Lecture 1- introduction to data security
Lecture 1- introduction to data security
Alshaimaa Abo-alian
Introduction to Data Security [email protected]
Aim of The Course
3
Marks Distribution
◼ Total: 100 %
4 4
Course References
5
Lecture Outline
➢ Security Concepts
➢ Security Objectives
➢ Classes of Attacks
➢ Security Services Vs. Security mechanisms
➢ Cryptographic Algorithms
➢ Evaluation Criteria of Cryptographic Algorithms
➢ Models for Evaluating Security
6
Security Concepts
7
Security Concepts
8
Security Concepts
What is Cryptography?
▪ A branch of mathematics that deals with the
transformation of data in order to ensure information
security.
▪ Cryptography is an essential component in the
secure storage and transmission of data
9
Security Concepts
Cryptology
Cryptography Cryptanalysis
10
Security Objectives
11
Cryptographic/Information
Security Objectives
1. Confidentiality : covers two related concepts:
a) Data confidentiality: Assures that private or confidential
information is not made available or disclosed to
unauthorized individuals.
b) Privacy : focuses on how personal or sensitive data is
collected, used, shared, and stored, ensuring compliance
with privacy regulations (e.g., GDPR, HIPAA).
➔ A loss of confidentiality is the unauthorized disclosure of
information.
12
Cryptographic/Information
Security Objectives
2. Integrity : Assures that data (both stored and transmitted) are
accurate, consistent and changed only in an authorized manner.
➔ This covers two related concepts:
a) Data authenticity: verifies that data is genuine and originates
from a legitimate source without any unauthorized
modifications.
b) Nonrepudiation: Assures that:
– The sender of information is provided with proof of delivery
– the recipient is provided with proof of the sender’s identity
➔ so neither can later deny having processed the information.
➔ Integrity ensures that data has not been changed, destroyed, or
lost in an unauthorized or accidental manner. 13
Cryptographic/Information
Security Objectives
3. Availability : Assures that systems work promptly, and
service is not denied to authorized users.
➔Active attack
Alters system resources or
operation
16
16
Classes of Attacks
Passive Attack: only threatens confidentiality of data.
Examples
1. Release message contents
2. Traffic analysis
➔ Relatively hard to detect, but easier to prevent
Active Attack: threatens data integrity, authentication and
confidentiality.
Examples
1. Masquerade 3. Modification
2. Replay 4. Denial of service
➔ Relatively hard to prevent, but easier to detect 17
Release Message Content
18
Traffic Analysis Attack
19
Masquerade Attack
20
Replay Attack
21
Modification Attack
22
Denial of Service Attack
23
Security Service Vs. Security Mechanism
Security Service
o A capability that supports one or more of the security
objectives
o Implemented by security mechanisms
Security Mechanism
o A method for preventing, detecting or recovering from
an attack
24
25
Security Services
26
Security Mechanisms
27
Cryptographic Algorithms
28
Cryptographic Algorithms
29
Keyless Cryptographic
Algorithms
1. Cryptographic hash function: A function turns a
variable amount of text into a small, fixed-length
value called a hash value, hash code, or digest.
➔Used to ensure data integrity
30
Single-key Cryptographic
Algorithms
▪ Encryption algorithms that use a single key are referred to as
symmetric encryption algorithms
▪ With symmetric encryption, an encryption algorithm takes as input
the data to be protected (plaintext) and a secret key and
produces a ciphertext.
▪ A corresponding decryption algorithm takes the ciphertext
(transformed data) and the same secret key and recovers the
original data
31
Single-key Cryptographic
Algorithms
Symmetric encryption takes the following forms:
1. Block cipher
A block cipher operates on data as a sequence of
blocks
2. Stream cipher
A stream cipher operates on data as a sequence of
bits/bytes
Used when the data must be processed one symbol at
a time
32
Block Cipher Vs. Stream Cipher
33
Single-key Cryptographic
Algorithms
Another form of single-key cryptographic algorithm is the
message authentication code (MAC)
A MAC is a unique tag associated with a data block or
message to verify the integrity of the message.
The MAC is generated using a secret key and a
cryptographic hash function of the message
The recipient of the message can check if the calculated
MAC matches the MAC accompanying the message, this
provides assurance that the message has not been
altered
34
Message Authentication Code
(M A C)
MAC algorithm 35
Two-key Cryptographic
Algorithms
▪ Two-key algorithms involve the use of two related keys (private key &
public key).
▪ A private key is known only to a single user or entity, whereas the
corresponding public key is made available to a number of users.
▪ Encryption algorithms that use two keys are referred to as
asymmetric (public-key) encryption algorithms.
36
Two-key Cryptographic
Algorithms
Digital signature algorithm
A digital signature is a value computed with a
cryptographic algorithm and associated with a data object
in such a way that any recipient of the data can use the
signature to verify the data’s origin and integrity
39
Brute-Force attack
40
Cryptanalysis (Cryptanalytic
attacks)
Ciphertext-only attack (COA): The attacker tries to deduce the
decryption key or plaintext by only observing ciphertext.
Known-plaintext attack (KPA): The attacker has a set of plaintexts and
corresponding ciphertexts
Chosen-plaintext attack (CPA): The attacker chooses plaintext and is
then given corresponding ciphertext.
Adaptive chosen-plaintext attack (ACPA) is a chosen-plaintext attack
wherein the choice of plaintext may depend on the previous requests.
Chosen-ciphertext attack (CCA): The attacker selects the ciphertext
and is then given the corresponding plaintext.
Adaptive chosen-ciphertext attack (ACCA) is a chosen-ciphertext attack
where the choice of ciphertext may depend on the previous requests.
41
Models For Evaluating Security
▪ Unconditional security (perfect secrecy): Assumes that the
attacker must have unlimited computational resources to defeat
the system.
➔ the key must be at least as long as the message.
44
TRUE OR FALSE
1. Passive attacks are very easy to detect because they involve
alteration of the data.
2. Data authenticity assures that private or confidential
information is not made available or disclosed to
unauthorized individuals.
3. Nonrepudiation prevents either sender or receiver from
denying a transmitted message.
4. On average, half of all possible keys must be tried to
achieve success with a brute-force attack.
5. The process of converting from plaintext to ciphertext is
known as deciphering or decryption.
45
COMPLETE
1. A loss of __________ is the unauthorized disclosure of
information.
2. Verifying that users are who they claim to be and that each
input arriving at the system came from a trusted source is
_________ .
3. Data appended to a data unit that allows a recipient of the
data unit to prove the source and integrity of the data unit
and protect against forgery is a(n) ___________ .
4. If both sender and receiver use the same key, the encryption
system is referred to as ___________ .
5. The __________ attack is the easiest to defend against
because the opponent has the least amount of information to
work with. 46
Thank you
47