Chapter 2
Chapter 2
1. Confidentiality: It means the assurance that only authorized users can read or use confidential information.
Without confidentiality, anyone with network access can use readily available tools to eavesdrop on network
traffic and intercept valuable proprietary information. If privacy or confidentiality is not guaranteed, outsiders or
Questions intruders could steal the information that is stored in plaintext. Hence, cryptosystems use different techniques
and mechanisms to ensure information confidentiality. When cryptographic keys are used on plaintext to create
ciphertext, privacy is assigned to the information.
2. Integrity: is the security aspect that confirms that the original contents of information have not been altered or
Why we need Security in our life? corrupted. If integrity is not ensured, someone might alter information or information might become corrupted,
and the alteration could be sometimes undetected. This is the reason why many cryptosystems use techniques
What is the Computational
and mechanisms to verify the integrity of information. For example, an intruder might covertly alter a file, but
security & Unconditional security?
change the unique digital thumbprint for the file, causing other users to detect the tampering by comparing the
changed digital thumbprint to the digital thumbprint for the original contents for email accounts that are
authenticated from the server.
/
3 Authorization: Authorization is a basic function of security that cryptography cannot provide. Authorization refers to the process of granting or denying
access to a network resource or service. In other words, authorization means access control to any resource used for computer networks. Most of the computer
security systems that we have today are based on a two-step mechanism. The first step is authentication, and the second step is authorization or access control,
which allows the user to access various resources based on the user’s identity.
4 Authentication: means the process of verification of the identity of the entities that communicate over a network. Without authentication, any user
with network access can use readily available tools to forge originating Internet Protocol (IP) addresses and impersonate others. Therefore, cryptosystems use
various mechanisms to authenticate both the originators and recipients of information. An example could be that a user needs to key in his or her login name
and password.
5 Non repudiation: Nonrepudiation: For information communication, assurance is needed that a party cannot falsely deny that a part of the actual
communication occurred. Nonrepudiation makes sure that each party is liable for its sent message. If nonrepudiation is not ensured, someone can
communicate and then later either falsely deny the communication entirely or claim that it occurred at a different time, or even deny receiving any piece
of information. Hence, this aspect ensures accountability of each entity taking part in any communication event.
Types of attacks:
1.passive attacks: gain unauthorized access to sensitive or confidential data or information without being detected. The attacker observes the content of
messages or copies the content of messages. Passive Attack is a danger to Confidentiality. Due to passive attack, there is no harm to the system. The most
important thing is that In a passive attack, Victim does not get informed about the attack.
2. Active attacks: are the type of attacks in which, the attacker efforts to change or modify the content of messages. Active Attack is dangerous to Integrity as
well as availability. Due to active attack system is always damaged and System resources can be changed. The most important thing is that, In an active attack,
Victim gets informed about the attack.