Computer Network Security
Computer Network Security
UNIT-1-----------------------------
1. Security Attacks
2) Active Attacks:
Active attacks refer to types of attacks that involve the attacker
actively disrupting or altering system, network or device activity.
Active attacks are typically focused on causing damage or
disruption rather than gathering information or intelligence.
Here, both the sender and receiver have no clue that their
message/ data is modified by some third-party intruder. The
message/ data transmitted doesn’t remain in its usual form and
shows deviation from its usual behavior.
Active attacks are further divided into four parts based on their
behavior:
Masquerade: Masquerade is a type of attack in which
the attacker pretends to be an authentic sender in order
to gain unauthorized access to a system. This type of
attack can involve the attacker using stolen or forged
credentials, or manipulating authentication or
authorization controls in some other way.
Replay: Replay is a type of active attack in which the
attacker intercepts a transmitted message through a
passive channel and then maliciously or fraudulently
replays or delays it at a later time.
Modification of Message: Modification of Message
involves the attacker modifying the transmitted message
and making the final message received by the receiver
look like it’s not safe or non-meaningful. This type of
attack can be used to manipulate the content of the
message or to disrupt the communication process.
Denial of service (DoS): Denial of Service attacks
involve the attacker sending a large volume of traffic to a
system, network, or device in an attempt to overwhelm it
and make it unavailable to users.
2. Security Mechanism
he mechanism that is built to identify any breach of security or
attack on the organization, is called a security mechanism.
Security Mechanisms are also responsible for protecting a
system, network, or device against unauthorized access,
tampering, or other security threats.
Encipherment (Encryption): Encryption involves the
use of algorithms to transform data into a form that can
only be read by someone with the appropriate decryption
key. Encryption can be used to protect data it is
transmitted over a network, or to protect data when it is
stored on a device.
Digital signature: Digital Signature is a security
mechanism that involves the use of cryptographic
techniques to create a unique, verifiable identifier for a
digital document or message, which can be used to
ensure the authenticity and integrity of the document or
message.
Traffic padding: Traffic Padding is a technique used to
add extra data to a network traffic stream in an attempt
to obscure the true content of the traffic and make it
more difficult to analyze.
Routing control: Routing Control allows the selection of
specific physically secure routes for specific data
transmission and enables routing changes particularly
when a gap in security is suspected.
3. Security Services
Security services refer to the different services available for
maintaining the security and safety of an organization. They help
in preventing any potential risks to security. Security services
are divided into 5 types:
Authentication: Authentication is the process of
verifying the identity of a user or device in order to grant
or deny access to a system or device.
Access control: Access Control involves the use of
policies and procedures to determine who is allowed to
access specific resources within a system.
Data Confidentiality: Data Confidentiality is
responsible for the protection of information from being
accessed or disclosed to unauthorized parties.
Data integrity: Data Integrity is a security mechanism
that involves the use of techniques to ensure that data
has not been tampered with or altered in any way during
transmission or storage.
Non- repudiation: Non-repudiation involves the use
of techniques to create a verifiable record of the origin
and transmission of a message which can be used to
prevent the sender from denying that they sent the
message.
Benefits of OSI Security Architecture
Providing Security: OSI Architecture in an organization
provides the needed security and safety preventing
potential threats and risks.
Organising Task: The OSI architecture makes it easy
for managers to build a security model for the
organization based on strong security principles.
Meets International Standards: Security services are
defined and recognized internationally meeting
international standards.
Interoperability: The OSI model divides network
functions into multiple levels makes it easier for
different hardware and software components to work
together.
Scalability: The layered method makes networks
scalable. New technologies and protocols can be
seamlessly added without interrupting the overall
system.
Flexibility: Each layer can evolve separately and
provide flexibility for technology and application
changes.
An original message is
known as the plaintext,
while the
coded message is called
the ciphertext. The
process of converting
from plaintext to
ciphertext is known
as enciphering or
encryption; restoring the
plaintext from the
ciphertext is deciphering
or decryption.
