NCS - 21ECE811 - Module 1 - PPT
NCS - 21ECE811 - Module 1 - PPT
Cyber-Security
(21ECE811)
Subject Co-ordinator :
Professional
elective Dr. Leelavathi H P
Subject: Professor, Department
of ECE, GAT.
Networking
What is computer networking?
A computer network is a group of interconnected nodes or computing
devices that exchange data and resources with each other.
A network connection between these devices can be established using
cable or wireless media.
Once a connection is established, communication protocols such
as TCP/IP, Simple Mail Transfer Protocol and Hypertext Transfer
Protocol are used to exchange data between the networked devices.
The full form of TCP/IP is Transmission Control Protocol/Internet
Protocol.
Examples of computing devices: PC, Laptops, smartphones. Because
the bulk of your information is stored and accessed via these devices, you
need to take special care in securing them.
Protocols: Network protocols are a set of rules outlining how connected
devices communicate across network to exchange the information easily
and safely.
What is cyber?
Originally comes from the ancient Greek word kubernetikos,
which means “good at steering/act of controlling.” It converted in
French as cybernetique to mean the art of governing.
Involving computers or computer networks(such as the internet)
What is Security?
Refers to protection from hostile / unfriendly forces.
Computer security is the protection of computer systems and
information from harm, theft, and unauthorized use.
What is the Cyber security
The application of technologies, which processes and controls to
protect systems, networks, programs, devices and data from cyber
attacks.
Aims to reduce the risk of cyber attacks and protect against the
unauthorized exploitation of systems, networks, and technologies.
• A cyber attack is a set of actions performed by threat actors
to gain unauthorized access, steal data or cause damage to
computers, computer networks, or other computing systems.
• Cyber attacks can be launched from any location and can be
performed by an individual or a group using one or more
tactics, techniques and procedures (TTPs) .
• The individuals who launch cyber attacks are usually referred
to as cybercriminals, threat actors, bad actors, or hackers.
• They can work alone, in collaboration with other attackers, or
as part of an organized criminal group.
• Cybercriminals try to identify vulnerabilities—problems or
weaknesses in computer systems—and exploit them to further
their goals
There are various types of cyber attacks
• Phishing attacks: These attacks use fake emails or websites to
trick people into revealing sensitive information such as
passwords, credit card numbers, or social security numbers.
• Malware attacks: These attacks use malicious/ bad software to
gain unauthorized access to computer systems to steal the
information or to damage them.
• Ransomware attacks: These attacks encrypt files on a computer
system and demand payment in exchange for the decryption key.
• Denial-of-service (DoS) attacks: Makes a network or machine
unavailable to its users. These attacks flood a computer system
with traffic to make it unavailable to users.
• It’s important to take measures to protect yourself from cyber
attacks. Some of the best practices include using strong
passwords, keeping your software up-to-date, being cautious of
suspicious emails or websites, and using antivirus software .
A cyber attack is an attempt to disable computers, steal
data, or use a breached computer system to launch additional
attacks.
Types of Cyber Attacks
Malware
Malware is a term that describes malicious software, including
spyware, ransomware, viruses, and worms.
Malicious Software is any program or file that is
intentionally harmful to a computer, network or server. Types of
malware include computer viruses, worms, Trojan horses.
Network Security:
The measures taken by any enterprise or organization to secure its
computer network and data using both hardware and software systems.
Aims at securing the confidentiality and accessibility of the data and
network.
Advantages:
Provides protection against external threats like malware and hackers.
Improve the performance and reliability of a network by preventing
bottlenecks and ensuring that resources are allocated appropriately.
Measures can help organizations meet regulatory compliance
requirements.
Disadvantages:
Can be expensive to implement and maintain.
Can be complex to configure and manage, requiring specialized
knowledge and skills.
Measures can sometimes slow down network performance or cause
compatibility issues with other applications.
A Cyber Security:
Provides measure to protect our system from cyber attacks.
Used to advance the security of the system so that we can
prevent unauthorized access to our system from the attacker.
Protects cyberspace from attacks and damages.
Advantages of Cyber Security:
Protects against a wide range of threats, including phishing,
ransomware, and other types of cyber attacks.
