ITC593 Topic 1
ITC593 Topic 1
University
Week 1 – Topic 1
William Stallings (2023). Cryptography and Network Security: Principles and Practice, 8th Ed, Pearson.
Charles Sturt
University
Topic 1 - Outline
1. Subject Introduction
2. Topic 1
3. Panel Discussion
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 2
Charles Sturt
University
Subject Introduction
Subject Textbook
William Stallings (2023). Cryptography and Network Security:
Principles and Practice, 8th Ed, Pearson.
Subject Schedule
Follow subject schedule in Brightspace
Recommended reading/resources
• Kizza, J. M. (2024). Guide to Computer Network Security (6th ed. 2024.). Springer international Publishing.
• Vacca, J. R. (Ed.). (2025). Computer and Information Security Handbook. Volume 1Fourth edition. Morgan Kaufmann.
• McClure, S., Scambray J., and Kurtz G. (2012), Hacking Exposed: Network Security Secrets & Solutions, 7th Ed.,McGraw Hill Professional.
• Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Boston: Pearson.
• Easttom, W (2011). Computer security fundamentals. 2nd Ed. Pearson.
Additional reading/resources for practice will be advised by weekly announcements on the subject Brightspace site.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography
Charles Sturt
University
Subject Overview
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 4
Consultation Procedure
E-mail : [email protected]
Need Advice?
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 5
Recommendations
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 6
Charles Sturt
University
Chapter 1
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 7
Charles Sturt
University
Lecture Outline
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography 8
Cybersecurity
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Cybersecurity
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Objectives
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Objectives
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Computer Security Challenges
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
OSI Security Architecture
Security
Security attack Security service
mechanism
A processing or
A process (or a device communication Intended to counter
Any action that incorporating such a service that enhances security attacks, and
compromises the process) that is they make use of one
the security of the
security of designed to detect, data processing or more security
information owned prevent, or recover systems and the mechanisms to
by an organization from a security attack information transfers provide the service
of an organization
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Threats and Attacks
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Attacks
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Passive Attacks
Are in the nature of
eavesdropping on, or
monitoring of, transmissions
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Active Attacks
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Authentication
Concerned with assuring that a communication is
authentic
In the case of a single message, assures the recipient that the
message is from the source that it claims to be from
In the case of ongoing interaction, assures the two entities are
authentic and that the connection is not interfered with in
such a way that a third party can masquerade as one of the
two legitimate parties
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Authentication
Peer entity authentication
Provides for the corroboration of the identity of a peer entity in an
association. Two entities are considered peers if they implement the
same protocol in different systems. Peer entity authentication is
provided for use at the establishment of, or at times during the data
transfer phase of, a connection. It attempts to provide confidence
that an entity is not performing either a masquerade or an
unauthorized replay of a previous connection
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Access Control
The ability to limit and control the access to host
systems and applications via communications
links
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Data Confidentiality
The protection of transmitted data from passive
attacks
Broadest service protects all user data transmitted between
two users over a period of time
Narrower forms of service includes the protection of a single
message or even specific fields within a message
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Data Integrity
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Nonrepudiation
When a message is sent, the receiver can prove that the alleged
sender in fact sent the message
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Availability Service
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Security Mechanisms
Cryptographic algorithms: We can distinguish between reversible cryptographic mechanisms and
irreversible cryptographic mechanisms. A reversible cryptographic mechanism is simply an encryption
algorithm that allows data to be encrypted and subsequently decrypted. Irreversible cryptographic mechanisms
include hash algorithms and message authentication codes, which are used in digital signature and message
authentication applications.
Data integrity: This category covers a variety of mechanisms used to assure the integrity of a data unit
or stream of data units.
Digital signature: Data appended to, or a cryptographic transformation of, a data unit that allows a recipient
of the data unit to prove the source and integrity of the data unit and protect against forgery.
Traffic padding: The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Routing control: Enables selection of particular physically or logically secure routes for certain data and
allows routing changes, especially when a breach of security is suspected.
