CSS Module 1.1
CSS Module 1.1
CONFIDENTIALITY
INTEGRITY
SECURE
NON-REPUDIATION
Security Aspects
consider 3 aspects of Network security:
● security attack
● security mechanism (control)
● security service
ATTACKS
Passive Versus Active Attacks
Passive Attacks
● In a passive attack, the attacker’s goal is just to obtain information. This
means that the attack does not modify data or harm the system. The system
continues with its normal operation.
● The attack may harm the sender or the receiver of the message. Attacks that
threaten confidentiality are passive attacks.
● The revealing of the information may harm the sender or receiver of the
message, but the system is not affected.
● For this reason, it is difficult to detect this type of attack until the sender or
receiver finds out about the leaking of confidential information.
● Passive attacks, however, can be prevented by encipherment of the data.
Active Attacks
● An active attack may change the data or harm the system.
● Attacks that threaten the integrity and availability are active attacks.
● Active attacks are normally easier to detect than to prevent, because an
attacker can launch them in a variety of ways.
Alice, Bob, and Eve
● Alice is the person who needs to send secure data.
● Bob is the recipient of the data.
● Eve is the person who somehow disturbs the communication
between Alice and Bob.
Passive Attack - Interception
Passive Attack: Traffic Analysis
Observe traffic
pattern
Active Attack: Interruption
Block delivery of
message
Active Attack: Fabrication
Fabricate message
Active Attack: Replay
Active Attack: Modification
Modify
message
Handling Attacks
◦ Passive attacks – focus on Prevention
● Easy to stop
● Hard to detect
◦ Active attacks – focus on Detection and Recovery
● Hard to stop
● Easy to detect
Security Services
? Authentication - assurance that the communicating entity is the
one claimed
20
Model for Network Security
Model for Network Security
? using this model requires us to:
1. design a suitable algorithm for the security transformation
2. generate the secret information (keys) used by the algorithm
3. develop methods to distribute and share the secret information
4. specify a protocol enabling the principals to use the
transformation and secret information for a security service
Model for Network Access
Security
Model for Network Access
Security
? using this model requires us to:
● Symmetric-Key Encipherment
● Asymmetric-Key Encipherment
● Hashing
Steganography
Substitution Transposition
Simple Round
Ciphers Ciphers
Ciphers Ciphers
XOR,
DES, AES,
Mono-alp Poly-alphab Rotation,
IDEA,
habetic etic S-box,
CAST,
Ciphers Ciphers P-box
RC4,
etc.
RC5, etc.
asymmetric key cryptography
? In asymmetric or public-key cryptography, there are two
keys: a private key and a public key.
◦ The private key is kept by the receiver.
◦ The public key is announced to the public.
? If Alice wants to send a message to Bob, Alice uses the
public key to encrypt the message. When the message is
received by Bob, the private key is used to decrypt the
message.
? Some of the asymmetric algorithms are:
◦ Diffie-Hellman, RSA, El Gamal, Elliptic Curve
Comparison of
Symmetric and
Asymmetric key
cryptography
Symmetric key Asymmetric key
cryptography cryptography
? Only 1 shared key is ? Here 2 keys : a private and a
involved. public key are involved.
? The Public key encrypts the
? The same key encrypts and plaintext while the private
decrypts the plaintext. key decrypts it.
? The shared key is kept secret ? The private key is just kept
between Alice and Bob. secret by the Bob while the
? Examples of Symmetric public key is made public.
? Examples of Asymmetric
algorithms: algorithms:
◦ DES, 3DES, AES, IDEA, ◦ Diffie-Hellman, RSA, El
BLOWFISH, TWOFISH, Gamal, Elliptic Curve
RC4, RC5, SAFER etc. Cryptography (ECC) etc.