Helps to safeguard sensitive information from theft or misuse
Reduces the risk of financial losses due to cyber crime.
Enhances the overall security posture of an organization.
Disadvantages of Cyber Security:
Can be complex and difficult to implement effectively.
May require significant resources and expertise to manage.
Can be time-consuming to monitor and respond to threats
May not be 100% effective in preventing all types of cyber
attacks.
Network security and Cyber security are closely related
but distinct concepts.
Network security focuses on securing computer
networks from unauthorized access, while cyber security
includes all aspects of security in the digital landscape.
Understanding the differences between these two
concepts is important for individuals and organizations
looking to protect their networks, devices, and data from
cyber threats.
By implementing effective network security and cyber
security measures, individuals and organizations can better
protect themselves from the growing number of cyber
threats in today’s digital landscape.
Concepts of network
Course security and encryption.
Learning Finite Fields and
Arithmetic operations.
Objectives Data encryption
Standards and AES
Algorithms.
E-mail security and
Malicious software.
Cyber security issues and
Cyber anti patterns
Introduction: Computer security
concepts, Security attacks, security
Module-1 Services, Security mechanisms and
Model for network security.
Symmetric ciphers: Symmetric
Cipher Model, Substitution
Techniques: Caesar Cipher, Mono
Alphabetic Cipher, Playfair Cipher,
Hill Cipher, polyalphabetic Cipher
and One-Time Pad (OTP).
Transposition Techniques,
Steganography.
Finite Fields: Groups, fields.
Modular Arithmetic: Divisors,
properties of modulo operator,
Euclid’s Algorithm, Groups,
modular arithmetic operations
Module-2 and properties, groups, Rings,
Fields. Finite Fields of the form
GF(p)(Galois field), Polynomial
Arithmetic, Finite fields of the
form GF(2n).
Block Ciphers and Data
Encryption standard:
Block Cipher Principles
Data Encryption Standard
(DES)
Module 3 Strength of DES
Advanced Encryption
Standard (AES) structure
RSA(Rivest-Shamir-
Adleman) algorithm
Diffie - Hellman Key
Exchange algorithm
Electronic mail Security:
Pretty good privacy and
S/MIME(
Secure/Multipurpose internet
Mail Extensions).
Malicious Software: Types of
Module 4 Malicious Software, Viruses
and Virus Countermeasures.
Firewalls: Need for Firewalls,
Firewall Characteristics, Types
of Firewalls.
Legal and Ethical Issues:
Cyber-crime and Computer
Crime, Intellectual Property
and Ethical Issues.
The Problems and Cyber anti
Module 5 patterns: Antipatterns concept,
Forces in Cyber antipatterns,
Cyber antipattern templates,
Micro antipattern templates,
Full cyber antipattern template
and Cyber security antipattern
Catalog.
Evaluate encryption and decryption
for the given key for authentication.
Course Outcomes Explain the structure of
cryptographic algorithms, Finite
fields and their applications.
Moderate
High
• In cybersecurity, a "breach" refers breaking or
to any incident resulting in unauthorized access or
exposure of sensitive data, systems, or networks,
leading to potential risks like data theft, system
compromise, or operational disruption.
Low Impact
The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or
individuals.
A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might
(i) Cause a degradation in mission capability to an extent
and duration that the organization can perform its primary
functions, but the effectiveness of the functions is
noticeably reduced.
(ii) Result in minor damage to organizational assets.
(Iii) Result in minor financial loss; or
(iv) Result in minor harm to individuals.
Moderate Impact
The loss could be expected to have a serious adverse effect
on organizational operations, assets, or individuals.
A serious adverse effect means that, e.g., the loss might
(i) Cause a significant degradation in mission capability
to an extent and duration that the organization can perform
its primary functions, but the effectiveness of the functions
is significantly reduced;
(ii) Result in significant damage to organizational assets;
(iii) Result in significant financial loss; or
(iv) Result in significant harm to individuals that does
not involve loss of life or serious, life-threatening injuries.
High Impact
SpecificSecurity Mechanisms:
Encipherment, Digital Signatures, Access
Controls, Data Integrity, Authentication
Exchange, Traffic Padding, Routing Control,
Notarization.