The many schemes used
for encryption constitute
the area of study known
as cryptography. Such a
scheme is known as a
cryptographic system or
a cipher. Techniques
used for deciphering a
message
without any knowledge
of the enciphering
details fall into the area
of cryptanalysis.
Cryptanalysis is
what the layperson calls
"breaking the code." The
areas of cryptography
and cryptanalysis
together are
called cryptology.
An original message is
known as the plaintext,
while the
coded message is called
the ciphertext. The
process of converting
from plaintext to
ciphertext is known
as enciphering or
encryption; restoring the
plaintext from the
ciphertext is deciphering
or decryption.
The many schemes used
for encryption constitute
the area of study known
as cryptography. Such a
scheme is known as a
cryptographic system or
a cipher. Techniques
used for deciphering a
message
without any knowledge
of the enciphering
details fall into the area
of cryptanalysis.
Cryptanalysis is
what the layperson calls
"breaking the code." The
areas of cryptography
and cryptanalysis
together are
called cryptology.
The process of converting from plaintext to ciphertext
is known as enciphering or encryption; restoring the
plaintext from the ciphertext is deciphering or
decryption.
The many schemes used for encryption constitute the
area of study known as cryptography. Such a scheme is
known as a cryptographic system or a cipher.
Techniques used for deciphering a message
without any knowledge of the enciphering details fall
into the area of cryptanalysis. Cryptanalysis is
what the layperson calls "breaking the code." The areas
of cryptography and cryptanalysis together are
called cryptology.
Cryptography
Cryptography is the technique that is used for secure
communication between two parties in a public
environment where unauthorized users and malicious
attackers are present.
In cryptography, there are two processes i.e. encryption
and decryption performed at the sender and receiver end
respectively.
Encryption is the process where simple multimedia
data is combined with some additional data (known as a
key) and converted into an unreadable encoded format
known as a Cipher. Decryption is the reverse method of
encryption where the same or different additional data
(key) is used to decode the cipher and it is converted into
real multimedia data.
Features Of Cryptography
Confidentiality: Information can only be accessed by
the person for whom it is intended and no other person
except him can access it.
Integrity: Information cannot be modified in storage or
transition between sender and intended receiver without
any addition to information being detected.
Non-repudiation: The creator/sender of information
cannot deny his intention to send information at a later
stage.
Authentication: The identities of the sender and
receiver are confirmed. As well destination/origin of the
information is confirmed.
Interoperability: Cryptography allows for secure
communication between different systems and
platforms.
Adaptability: Cryptography continuously evolves to
stay ahead of security threats and technological
advancements.
Types Of Cryptography
1. Symmetric Key Cryptography
It is an encryption system where the sender and receiver of a
message use a single common key to encrypt and decrypt
messages. Symmetric Key cryptography is faster and simpler but
the problem is that the sender and receiver have to somehow
exchange keys securely. The most popular symmetric key
cryptography systems are Data Encryption Systems
(DES) and Advanced Encryption Systems (AES) .
2. Hash Functions
There is no usage of any key in this algorithm. A hash value with
a fixed length is calculated as per the plain text which makes it
impossible for the contents of plain text to be recovered. Many
operating systems use hash functions to encrypt passwords.
3. Asymmetric Key Cryptography
In Asymmetric Key Cryptography, a pair of keys is used to
encrypt and decrypt information. A sender’s public key is used
for encryption and a receiver’s private key is used for decryption.
Public keys and Private keys are different. Even if the public key
is known by everyone the intended receiver can only decode it
because he alone knows his private key. The most popular
asymmetric key cryptography algorithm is the RSA algorithm.
Applications of Cryptography
Computer passwords: Cryptography is widely utilized
in computer security, particularly when creating and
maintaining passwords. When a user logs in, their
password is hashed and compared to the hash that was
previously stored. Passwords are hashed and encrypted
before being stored. In this technique, the passwords are
encrypted so that even if a hacker gains access to the
password database, they cannot read the passwords.
Digital Currencies: To protect transactions and prevent
fraud, digital currencies like Bitcoin also use
cryptography. Complex algorithms and cryptographic
keys are used to safeguard transactions, making it nearly
hard to tamper with or forge the transactions.
