Unit 3
Unit 3
Network Security
1
UNIT 1
2
Aspects of Security
security service
note terms
threat – a potential for violation of security
3
Key Security Concepts
4
Confidentiality
5
Integrity
Information needs to be changed constantly.
Integrity means that changes need to be done
only by authorized entities and through
authorized mechanisms.
6
Availability
7
Taxonomy of attacks with relation to
security goals
8
Attacks on confidentiality(Passive)
9
Attacks on confidentiality(Passive)
10
Attacks on Integrity(Active)
12
Handling Attacks
12/03/2023 13
Model for Network Security
14
Symmetric Encryption
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Objectives
To distinguish between two cryptosystems:
symmetric-key and asymmetric-key
To introduce trapdoor one-way functions and their
use in asymmetric-key cryptosystems
To discuss the RSA cryptosystem
To discuss the ElGamal cryptosystem
To discuss the elliptic curve cryptosystem
INTRODUCTION TO PUBLIC-KEY
CRYPTOGRAPHY
Symmetric and asymmetric-key cryptography will exist
in parallel and continue to serve the community. We
actually believe that they are complements of each
other; the advantages of one can compensate for the
disadvantages of the other.
Note
Symmetric-key cryptography is based on sharing secrecy;
asymmetric-key cryptography is based on personal secrecy.
10.24
public-key/two-key/asymmetric cryptography
involves the use of two keys:
Encryption/Decryption
C = e(Kpublic , P) P = d(Kprivate , C)
Message Integrity
and
Message Authentication
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
11.32
Message Authentication
message authentication is concerned with:
protecting the integrity of a message
validating identity of originator
non-repudiation of origin (dispute resolution)
will consider the security requirements
then three alternative functions used:
message encryption
message authentication code (MAC)
hash function
Message Encryption
message encryption by itself also provides a measure of
authentication
if symmetric encryption is used then:
receiver know sender must have created it
since only sender and receiver now key used
know content cannot of been altered
if message has suitable structure, redundancy or a checksum to detect
any changes
Digital Signatures
have looked at message authentication
but does not address issues of lack of trust
digital signatures provide the ability to:
verify author, date & time of signature
authenticate message contents
be verified by third parties to resolve disputes
hence include authentication function with additional capabilities
Digital Signature Properties
must depend on the message signed
must use information unique to sender
to prevent both forgery and denial
must be relatively easy to produce
must be relatively easy to recognize & verify
be computationally infeasible to forge
with new message for existing digital signature
with fraudulent digital signature for given message
be practical save digital signature in storage
Message Encryption
if public-key encryption is used:
encryption provides no confidence of sender
since anyone potentially knows public-key
however if
sender signs message using their private-key
then encrypts with recipients public key
have both secrecy and authentication
again need to recognize corrupted messages
but at cost of two public-key uses on message
Message Authentication Code (MAC)
generated by an algorithm that creates a small fixed-sized block
depending on both message and some key
like encryption though need not be reversible
appended to message as a signature
receiver performs same computation on message and checks it matches
the MAC
provides assurance that message is unaltered and comes from sender
Message Authentication Codes
as shown the MAC provides confidentiality
can also use encryption for secrecy
generally use separate keys for each
can compute MAC either before or after encryption
is generally regarded as better done before
why use a MAC?
sometimes only authentication is needed
sometimes need authentication to persist longer than the encryption (eg. archival
use)
note that a MAC is not a digital signature
MAC Properties
a MAC is a cryptographic checksum
MAC = CK(M)
condenses a variable-length message M
using a secret key K
to a fixed-sized authenticator
is a many-to-one function
potentially many messages have same MAC
but finding these needs to be very difficult
Requirements for MACs
taking into account the types of attacks
need the MAC to satisfy the following:
condenses arbitrary message to fixed size
usually assume that the hash function is public and not keyed
cf. MAC which is keyed
hash used to detect changes to message
can use in various ways with message
most often to create a digital signature
Hash Function Properties
a Hash Function produces a fingerprint of some
file/message/data
h = H(M)
condenses a variable-length message M
to a fixed-sized fingerprint
assumed to be public
Requirements for Hash Functions
95