Cryptanalysis
A process of finding weaknesses in cryptographic algorithms
and using these weaknesses to decipher the ciphertext without
knowing the secret key
objective to recover key not just message
general approaches:
◦ cryptanalytic attack
◦ brute-force attack
Cryptanalysis
Cryptanalytic Attacks
? ciphertext only
◦ only know algorithm & ciphertext, is statistical,
know or can identify plaintext
? known plaintext
◦ know/suspect plaintext & ciphertext
? chosen plaintext
◦ select plaintext and obtain ciphertext
? chosen ciphertext
◦ select ciphertext and obtain plaintext
? chosen text
◦ select plaintext or ciphertext to en/decrypt
Traditional
Symmetric-Key Ciphers
● Fig shows the general idea behind a symmetric-key cipher.
● The original message from Alice to Bob is called plaintext;
the message that is sent through the channel is called the
ciphertext.
● To create the ciphertext from the plaintext, Alice uses an
encryption algorithm and a shared secret key.
● To create the plaintext from ciphertext, Bob uses a
decryption algorithm and the same secret key.
3.68
General idea of symmetric-key cipher
3.69
If P is the plaintext, C is the ciphertext, and K is the key,
3.72
Cryptanalysis
Cryptanalysis attacks
Ciphertext-Only Attack
Known-Plaintext Attack
Chosen-Plaintext Attack
Chosen-Ciphertext Attack
3-2 SUBSTITUTION CIPHERS
A substitution cipher replaces one symbol with another. Substitution
ciphers can be categorized as either monoalphabetic ciphers or
polyalphabetic ciphers.
Note
Note
Note
Solution
When Eve tabulates the frequency of letters in this
ciphertext, she gets: I =14, V =13, S =12, and so on. The
most common character is I with 14 occurrences. This
means key = 4.
Multiplicative Ciphers
Note
3.91
The affine cipher uses a pair of keys in which the first key
is from Z26* and the second is from Z26. The size of the
key domain is
26 × 12 = 312.
Use an affine cipher to encrypt the message “hello” with
the key pair (7, 2).
Use the affine cipher to decrypt the message “ZEBBW” with
the key pair (7, 2) in modulus 26.
Solution
3.93
Monoalphabetic Substitution Cipher
Because additive, multiplicative, and affine ciphers have
small key domains, they are very vulnerable to brute-force
A better solution is to create a mapping between each
attack.
plaintext character and the corresponding ciphertext
character. Alice and Bob can agree on a table showing the
mapping for each character.
An example key for monoalphabetic substitution cipher
We can use the key (table in previous slide) to encrypt the
message
The ciphertext is
Polyalphabetic
Ciphers
In polyalphabetic substitution, each occurrence of a character may have a
different substitute. The relationship between a character in the plaintext to a
character in the ciphertext is one-to-many.
Autokey Cipher
Assume that Alice and Bob agreed to use an autokey
cipher with initial key value k1 = 12. Now Alice wants to
send Bob the message “Attack is today”. Enciphering is
done character by character.
Playfair Cipher
A Vigenere Tableau
Vigenere Cipher (Crypanalysis)
Let us assume we have intercepted the following
ciphertext:
Now she has the key and can break any ciphertext
encrypted with that key.
One-Time Pad
One of the goals of cryptography is perfect secrecy. A study by
Shannon has shown that perfect secrecy can be achieved if each
plaintext symbol is encrypted with a key randomly chosen from a key
domain. This idea is used in a cipher called one-time pad, invented by
Vernam.
3.112
Rotor Cipher
3-3 TRANSPOSITION CIPHERS
A transposition cipher does not substitute one symbol for another, instead
it changes the location of the symbols.
Simple transposition ciphers, which were used in the past, are keyless.
3.118
Alice needs to send the message “Enemy attacks tonight”
to Bob..
Figure
3.21
Keys
In Example 3.27, a single key was used in two directions
for the column exchange: downward for encryption,
upward for decryption. It is customary to create two keys.
3.124
Double Transposition Ciphers
Double transposition cipher