives of the network security are confidentiality, integrity,an availability as
shown in the figure 1.2. These are the three key objectives and heart of security.
1.6.1.1 Confidentiality
For example when banking online user-IDs and passwords that uniquely identify data
systems’ users and control access to data systems, resources, hence achieves the goal of
confidentiality.
1.6.1.2 Privacy
Most Web users want to understand that personal information they share will not be shared
with anyone else without their permission. Message privacy, particularly for e-commerce
transactions, requires encryption.
1.6.1.3 Integrity
Is the assurance that information can only be accessed or modified by those authorized to
do so. For example, if you were sending an online money transfer for Rs.10,000,but the
receiver is received only Rs.100 due to the tampered information.
Data integrity – The integrity is the way to assurance that data received are exactly as sent
by an authorized entity (i.e., contain no modification, insertion, deletion, or replay).Integrity
assures that information and programs are changed only in authorized manner.If the data
received isn’t the same as the data sent, you’ve got a problem! Much of networking involves
working to improve data integrity.
System integrity-This assures that a system performs its intended function free from
deliberate or inadvertent unauthorized manipulation.
1.6.1.4 Availability
Availability are mainly needs to ensure the services are available to the end user whenever
it is required.
1.6.1.5 Nonrepudiation
1.6.1.6 Authentication
Entity authentication
the assurance that a given entity is involved and currently active in a communication
session (sometimes referred to as identification).
Data integrity the assurance that data has not been altered in an unauthorised (or
accidental) manner since the time that the data was last created, transmitted or stored by an
authorised user.
the assurance that a given entity was the original source of some data (sometimes referred
to as message authentication).
The OSI security architecture focuses on security attacks, mechanisms, and services. These
can be defined briefly as
A process (or a device incorporating such a process) that is designed to detect, prevent, or
recover from a security attack.
A processing or communication service that enhances the security of the data processing
systems and the information transfers of an organization. The services are intended to counter
security attacks, and they make use of one or more security mechanisms to provide the
service.
1.9.1 Threat
The threats are a potential for violation of security, which exists in the circumstance,
capability, action, or event that could breach security and causes harmful to the system.
Hence, a threat is a possible danger that might exploit a vulnerability of the system.
1.9.2Attack
An attack on system security is actually derives from an intelligent threat mechanism. The
goal of the attacker is to deliberate attempt to evade security services and violate the security
policy of a system.
Any action that tries to compromises the security of information owned by an organization
information security is about how to prevent attacks, or failing that, to detect attacks on
information-based systems often threat & attack used to mean same thing have a wide range
of attacks can focus of generic types of attacks.
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The
attacker attempting to break the system solely based upon observed data as shown in figure
1.3 (i.e. the ciphertext)
Interception –The attacker routinely monitors network traffic. Intercept missions can
occur for years without the knowledge of the intercept parties.
Traffic Analysis – A passive attack is a network attack in which a system is monitored and
sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain
information about the target and no data is changed on the target.
These attacks involve some modification of the data stream or the creation of a false
stream as shown in figure 1.4. The hacker attempts to make changes to data on the target or
data via route to the target.
Fabrication – This sort of attack usually inserts new information, or records extra
information on a file. It is mainly used to gain access to data or a service.
Replay- Replay attacks are the network attacks in which an attacker spies the conversation
between the sender and receiver and takes the authenticated information e.g. sharing key and
then contact to the receiver with that key. In Replay attack the attacker gives the proof of his
identity and authenticity. For example: Suppose in the communication of two parties A and
B; A is sharing his key to B to prove his identity but in the meanwhile Attacker C eavesdrop
the conversation between them and keeps the information which are needed to prove his
identity to B. Later C contacts to B and prove its authenticity.
Modification – If the legitimate messages are altered or deleted during the transmission in
real time, then it needs a “man in the middle”.
• More dangerous
• Easy to stop
• Hard to detect
• Hard to stop
• Easy to detect
In symmetric key algorithms, the encryption and decryption keys are known both to sender
and receiver. The encryption key is shared and the decryption key is easily calculated from it.
In many cases, the encryption and decryption keys are the same.
In public key cryptography, encryption key is made public, but it is computationally
infeasible to find the decryption key without the information known to the receiver.
A message is to be transferred from one party to another across some sort of internet. The
two parties, who are the principals in this transaction, must cooperate for the exchange to take
place. A logical information channel is established by defining a route through the internet
from source to destination and by the cooperative use of communication protocols (e.g.,
TCP/IP) by the two principals
• Cloud Computing
• Wireless Networks
• Data Analytics
• Social Networking
• Internet of Things
Summary