Overview:: Services, Mechanisms, and Attacks
Overview:: Services, Mechanisms, and Attacks
Overview:
Glossary
Access control - The ability to limit and control the access to host systems and applications via
communication links
active attack - Unbeknownst to sender and receiver, the message has been altered by third party
intruder and shows deviations from usual behavior. E.g. Masquerade, Modification of message, Replay,
Denial of service
authentication
authenticity
availability
data confidentiality
data integrity
denial of service - an interruption of service because the system has become incapacitated/ unable to
communicate
encryption
**integrity **
intruder
**nonrepudiation - ** Ensures sender cannot deny having sent the message and receiver cannot deny
having received the message, i.e. the message contents cannot be repudiated
replay - Adversary obtains a copy of the message to be sent to receiver and replays it, possibly sending
fraudulent messages or gaining authentication
security attacks
security mechanisms
security services
traffic analysis
Substitution Techniques
Caesar/Shift Cipher
Affine Cipher
Hill Cipher
Transposition Techniques
Playfair cipher
Glossary
Simplified DES, Block Cipher Principles, The Data Encryption Standard, The Strength of DES,
Differential and Linear Cryptanalysis, Block Cipher Design Principles
Algorithm
Details Users Pros Cons
mode
- Simplest
Same key - Repetition of CT
mode
independently blocks correspond
- No need for
encrypts 64-bit Simple and to repetition of PT
Electronic synchronizing
blocks of text at a short messages, blocks (highly
Code - Not sensitive
time, separately storing data deterministic,
Block to bit errors,
records liable to
only a single
Last fragment is exploitation by
block is
padded attacker)
affected
K randomised CT
Transmitting
from previous
Cipher encrypted
step and K bits of - Pro
Feedback stream of data
next step are
authentication
XORed
- Vulnerable to bit
input to encryption Transmitting manipulation
Output
step is previous encrypted - Vulnerable to
Feedback
DES output stream of data known plain text
attack
Glossary
Confusion - Confusion makes the relationship between cipher key and corresponding ciphertext
Avalanche effect - Changing just one bit of key results in a drastic change . It is considered desirable
while devising encryption algorithms
Feistel Cipher - Model of block ciphers involving multiple rounds of applying diffusion and confusion
Round keys
S-box
Triple DES
Meet-in-the-middle attack
Introduction To Finite Fields
Modular Arithmetic
Euclid’s Algorithm
Polynomial Arithmetic
Glossary
Triple DES
Double DES , Meet-in-the middle attack
Blowfish
RC5
Algorithm:
Glossary
Traffic Confidentiality
Key Distribution
Discrete Logarithms.
Public-Key Cryptography
Key Management
RSA with d
Authentication Requirements
Authentication Functions
Hash Functions
1. Compression
2. Collision Resistant
MAC
Hash Algorithms
RIPEMD-160
HMAC.
Digital Signatures
Authentication Protocols
System Security
Password Management
Virus Countermeasures
Trusted Systems.