Chapter Two (1)
Chapter Two (1)
Chapter Two (1)
1
receiver’s private key is used for decryption. Public key and Private Key are
different. Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows his private key. The most popular asymmetric key
cryptography algorithm is Rivest Shamir Adleman (RSA) algorithm.
Applications Of Cryptography:
Advantages
1. Access Control: Cryptography can be used for access control to ensure that only
parties with the proper permissions have access to a resource. Only those with
the correct decryption key can access the resource thanks to encryption.
2
2. Secure Communication: For secure online communication, cryptography is
crucial. It offers secure mechanisms for transmitting private information like
passwords, bank account numbers, and other sensitive data over the internet.
3. Protection against attacks: Cryptography aids in the defence against various
types of assaults, including replay and man-in-the-middle attacks. It offers
strategies for spotting and stopping these assaults.
4. Compliance with legal requirements: Cryptography can assist firms in
meeting a variety of legal requirements, including data protection and privacy
legislation.
Cryptography and Network Security Principles:
In present day scenario security of the system is the sole priority of any organisation. The
main aim of any organisation is to protect their data from attackers.
In Cryptography, attacks are of two types such as Passive attacks and Active attacks
Passive attacks are those that retrieve information from the system without affecting the
system resources while active attacks are those that retrieve system information and make
changes to the system resources and their operations.
3
4. Non-Repudiation:
Non-repudiation is a mechanism that prevents the denial of the message content
sent through a network. In some cases, the sender sends the message and later
denies it. But the non-repudiation does not allow the sender to refuse the
receiver.
5. Access control:
The principle of access control is determined by role management and rule
management. Role management determines who should access the data while rule
management determines up to what extent one can access the data. The information
displayed is dependent on the person who is accessing it.
6. Availability:
The principle of availability states that the resources will be available to authorize
party at all times. Information will not be useful if it is not available to be accessed.
Systems should have sufficient availability of information to satisfy the user request.
Cybersecurity:
“Anything connected to the internet needs cybersecurity. This includes the computers and
mobile devices you use to do every day work and involves applications that need to access
the internet to function.
In addition, cybersecurity can protect the infrastructure of your network by safeguarding
servers, routers, access points, and switches from invasive programs and hackers.
A complete cybersecurity solution often incorporates multiple layers of protection. These can
be configured to support each other and unite to form a more solid barrier against internet
threats.”
It includes cloud security and web application security which defend cloud services and web-
based applications, respectively.
Website protection technology has enabled enhanced protection mechanisms, such as the
protection of a virtual private network (VPN), which also falls under the web security
umbrella.
Web security is crucial to the smooth operation of any business that uses computers. If a
website is hacked or hackers are able to manipulate your systems or software, your website—
and even your entire network—can be brought down, halting business operations. Businesses
need to account for the factors that go into web security and threat prevention.
4
Technologies for web security
Various technologies are available to help companies to achieve web security,
including
web application firewalls (WAFs),
security or vulnerability scanners
password-cracking tools
fuzzing tools
black box testing tools, and
white box testing tools.
2.3. Convergence
2.3.1. Communications and Information
Communication is a process involving two or more users. They exchange data, messages and
adopt the position of sender and receiver alternately.
Information is the set of data that has been previously prepared to configure a message.
Wired/Wireless PKI (Public Key Infrastructure)
PKI is built into all web browsers used today, and it helps secure public internet traffic.
Organizations can use it to secure the communications they send back and forth internally
and also to make sure connected devices can connect securely.
The most important concept associated with PKI is the cryptographic keys that are part of the
encryption process and serve to authenticate different people or devices attempting to
communicate with the network.
PKI works through the implementation of two technologies: certificates and keys. A key is a
long number used to encrypt data. Each element of a message gets encrypted using the key
formula.
For example, if you want to write a message where every letter is replaced by the letter after
it, then A will become B, C will be D, etc. If someone is to have this key, they will get what
will look like a nonsensical message and decrypt it.
With PKI, the key involves advanced mathematical concepts that are much more
complicated. With the alphabetic example above, there is one key, and if the recipient has it,
5
they can easily decrypt the message. With PKI, on the other hand, there are two keys: a
private and a public one.
The public key is available to anyone who wants it and is used to encode a message that
someone sends to you. A private key is what you use to decrypt the message after you get it.
The keys are connected using a complex mathematical equation.
Even though the private and public keys are connected, the connection is facilitated by this
complex equation. It is therefore extremely difficult to ascertain the private key by using data
from the public key.
Certificates, which are issued by a certificate authority (CA), let you know the person or
device you want to communicate with is actually who they claim to be. When the correct
certificate is associated with a device, the device is considered authentic.
The validity of the certificate can be authenticated through a system that checks whether it is
real or not.
IP version four addresses are 32-bit integers which will be expressed in decimal notation.
Example- 192.0.2.126 could be an IPv4 address.
Parts of IPv4
Network part:
The network part indicates the distinctive variety that’s appointed to the
network. The network part conjointly identifies the category of the network
that’s assigned.
Host Part:
The host part uniquely identifies the machine on your network. This part of the
IPv4 address is assigned to every host.
For each host on the network, the network part is the same, however, the host
half must vary.
Subnet number:
This is the no obligatory part of IPv4. Local networks that have massive
numbers of hosts are divided into subnets and subnet numbers are appointed to
that.