Secure web browsing: Online browsing security is
provided by the use of cryptography, which shields users
from eavesdropping and man-in-the-middle assaults.
Public key cryptography is used by the Secure Sockets
Layer (SSL) and Transport Layer Security (TLS) protocols
to encrypt data sent between the web server and the
client, establishing a secure channel for communication.
Electronic Signatures: Electronic signatures serve as
the digital equivalent of a handwritten signature and are
used to sign documents. Digital signatures are created
using cryptography and can be validated using public
key cryptography. In many nations, electronic signatures
are enforceable by law, and their use is expanding
quickly.
Authentication: Cryptography is used for
authentication in many different situations, such as when
accessing a bank account, logging into a computer, or
using a secure network. Cryptographic methods are
employed by authentication protocols to confirm the
user’s identity and confirm that they have the required
access rights to the resource.
Cryptocurrencies: Cryptography is heavily used by
cryptocurrencies like Bitcoin and Ethereum to protect
transactions, thwart fraud, and maintain the network’s
integrity. Complex algorithms and cryptographic keys are
used to safeguard transactions, making it nearly hard to
tamper with or forge the transactions.
End-to-end Internet Encryption: End-to-end
encryption is used to protect two-way communications
like video conversations, instant messages, and email.
Even if the message is encrypted, it assures that only the
intended receivers can read the message. End-to-end
encryption is widely used in communication apps like
WhatsApp and Signal, and it provides a high level of
security and privacy for users.
What is Plaintext?
Plaintext is an encryption technique, that converts an
encrypted message. It refers to any readable data,
including binary files, that can be seen or used without the
requirement for a decryption key or device.
Plain text is often used for several tasks, such as document
creation, coding, and email communication. Plaintext
implies any communication, document, or file that is meant
to be or has already been encrypted. A cryptosystem
accepts plaintext as input and produces ciphertext as
output.
What is Cipher?
A cipher is a technique that is used in transforming the readable
data (plaintext) into coded data (ciphertext) and the other way
round. The first step in converting regular text into an
unrecognizable form is encryption and the process of converting
the encoded text back into regular text is decryption. Ciphers are
able to perform these transformation using keys; specific pieces
of information. It guarantees that only the right person can get to
the primary data
Primary Terminologies
Cipher: A method or a set of rules for performing
encryption or decryption of information – a step by step
process.
Encryption: The transformation of plaintext to the
ciphertext through the use of a cipher.
Decryption: The act of moving from the encrypted text
to the original text.
Plaintext: The source or plain data or text that has to be
converted into cipher text before sending it over a
channel.
Ciphertext: The coded message that cannot be
comprehended in its original form without the usage of
decryption.
Key: An item of data that a cipher employs to engage in
the conversion of plaintext into ciphertext and vice
versa.
Cryptanalysis and Types of Attacks
Cryptology has two parts namely, Cryptography which
focuses on creating secret codes and Cryptanalysis which is the
study of the cryptographic algorithm and the breaking of those
secret codes.
The person practicing Cryptanalysis is called a Cryptanalyst. It
helps us to better understand the cryptosystems and also helps
us improve the system by finding any weak point and thus work
on the algorithm to create a more secure secret code.
Types of Cryptanalytic attacks :
Ensures secure
Involves breaking
Definition communication through
cryptographic systems
encryption
Protects data
Reveals plaintext or
Objective confidentiality and
decryption keys
integrity
Focuses on deciphering
Prevents unauthorized
Focus ciphertext to access
access to plaintext
plaintext
Ensures secure
Challenges cryptographic
Role communication and
systems for vulnerabilities
information protection
Encryption Decryption
Its major task is to convert the While its main task is to convert
plain text into cipher text. the cipher text into plain text,.
Digital Signature
A digital signature is a mathematical technique used to validate
the authenticity and integrity of a message, software, or digital
document. These are some of the key features of it.