Pervasive Security Mechanisms:
Trusted Functionality, Security Labels, Event
algorithm.
Develop methods to distribute and share the secret
information.
Specify a protocol enabling the principals to use the
unconditional security
No matter how much computer power or time is
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
• Now have a total of 26! = 4 x 1026 keys , with so
many keys, might think is secure
• but would be !!!WRONG!!! , problem is language
characteristics.
• This is 10 orders of magnitude greater than the key
space for DES and would seem to eliminate brute-
force techniques for cryptanalysis. Such an
approach is referred to as a monoalphabetic
substitution cipher, because a single cipher
alphabet (mapping from plain alphabet to cipher
alphabet) is used per message.
• It is vulnerable to Cryptanalysis
• When a cryptanalyst is aware of the nature of the plain
text, he can find the regularities of the language. To
overcome these attacks multiple substitutions for a
single letter can be used.
• Any attackers would simply break the cipher by using
frequency analysis by observing the number of times
each letter occurs in the cipher text and then looking
upon the English letter frequency table.
• Monoalphabetic ciphers are easy to break as they
reflect the frequency of the original alphabet.
• A counter measure is to provide substitutes known as
homophones for a single letter.
Language Redundancy and Cryptanalysis human
languages are redundant
• eg "th lrd s m shphrd shll nt wnt"
• letters are not equally commonly used
• in English E is by far the most common letter
• followed by T,R,N,I,O,A,S
• other letters like Z,J,K,Q,X are fairly rare
• have tables of single, double & triple letter
frequencies for various languages
English Letter Frequencies
Use in Cryptanalysis
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Plaintext is encrypted two letters at a time, according to the
following rules.
• Repeating plaintext letters that are in the same pair are
separated with a filler letter, such as x, so that balloon would
be treated as ba lx lo on.
• Two plaintext letters that fall in the same row of the matrix are
each replaced by the letter to the right, with the first element of
the row circularly following the last. For example, ar is
encrypted as RM.
• Two plaintext letters that fall in the same column are each
replaced by the letter beneath, with the top element of the
column circularly following the last. For example, mu is
encrypted as CM
• Otherwise, each plaintext letter in a pair is replaced by the letter
that lies in its own row and the column occupied by the other
plaintext letter. Thus, hs becomes BP and ea becomes IM (or JM, as
the encipherer wishes).
• The Playfair cipher is a great advance over simple
monoalphabetic ciphers.
• For one thing, whereas there are only 26 letters, so that
identification of individual diagrams is more difficult.
Furthermore, the relative frequencies of individual letters
exhibit a much greater range than that of diagrams,
making frequency analysis much more difficult there are
26 × 26 = 676 diagrams.
• It was used as the standard field system by the British
Army in World War I and still enjoyed considerable use by
the U.S. Army and other Allied forces during World War II.
• Despite this level of confidence in its security, the Playfair
cipher is relatively easy to break, because it still leaves
much of the structure of the plaintext language intact. A
few hundred letters of ciphertext are generally sufficient.
Security of Playfair Cipher
C = PK mod 26
where C and P are row vectors of length 3 representing
the plaintext and ciphertext, and K is a matrix
representing the encryption key. Operations are
performed mod 26. For example, consider the plaintext
“paymoremoney” and use the encryption key.
• The first three letters of the plaintext are represented by the
vector(15,0,24).
• Then(15,0,24)Kmod(26)=
(303,303,531)mod(26)=(17,17,11)=RRL . Continuing in this
fashion, the ciphertext for the entire plaintext is
RRLMWBKASPDH.
• Decryption requires using the inverse of the matrix K. We can
compute det k=23, and therefore inverse (det k) mod(26)=17, .
We can then compute the inverse as.
• Advantages of Hill Cipher
• It perfectly hides a single letter frequencies.
• use of 3X3 hill cyphers can perfectly hide both the single
letter and two letter frequency information
• strong enough against the attacks made only on the
cyber text but, it still can be easily broken is the attack is
through a Known text.
Polyalphabetic Substitution Ciphers
• Improves security using multiple cipher alphabets.
• It is more secure than a monoalphabetic cipher, which
uses only one alphabet.
• Makes cryptanalysis harder with more alphabets to
guess.