Characteristics of IPv4
IPv4 could be a 32-Bit IP Address.
IPv4 could be a numeric address, and its bits are separated by a dot.
The number of header fields is twelve and the length of the header field is
twenty.
It has Unicast, broadcast, and multicast style of addresses.
IPv4 supports VLSM (Virtual Length Subnet Mask).
6
IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
RIP may be a routing protocol supported by the routed daemon.
Networks ought to be designed either manually or with DHCP.
Packet fragmentation permits from routers and causing host.
IPv6 was designed by Internet Engineering Task Force (IETF) in December 1998
with the purpose of superseding the IPv4 due to the global exponentially growing
internet users.
An IPv6 address consists of eight groups of four hexadecimal digits. Here’s an example
IPv6 address:
3001:0da8:75a3:0000:0000:8a2e: 0370:7334
This new IP address version is being deployed to fulfil the need for more Internet
addresses. It was aimed to resolve issues which are associated with IPv4. With 128-
bit address space, it allows 340 undecillion unique address space. IPv6 also called
IPng (Internet Protocol next generation)
IDS/IPC systems may be supplied as one combined solution, also known as IDPS security
solution, or as two separate systems focused on their own specific goals. Today, IDS/IPS
functionally mostly comes as part of other solutions, such as network traffic analysis
or network detection and response
Intrusion detection systems (IDS) work as monitoring solutions designed to search for signs
of network intrusion. If the IDS system discovers the intrusion, it sends a notification to
information security professionals.
Intrusion prevention systems (IPS) include functionality for taking action on the discovered
threat by blocking or remediating it. So, the main difference between IDS and IPS is that IPS
allows you to automate the process of responding to detected threats, while IDS requires you
to address attacks in manual mode.
7
Why IDS and IPS is important?
Both intrusion detection systems and intrusion prevention systems provide an extra layer of
security to networks by monitoring and analyzing traffic for malicious activity. They can
detect known and unknown threats, allowing organizations to respond to potential attacks
before they cause damage.
Intrusion detection and prevention systems monitor suspicious activities or patterns, such as
port scans or unauthorized access attempts. IDS/IPS systems may look for signatures of
known attacks or deviations in network traffic. Intrusion detection and prevention systems
may come as software applications or cloud-based solutions.
When an IDS/IPS detects suspicious activity, it can take different actions depending on the
type of attack detected. These actions may include logging the event in a security audit log,
alerting administrators, blocking the offending IP address from accessing the network, and
even resetting the connection if necessary.
Keep On
Your Eye
Cryptography is a mechanism to ensure data security in transit or at rest. Organizations are
investing heavily in encryption solutions to protect their data with the rise in cybersecurity
breaches. However, hackers, too, are proving equal to the task by evolving advanced
techniques to target cryptographic solutions.
What is cryptography?
Cryptography is a security mechanism for storing and transmitting sensitive data such that
only the sender and the intended receiver can read or understand it. Key(s) are used to encode
(at the sender's end) and decode (at the receiver's end) the data.
Encryption is the process of converting plaintext or data into ciphertext or encoded data (that
is not readable to everyone). Converting the ciphertext or encrypted data to a readable form
or decoded version is called decryption.
What are cryptography attacks?
A cryptographic attack is a method used by hackers to target cryptographic solutions like
ciphertext, encryption keys, etc. These attacks aim to retrieve the plaintext from the
ciphertext or decode the encrypted data.
8
Hackers may attempt to bypass the security of a cryptographic system by discovering
weaknesses and flaws in cryptography techniques, cryptographic protocol, encryption
algorithms, or key management strategy.
Passive and active attacks
A cryptography attack can be either passive or active.
Passive attacks:
involve some kind of modification of the data or communication. In this case, the
attacker not only gains access to the data but also tampers with it.
Public and private keys play a significant role in encrypting and decrypting the data in
a cryptographic system. In a brute force attack, the cybercriminal tries various private
keys to decipher an encrypted message or data. If the key size is 8-bit, the possible
keys will be 256 (i.e., 28). The cybercriminal must know the algorithm (usually found
as open-source programs) to try all the 256 possible keys in this attack technique.
2. Ciphertext-only attack
In this attack vector, the attacker gains access to a collection of ciphertext. Although
the attacker cannot access the plaintext, they can successfully determine the ciphertext
from the collection. Through this attack technique, the attacker can occasionally
determine the key.
In this attack model, the cybercriminal can choose arbitrary plaintext data to obtain
the ciphertext. It simplifies the attacker's task of resolving the encryption key. One
well-known example of this type of attack is the differential cryptanalysis performed
on block ciphers.
9
By analyzing the chosen ciphertext and relating it to the plaintext, the attacker
attempts to guess the key. Older versions of RSA encryption were prone to this attack.
In this attack technique, the cybercriminal finds or knows the plaintext of some
portions of the ciphertext using information gathering techniques. Linear
cryptanalysis in block cipher is one such example.
Here, the attacker tries to recover the key used to encrypt or decrypt the data by
analyzing the cryptographic algorithm.
Cryptography attacks are a serious threat to the security of any organization. Organizations
can protect their data and communication from being compromised by understanding the
various types of attacks and taking steps to prevent them.
The End
10