Notarization: The use of a trusted third party to assure certain properties of a data exchange
Access control: A variety of mechanisms that enforce access rights to resources.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Keyless Algorithms
Deterministic functions that have certain properties
useful for cryptography
One type of keyless algorithm is the cryptographic hash
function
A hash function turns a variable amount of text into a small, fixed- length
value called a hash value, hash code, or digest
A cryptographic hash function is one that has additional properties that
make it useful as part of another cryptographic algorithm, such as a
message authentication code or a digital signature
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Single-Key Algorithms
Encryption
algorithms that use a Symmetric
Single-key encryption takes the
cryptographic single key are
referred to as following forms:
algorithms depend
on the use of a symmetric encryption
secret key algorithms
Block cipher
•A block cipher operates on
With symmetric encryption, an data as a sequence of blocks
encryption algorithm takes as •In most versions of the block
input some data to be protected cipher, known as modes of
and a secret key and produces an operation, the transformation
unintelligible transformation on depends not only on the
that data current data block and the
secret key but also on the
content of preceding blocks
A corresponding decryption
algorithm takes the
transformed data and the
same secret key and recovers
Stream cipher
the original data •A stream cipher operates on data
as a sequence of bits
•As with the block cipher, the
transformation depends on a
secret key
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Single-Key Algorithms
Another form of single-key cryptographic
algorithm is the message authentication code (MAC)
The recipient of the message plus the MAC can perform the same
calculation on the message; if the calculated MAC matches the MAC
accompanying the message, this provides assurance that the
message has not been altered
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Asymmetric Algorithms
Encryption algorithms that use a single key are referred to
as asymmetric encryption algorithms
Key exchange
The process of securely distributing a symmetric key to two or more
parties
User authentication
The process of authenticating that a user attempting to access an
application or service is genuine and, similarly, that the application or
service is genuine
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Device Security
The other aspect of network security is the protection of network devices, such as routers
and switches, and end systems connected to the network, such as client systems and
servers
The primary security concerns are intruders that gain access to the system to perform
unauthorized actions, insert malicious software (malware), or overwhelm system resources
to diminish availability
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trust Model
One of the most widely accepted and most cited definitions of trust is:
“the willingness of a party to be vulnerable to the actions of
another party based on the expectation that the other will perform
a particular action important to the trustor, irrespective of the ability
to monitor or control that other party”
Propensity to trust: A tendency to be willing to trust others across a broad spectrum of situations
and trust targets. This suggests that every individual has some baseline level of trust that will
influence the person’s willingness to rely on the words and actions of others
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
The Trust Model and Information Security
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of an Individual
Organizations need to be concerned about both internal users (employees, on-site
contractors) and external users (customers, suppliers) of their information systems
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of an Organization
Most organizations rely on information system service and information
provided by external organizations, as well as partnerships to accomplish
missions and business functions (examples are cloud service providers
and companies that form part of the supply chain for the organization)
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Trustworthiness of Information Systems
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Establishing Trust Relationships
Direct historical
Validated trust: trust: Mediated trust: Mandated trust:
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.
Standards
Internet Society:
•ISOC is a professional membership society with worldwide organizational and individual membership. It provides leadership in
addressing issues that confront the future of the Internet and is the organization home for the groups responsible for Internet
infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB). These
organizations develop Internet standards and related specifications, all of which are published as Requests for Comments (RFCs).
ITU-T:
•The International Telecommunication Union (ITU) is an international organization within the United Nations System in which
governments and the private sector coordinate global telecom networks and services. The ITU Telecommunication Standardization
Sector (ITU-T) is one of the three sectors of the ITU. ITU-T’s mission is the development of technical standards covering all fields of
telecommunications. ITU-T standards are referred to as Recommendations
ISO:
•The International Organization for Standardization (ISO) is a worldwide federation of national standards bodies from more than 140
countries, one from each country. ISO is a nongovernmental organization that promotes the development of standardization and
related activities with a view to facilitating the international exchange of goods and services and to developing cooperation in the
spheres of intellectual, scientific, technological, and economic activity. ISO’s work results in international agreements that are
published as International Standards
School of Computing Mathematics & Engineering | ITC593 Network Security and Cryptography Copyright © 2023 Pearson Education, Ltd. All Rights Reserved.