1. Key Generation Algorithms: Digital signatures are
electronic signatures, which assure that the message
was sent by a particular sender. While performing digital
transactions authenticity and integrity should be
assured, otherwise, the data can be altered or someone
can also act as if he were the sender and expect a reply.
2. Signing Algorithms: To create a digital signature,
signing algorithms like email programs create a one-way
hash of the electronic data which is to be signed. The
signing algorithm then encrypts the hash value using the
private key (signature key). This encrypted hash along
with other information like the hashing algorithm is the
digital signature. This digital signature is appended with
the data and sent to the verifier. The reason for
encrypting the hash instead of the entire message or
document is that a hash function converts any arbitrary
input into a much shorter fixed-length value. This saves
time as now instead of signing a long message a shorter
hash value has to be signed and hashing is much faster
than signing.
3. Signature Verification Algorithms: The Verifier
receives a Digital Signature along with the data. It then
uses a Verification algorithm to process the digital
signature and the public key (verification key) and
generates some value. It also applies the same hash
function on the received data and generates a hash
value. If they both are equal, then the digital signature is
valid else it is invalid.
Assurances About Digital Signatures
The definitions and words that follow illustrate the kind of
assurances that digital signatures offer.
1. Authenticity: The identity of the signer is verified.
2. Integration: Since the content was digitally signed, it
hasn’t been altered or interfered with.
3. Non-repudiation: demonstrates the source of the
signed content to all parties. The act of a signer denying
any affiliation with the signed material is known as
repudiation.
4. Notarization: Under some conditions, a signature in a
Microsoft Word, Microsoft Excel, or Microsoft PowerPoint
document that has been time-stamped by a secure time-
stamp server is equivalent to a notarization.
Benefits of Digital Signatures
Legal documents and contracts: Digital signatures
are legally binding. This makes them ideal for any legal
document that requires a signature authenticated by one
or more parties and guarantees that the record has not
been altered.
Sales contracts: Digital signing of contracts and sales
contracts authenticates the identity of the seller and the
buyer, and both parties can be sure that the signatures
are legally binding and that the terms of the agreement
have not been changed.
Financial Documents: Finance departments digitally
sign invoices so customers can trust that the payment
request is from the right seller, not from a attacker trying
to trick the buyer into sending payments to a fraudulent
account.
Health Data: In the healthcare industry, privacy is
paramount for both patient records and research data.
Digital signatures ensure that this confidential
information was not modified when it was transmitted
between the consenting parties.
Drawbacks of Digital Signature
Dependency on technology: Because digital
signatures rely on technology, they are susceptible to
crimes, including hacking. As a result, businesses that
use digital signatures must make sure their systems are
safe and have the most recent security patches and
upgrades installed.
Complexity: Setting up and using digital signatures can
be challenging, especially for those who are unfamiliar
with the technology. This may result in blunders and
errors that reduce the system’s efficacy. The process of
issuing digital signatures to senior citizens can
occasionally be challenging.
Limited acceptance: Digital signatures take time to
replace manual ones since technology is not widely
available in India, a developing nation.
Digital Certificate
Digital certificate is issued by a trusted third party which
proves sender’s identity to the receiver and receiver’s
identity to the sender. A digital certificate is a certificate
issued by a Certificate Authority (CA) to verify the identity
of the certificate holder. Digital certificate is used to attach
public key with a particular individual or an entity.
Encryption – Process of converting electronic data into another
form, called ciphertext, which cannot be easily understood by
anyone except the authorized parties. This assures data
security.
Decryption– Process of translating code to data.
The message is encrypted at the sender’s side using
various encryption algorithms and decrypted at the
receiver’s end with the help of the decryption algorithms.
When some message is to be kept secure like username,
password, etc., encryption and decryption techniques are
used to assure data security.
Types of Encryption
Data encryption transforms information into a code that is only
accessible to those with a password or secret key, sometimes
referred to as a decryption key. Data that has not been
encrypted is referred to as plaintext, whereas data that has been
encrypted is referred to as ciphertext. In today’s business sector,
encryption is one of the most popular and effective data
protection solutions. By converting data into ciphertext, which
can only be decoded with a special decryption key generated
either before or at the time of the encryption, data encryption
serves to protect the secrecy of data.
