0% found this document useful (0 votes)
71 views

Lecture 1,2

The document discusses computer and network security. It covers aspects of security including attacks, security mechanisms, and security services like authentication, access control, data confidentiality, data integrity, and non-repudiation. Cryptography is a key security mechanism that uses techniques like encryption to enhance security. Symmetric encryption uses a shared private key while asymmetric encryption uses public-private key pairs. Cryptanalysis involves codebreaking attacks to decrypt ciphertext without the key. Larger key sizes provide stronger security but require more computing power to break.

Uploaded by

rishabhdubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Lecture 1,2

The document discusses computer and network security. It covers aspects of security including attacks, security mechanisms, and security services like authentication, access control, data confidentiality, data integrity, and non-repudiation. Cryptography is a key security mechanism that uses techniques like encryption to enhance security. Symmetric encryption uses a shared private key while asymmetric encryption uses public-private key pairs. Cryptanalysis involves codebreaking attacks to decrypt ciphertext without the key. Larger key sizes provide stronger security but require more computing power to break.

Uploaded by

rishabhdubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Introduction

 Computer Security – refers to protecting files and


other information stored on the computer.

 Network Security - measures to protect data


during their transmission over a collection of
interconnected networks.
Aspects of Security
 Consider 3 aspects of information
security:
 Security attack: any action that
compromises the security of information
owned by an organization.
 Security mechanism: feature designed to
detect, prevent, or recover from a security
attack.
Security Service
 enhance security of data processing
systems and information transfers of an
organization
 intended to counter security attacks
 using one or more security mechanisms
Passive Attacks
Active Attacks
Categories of Active Attacks
 Masquerade
 Modification of messages
 Replay: passive capture of message &
its subsequent retransmission to
produce an unauthorized effect.
 Denial of Service: inhibits the normal
use of communication facilities.
Security Services
 Authentication - assurance that the communicating entity
is the one claimed
 Access Control - prevention of the unauthorized use of a
resource
 Data Confidentiality –protection of data from
unauthorized disclosure
 Data Integrity - assurance that data received is as sent
by an authorized entity
 Non-Repudiation - protection against denial by one of the
parties in a communication
Security Mechanism
 no single mechanism that will
support all services required
 however one particular element
underlies many of the security
mechanisms in use:
 Cryptography
 Cryptography - study of encryption
principles/methods
 Cryptanalysis (codebreaking) -
study of principles/ methods of
deciphering ciphertext without
knowing key
 Cryptology - field of both
cryptography and cryptanalysis
Cryptography
 characterize cryptographic system
by:
 type of encryption operations used
 substitution / transposition / product
 number of keys used
 single-key or private / two-key or public
 way in which plaintext is processed
 block / stream
Symmetric Encryption
 or conventional / private-key / single-key
 sender and recipient share a common key
 all classical encryption algorithms are
private-key
 was only type prior to invention of public-key
in 1970’s
 and by far most widely used
Some Basic Terminology
 plaintext - original message
 ciphertext - coded message
 cipher - algorithm for transforming plaintext to
ciphertext
 key - info used in cipher known only to
sender/receiver
 encipher (encrypt) - converting plaintext to
ciphertext
 decipher (decrypt) - recovering ciphertext from
plaintext
Symmetric Cipher Model
Requirements
 two requirements for secure use of
symmetric encryption:
 a strong encryption algorithm
 a secret key known only to sender / receiver
 mathematically have:
Y = EK(X)
X = DK(Y)
 assume encryption algorithm is known
 implies a secure channel to distribute key
Cryptography
 characterize cryptographic system
by:
 type of encryption operations used
 substitution / transposition / product
 number of keys used
 single-key or private / two-key or public
 way in which plaintext is processed
 block / stream
Cryptanalysis
 objective to recover key not just
message
 general approaches:
 cryptanalytic attack
 brute-force attack
Cryptanalytic Attacks
 ciphertext only
 Encryption algorithm
 ciphertext
 known plaintext
 One or more plaintext-ciphertext pairs
formed with the secret key
 chosen plaintext
 Plaintext message chosen by cryptanalyst,
together with its corresponding ciphertext
generated with the secret key
More Definitions
 unconditional security
 no matter how much computer power or
time is available, the cipher cannot be
broken since the ciphertext provides
insufficient information to uniquely
determine the corresponding plaintext
 computational security
 Cost of breaking the cipher exceeds the
value of the encrypted information.
 Time required to break the cipher exceeds
the useful lifetime of the information.
Brute Force Search
always possible to simply try every key
 most basic attack, proportional to key size
 assume either know / recognise plaintext

Key Size (bits) Number of Alternative Time required at 1 Time required at 106
Keys decryption/µs decryptions/µs
32 232 = 4.3 × 109 231 µs = 35.8 minutes 2.15 milliseconds
56 256 = 7.2 × 1016 255 µs = 1142 years 10.01 hours
128 2128 = 3.4 × 1038 2127 µs = 5.4 × 1024 years 5.4 × 1018 years

168 2168 = 3.7 × 1050 2167 µs = 5.9 × 1036 years 5.9 × 1030 years

26 characters 26! = 4 × 1026 2 × 1026 µs = 6.4 × 1012 years 6.4 × 106 years
(permutation)
Classical Substitution
Ciphers
 where letters of plaintext are replaced by
other letters or by numbers or symbols
 or if plaintext is viewed as a sequence of
bits, then substitution involves replacing
plaintext bit patterns with ciphertext bit
patterns
Transposition Ciphers
 now consider classical
transposition or permutation
ciphers
 these hide the message by
rearranging the letter order
 without altering the actual letters
used
Product Ciphers
 ciphers using substitutions or transpositions are not secure
because of language characteristics
 hence consider using several ciphers in succession to make
harder, but:
 two substitutions make a more complex substitution
 two transpositions make more complex transposition
 but a substitution followed by a transposition makes a new much
harder cipher
 this is bridge from classical to modern ciphers

You might also like