0% found this document useful (0 votes)
13 views28 pages

Network Security

data communication and networking

Uploaded by

ishvijain2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views28 pages

Network Security

data communication and networking

Uploaded by

ishvijain2022
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Module 5

Network Security
Security Goals

• Confidentiality

• Integrity

• Availability
Snooping

▪Snooping refers to unauthorized access to or


interception of data.
▪For example, a file transferred through the Internet
may contain confidential information.
▪An unauthorized entity may intercept the
transmission and use the contents for her own
benefit.
▪To prevent snooping, the data can be made
nonintelligible to the intercepter by using
encipherment techniques.
Traffic Analysis

▪Although encipherment of data may make it


nonintelligible for the intercepter,
▪she can obtain some other types of information by
monitoring online traffic.
▪For example, she can find the electronic address
(such as the e-mail address) of the sender or the
receiver.
▪She can collect pairs of requests and responses to
help her guess the nature of the transaction.
Modification

▪After intercepting or accessing information, the


attacker modifies the information to make it
beneficial to herself.
▪For example, a customer sends a message to a
bank to initiate some transaction. The attacker
intercepts the message and changes the type of
transaction to benefit herself.
▪Note that sometimes the attacker simply deletes or
delays the message to harm the system or to
benefit from it.
Masquerading

▪Masquerading, or spoofing, happens when the


attacker impersonates somebody else.
▪For example, an attacker might steal the bank
card and PIN of a bank customer and pretend
that she is that customer.
▪Sometimes the attacker pretends instead to be
the receiver entity.
▪For example, a user tries to contact a bank, but
another site pretends that it is the bank and
obtains some information from the user.
Replaying

▪In replaying, the attacker obtains a copy of a


message sent by a user and later tries to replay it.

▪For example, a person sends a request to her


bank to ask for payment

▪The attacker intercepts the message and sends it


again to receive another payment from the bank.
Repudiation

▪This type of attack is different from others because it is performed by


one of the two parties in the communication: the sender or the receiver.

▪The sender of the message might later deny that she has sent the
message; the receiver of the message might later deny that he has
received the message.

▪ An example of denial by the sender would be a bank customer asking


her bank to send some money to a third party but later denying that she
has made such a request.

▪An example of denial by the receiver could occur when a person buys a
product from a manufacturer and pays for it electronically, but the
manufacturer later denies having received the payment and asks to be
paid.
Denial of Service

▪Denial of service (DoS) is a very common attack. It may slow down


or totally interrupt
▪the service of a system.

▪The attacker can use several strategies to achieve this. She might
send so many bogus requests to a server that the server crashes
because of the heavy load.

▪The attacker might intercept and delete a server’s response to a


client, making the client believe that the server is not responding.

▪The attacker may also intercept requests from the clients, causing
the clients to send requests many times and overload the system.
Cryptography
▪Some security services can be implemented using
cryptography. Cryptography, a word with Greek origins,
means “secret writing.”

▪However, we use the term to refer to the science and art


of transforming messages to make them secure and
immune to attacks.

▪Although in the past cryptography referred only to the


encryption and decryption of messages using secret
keys,
▪Today it is defined as involving three distinct
mechanisms:
▪ Symmetric-key encipherment
▪ Asymmetric-key encipherment
▪ Hashing.
Steganography

▪Cryptography is a technique for implementing security


mechanisms, another technique that was used for secret
communication in the past is being revived at the present
time: steganography.

▪The word steganography, with origins in Greek, means


“covered writing,” in contrast with cryptography,
▪which means “secret writing.” Cryptography means
concealing the contents of a message by enciphering;

▪ steganography means concealing the message itself by


covering it with something else. .
Confidentiality can be achieved using ciphers. Ciphers can be
divided into two broad categories:

• Symmetric-key – Private key cryp.. – 1 key - private


• Asymmetric-key – Public key cryp.. – 2 keys – private
(decryption) & public (encryption)

A symmetric-key cipher uses the same key for both encryption


and decryption, and the key can be used for bidirectional
communication, which is why it is called symmetric.
A substitution cipher replaces one symbol with another.
If the symbols in the plaintext are alphabetic characters,
we replace one character with another. For example, we
can replace letter A with letter D and letter T with letter Z.
If the symbols are digits (0 to 9), we can replace 3 with 7
and 2 with 6.

A-Z
B-Y BAD – YZW-------- YZW – BAD in, is, of,
the, what
C-X
D-W
Transposition Cipher
Asymmetric-key ciphers are sometimes called
public-key ciphers.

Encryption – Public key

Decryption – Private key


RSA Cryptosystem

Although there are several asymmetric-key cryptosystems,


one of the common publickey algorithms is the RSA
cryptosystem, named for its inventors (Rivest, Shamir,
and Adleman).
• RSA uses two exponents, e and d, where e is public and
d is private.

• Suppose P is the plaintext and C is the ciphertext.

• Alice uses C = P^e mod n to create ciphertext C from


plaintext P; public key (n,e)

• Bob uses P = C^d mod n to retrieve the plaintext sent by


Alice. private key (n,d)

• The modulus n, a very large number, is created during


the key generation process.
• Let Bob choose large prime number p and q
• Calculate n = p × q; 7*11 = 77.
• The value of z = {(p-1)(q-1)} (7 − 1)(11 − 1), or 60.
• Choose prime number e < n {to be 13}
• Find d, such that e × d mod z = 1. {then d is 37.}
• Now imagine that Alice wants to send the plaintext
5 to Bob.
• She uses the public exponent 13 to encrypt 5.
• This system is not safe because p and q are small.
e=13
d=37
n=77
Applications

Although RSA can be used to encrypt and decrypt actual


messages, it is very slow if the message is long. RSA,
therefore, is useful for short messages. In particular, we
will see that RSA is used in digital signatures and other
cryptosystems that often need to encrypt a small message
without having access to a symmetric key. RSA is also
used for authentication.
Hashing
Digital Signature

You might also like