Symmetric Encryption
Data is encrypted using a key and the decryption is also
done using the same key. There are a few strategies
used in cryptography algorithms . For encryption and
decryption processes, some algorithms employ a unique
key. In such operations, the unique key must be secured
since the system or person who knows the key has
complete authentication to decode the message for
reading.
Symmetric Encryption
Asymmetric Encryption
Asymmetric Cryptography is also known as public-key
cryptography. It uses public and private keys for the
encryption and decryption of message. One key in the
pair which can be shared with everyone is called the
public key. The other key in the pair which is kept secret
and is only known by the owner is called the private key.
Authentication
Authentication is the process of verifying the identity of a user
or information. User authentication is the process of verifying the
identity of a user when that user logs in to a computer system.
There are different types of authentication systems which are: –
1. Single-Factor authentication: – This was the first method of
security that was developed. On this authentication system, the
user has to enter the username and the password to confirm
whether that user is logging in or not. Now if the username or
password is wrong, then the user will not be allowed to log in or
access the system.
Advantage of the Single-Factor Authentication System: –
It is a very simple to use and straightforward system.
it is not at all costly.
The user does not need any huge technical skills.
The disadvantage of the Single-Factor Authentication
It is not at all password secure. It will depend on the
strength of the password entered by the user.
The protection level in Single-Factor Authentication is
much low.
2. Two-factor Authentication: – In this authentication system, the
user has to give a username, password, and other information.
There are various types of authentication systems that are used
by the user for securing the system. Some of them are: –
wireless tokens and virtual tokens. OTP and more.
Advantages of the Two-Factor Authentication
The Two-Factor Authentication System provides better
security than the Single-factor Authentication system.
The productivity and flexibility increase in the two-factor
authentication system.
Two-Factor Authentication prevents the loss of trust.
Disadvantages of Two-Factor Authentication
It is time-consuming.
3. Multi-Factor authentication system,: – In this type of
authentication, more than one factor of authentication is needed.
This gives better security to the user. Any type of keylogger or
phishing attack will not be possible in a Multi-Factor
Authentication system. This assures the user, that the
information will not get stolen from them.
The advantage of the Multi-Factor Authentication System are: –
No risk of security.
No information could get stolen.
No risk of any key-logger activity.
No risk of any data getting captured.
The disadvantage of the Multi-Factor Authentication System are:
–
It is time-consuming.
it can rely on third parties. The main objective of
authentication is to allow authorized users to access the
computer and to deny access to unauthorized users.
Operating Systems generally identify/authenticates users
using the following 3 ways: Passwords, Physical
identification, and Biometrics. These are explained as
following below.
1. Passwords: Password verification is the most
popular and commonly used authentication
technique. A password is a secret text that is
supposed to be known only to a user. In a
password-based system, each user is assigned a
valid username and password by the system
administrator. The system stores all usernames
and Passwords. When a user logs in, their user
name and password are verified by comparing
them with the stored login name and password. If
the contents are the same then the user is
allowed to access the system otherwise it is
rejected.
2. Physical Identification: This technique
includes machine-readable badges(symbols),
cards, or smart cards. In some companies,
badges are required for employees to gain
access to the organization’s gate. In many
systems, identification is combined with the use
of a password i.e the user must insert the card
and then supply his /her password. This kind of
authentication is commonly used with ATMs.
Smart cards can enhance this scheme by keeping
the user password within the card itself. This
allows authentication without the storage of
passwords in the computer system. The loss of
such a card can be dangerous.
3. Biometrics: This method of authentication is
based on the unique biological characteristics of
each user such as fingerprints, voice or face
recognition, signatures, and eyes.
4. A scanner or other devices to gather the
necessary data about the user.
5. Software to convert the data into a form that can
be compared and stored.
6. A database that stores information for all
authorized users.
7. Facial Characteristics – Humans are
differentiated on the basis of facial
characteristics such as eyes, nose, lips,
eyebrows, and chin shape.