• Example of a polyalphabetic cipher are the Vigenère
cipher and Vernam cipher.
VIGENERE `CIPHER
• It is best known, and one of the simplest, polyalphabetic
ciphers.
• In this scheme, the set of related monoalphabetic
substitution rules consists of the 26 Caesar ciphers with
shifts of 0 through 25 are used.
Example of Vigenère Cipher
• Write the plaintext out
• Write the keyword repeated above it
• Use each key letter as a caesar cipher key
• Encrypt the corresponding plaintext letter
• Eg using keyword deceptive
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
VERNAM CIPHER
• The ultimate defense against such a cryptanalysis is to
choose a keyword that is as long as the plaintext and has
no statistical relationship to it.
• Such a system was introduced by an AT&T engineer
named Gilbert Vernam in 1918. This system works on
binary data (bits) rather than letters. The system can be
expressed briefly as follows.
One-Time Pad
• If a truly random key as long as the message is used,
the cipher will be secure called a one-time pad.
• It is unbreakable since ciphertext bears no statistical
relationship to the plaintext.
• Can only use the key once.
• Problems in generation & safe distribution of key.
• An Army Signal Corp officer, Joseph Mauborgne,
proposed an improvement to the Vernam cipher that
yields the ultimate in security.
• He suggested using a random key that is as long as the
message, so that the key need not be repeated.
• In addition, the key is to be used to encrypt and decrypt a
single message, and then is discarded.
• Each new message requires a new key of the same
length as the new message. Such a scheme, known as a
one-time pad, is unbreakable.
• It produces random output that bears no statistical
relationship to the plaintext. Because the ciphertext
contains no information whatsoever about the plaintext,
there is simply no way to break the code.
• An example should illustrate our point.
• Suppose that we are using a Vigenère scheme with 27
characters in which the twenty-seventh character is the
space character, but with a one-time key that is as long as
the message. Consider ciphertext
• Suppose that a cryptanalyst had managed to find these
two keys.
• Two possible plaintexts are produced.
• How is the cryptanalyst to decide which is the correct
decryption (i.e., which is the correct key)? If the actual
key were produced in a truly random fashion, then the
cryptanalyst cannot say that one of these two keys is
more likely than the other.
• Thus, there is no way to decide which key is correct and
therefore which plaintext is correct.
• In fact, given any plaintext of equal length to the
ciphertext, there is a key that produces that plaintext.
• Therefore, if you did an broad search of all possible
keys, you would end up with many readable plaintexts,
with no way of knowing which was the intended
plaintext.
• Therefore, the code is unbreakable.
• The security of the one-time pad is entirely due to the
randomness of the key.
• If the stream of characters that constitute the key is
truly random, then the stream of characters that
constitute the ciphertext will be truly random. Thus,
there are no patterns or regularities that a cryptanalyst
can use to attack the ciphertext.
• The one-time pad offers complete security. The one-
time pad is the only cryptosystem that exhibits what is
referred to as perfect secrecy.
Transposition Ciphers
All the techniques examined so far involve the substitution of
a ciphertext symbol for a plaintext symbol. A very different
kind of mapping is achieved by performing some sort of
permutation on the plaintext letters. This technique is
referred to as a transposition cipher
• Classical transposition or permutation ciphers.
• Hide the message by rearranging the letter order, without
altering the actual letters used.
Different types of Transposition Ciphers
RAIL FENCE CIPHER
• The simplest such cipher is the rail fence technique, in
which the plaintext is written down as a sequence of
diagonals and then read off as a sequence of rows.
• The example message is: "meet me after the toga party"
with a rail fence of depth 2.
• This sort of thing would be minor to cryptanalyze.
write message letters out diagonally over a number of rows
then read off cipher row by row
• Eg. write message out as:
mematrhtgpry
etefeteoaat
• giving ciphertext
MEMATRHTGPRYETEFETEOAAT
COLUMNAR TRANSPOSITION
A more complex scheme is to write the message in a rectangle,
row by row, and read the message off, column by column, but
transpose the order of the columns. The order of the columns
then becomes the key to the algorithm. For example key :4 3 1 2
5 6 7 and plaintext: attack postponed until two am