8. Fingerprints – Fingerprints are believed to be
unique across the entire human population.
9. Hand Geometry – Hand geometry systems
identify features of the hand that includes the
shape, length, and width of fingers.
10. Retinal pattern – It is concerned with the
detailed structure of the eye.
11. Signature – Every individual has a unique
style of handwriting, and this feature is reflected
in the signatures of a person.
12. Voice – This method records the frequency
pattern of the voice of an individual speaker.
2) Network Segmentation:
Network segmentation defines boundaries
between network segments where assets within
the group have a common function, risk or role
within an organization. For instance, the
perimeter gateway segments a company network
from the Internet. Potential threats outside the
network are prevented, ensuring that an
organization’s sensitive data remains inside.
Organizations can go further by defining
additional internal boundaries within their
network, which can provide improved security
and access control.
Authentication Application
Authentication is the act of establishing identity via the
presentation of information that allows the verifier to know
the presenter is who or what it claims. This identity could
be any number of things, including:
People
Systems
Applications
Messages
Types of Authentication
Basic, single-factor authentication
Multi-factor authentication
Cryptographic authentication
Basic Authentication
Multi-Factor Authentication
Smart cards
One-time password/phrases
Single-use PINs or pseudo-random numbers
Biometric information
Cryptographic Authentication
Kerberos
Kerberos is a computer network security
protocol that authenticates service requests
between two or more trusted hosts across an
untrusted network, like the internet. It uses
secret-key cryptography and a trusted third party
for authenticating client-server applications and
verifying users’ identities.
Kerberos provides a centralized authentication server
whose function is to authenticate users to servers and
servers to users.
The main components of Kerberos are:
Authentication Server (AS): The Authentication
Server performs the initial authentication and ticket for
Ticket Granting Service.
X.509
X.509 is a standard defining the format of
public-key certificates. X.509 certificates are
used in many Internet protocols, including
TLS/SSL, which is the basis for HTTPS, the
secure protocol for browsing the web. They are
also used in offline applications, like electronic
signatures.
An X.509 (also called digital) certificate
contains a public key and an identity (a
hostname, or an organization, or an individual),
and is either signed by a certificate authority or
self-signed.
X.509 digital certificate is a certificate-based
authentication security framework that can be used
for providing secure transaction processing and
private information.
.509 is a digital certificate that is built on top of a
widely trusted standard known as ITU or
International Telecommunication Union X.509
standard, in which the format of PKI certificates is
defined.
Format of X.509 Authentication Service
Certificate:
Directory Authentication
service
Authentication is the process of validating users. During
authentication, the server asks itself, “Is the user who he or
she says they are?”
Anonymous authentication
Clear-password authentication
SSL authentication
Anonymous Authentication:-
Clear-Password Authentication
Simple SSL
Authenticated SSL
Simple SSL authenticates the server only, while
Authenticated SSL authenticates both the client and the
server.
2. Confidentiality in PGP
Sometimes we see some packages labelled as ‘Confidential’,
which means that those packages are not meant for all the
people and only selected persons can see them. The same
applies to the email confidentiality as well. Here, in the email
service, only the sender and the receiver should be able to read
the message, that means the contents have to be kept secret
from every other person, except for those two.
Encrypting Files
What is S/MIME?
S/MIME stands for Secure/Multipurpose Internet Mail
Extensions. Through encryption, S/MIME offers protection
for business emails.
Advantages of S/MIME
1. It offers verification.
2. It offers integrity to the message.
3. By the use of digital signatures, it facilitates non-
repudiation of origin.
4. It offers seclusion.
5. Data security is ensured by the utilization of encryption.
6. Transfer of data files like images, audio, videos,
documents, etc. in a secure manner.
Services of S/MIME
1. Digital Signature, which can maintain data integrity.
2. S/MIME can be used in encrypting messages.
3. By using this we can transfer our data using an e-mail
without any problem.
Versions of S/MIME Versions
1st Version: 1995
2nd Version: 1998
3rd Version: 1999
COMPLETED -2