0% found this document useful (0 votes)
38 views31 pages

Ch1 Introduction To Cryptography

The document provides an overview of information security concepts including the CIA triad of confidentiality, integrity and availability. It discusses security attacks that threaten these goals such as snooping, traffic analysis, modification and denial of service. The document also covers security services like authentication, access control and non-repudiation as well as security mechanisms such as encryption, digital signatures and traffic padding that can help mitigate security attacks.

Uploaded by

SHAHAD ALSOFYANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views31 pages

Ch1 Introduction To Cryptography

The document provides an overview of information security concepts including the CIA triad of confidentiality, integrity and availability. It discusses security attacks that threaten these goals such as snooping, traffic analysis, modification and denial of service. The document also covers security services like authentication, access control and non-repudiation as well as security mechanisms such as encryption, digital signatures and traffic padding that can help mitigate security attacks.

Uploaded by

SHAHAD ALSOFYANI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Applied Cryptography

and Data Security


IT 475
Chapter 1
Introduction
Overview
• We are living in the information age. We need to keep
information about every aspect of our lives. In other
words, information is an asset that has a value like any
other asset. As an asset, information needs to be secured
from attacks.
• To be secured, information needs to be hidden from
unauthorized access (confidentiality), protected from
unauthorized change (integrity), and available to an
authorized entity when it is needed (availability).

3
CIA Triad

These three concepts form


what is often referred to as
the CIA triad .

The three concepts embody


the fundamental security
goals for both data and for
information and computing
services.

4
Computer Security Goals
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or disclosed to
unauthorized individuals

Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and authorized
manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system

Availability
• Assures that systems work promptly and service is not denied to authorized
users
5
OSI Security Architecture
• Security attack
• Any action that compromises the security of information
owned by an organization

• Security mechanism
• A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security attack

• Security service
• A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization
• Intended to counter security attacks, and they make use of one
or more security mechanisms6 to provide the service
Security Attacks

7
Attacks
Attacks Threatening Confidentiality:
• Snooping:
• unauthorized access or interception of data.
• Ex. a file transferred through the Internet may contain confidential information.
An unauthorized entity may intercept the transmission and use the contents for her
own benefit.
• To prevent snooping, the data can be made no intelligible to the interceptor by
using encipherment techniques.
• Traffic Analysis:
• Although encipherment of data may make it no intelligible for the interceptor, she
can obtain some other type information by monitoring online traffic.
• Ex. she can find the electronic address (such as the e-mail address) of the sender
or the receiver. She can collect pairs of requests and responses to help her guess
the nature of transaction.

8
Attacks
Attacks Threatening Integrity:
• Modification:
• After intercepting or accessing information, the attacker modifies the information
to make it beneficial to herself.
• Ex. a customer sends a message to a bank to do some transaction. The attacker
intercepts the message and changes the type of transaction to benefit herself.
• The attacker simply deletes or delays the message to harm the system or to benefit
from it.
• Masquerading:
• Masquerading, or spoofing, happens when the attacker impersonates somebody
else.
• Ex. an attacker might steal the bank card and PIN of a bank customer and pretend
that she is that customer.
• The attacker pretends instead to be the receiver entity.
• Ex. a user tries to contact a bank, but another site pretends that it is the bank and
obtains some information from the user.
9
Attacks
Attacks Threatening Integrity (cont.):
• Replaying:
• The attacker obtains a copy of a message sent by a user and later tries to replay it.
• Ex. a person sends a request to her bank to ask for payment. The attacker intercepts
the message and sends it again to receive another payment from the bank.
• Repudiation:
• Performed by one of the two parties in the communication: the sender or the
receiver.
• The sender of the message might later deny that she has sent the message; the
receiver of the message might later deny that he has received the message.
• Ex. (sender) bank customer asking her bank to send some money to a third party but
later denying that she has made such a request.
• Ex. (receiver) person buys a product from a manufacturer and pays for it
electronically, but the manufacturer later denies having received the payment and
asks to be paid.

10
Attacks
Attacks Threatening Availability:
• Denial of Service:
• It may slow down or totally interrupt the service of a system.
• The attacker can use several strategies to achieve this:
• She might send so many bogus requests to a server that the server crashes because of the
heavy load.
• The attacker might intercept and delete a server’s response to a client, making the client
to believe that the server is not responding.
• The attacker may also intercept requests from the clients, causing the clients to send
requests many times and overload the system.

11
Passive Versus Active
Attacks

Passive attack: the attacker’s goal


is just to obtain information.

Active attack: the attacker may


change the data or harm the
system.

12
Passive Attacks
• Are in the nature of eavesdropping on, or monitoring of transmissions

• Goal of the opponent is to obtain information that is being transmitted

• Two types of passive attacks are:


• The release of message contents
• Traffic analysis

13
Active Attacks
• Takes place when one entity pretends to be a different
entity
Masquerade • Usually includes one of the other forms of active
attack

• Involves the passive capture of a data unit and its


Replay subsequent retransmission to produce an
unauthorized effect

Modification of • Some portion of a legitimate message is altered, or


messages are delayed or reordered to produce an
messages unauthorized effect

Denial of • Prevents or inhibits the normal use or


service management of communications facilities

Ms. Sundos Sobahi 14


Active Attacks

15
Attacks

16
Security Services

17
Security Services
• Data Confidentiality:
• Designed to protect data from disclosure attack. That it is designed to prevent
snooping and traffic analysis attack.
• Data Integrity:
• Designed to protect data from modification, insertion, deletion, and replaying by
an adversary. It may protect the whole message or part of the message.
• Authentication:
• This service provides the authentication of the party at the other end of the line.
• Provides authentication of the sender or receiver during the connection
establishment (peer entity authentication).
• Authenticates the source of the data (data origin authentication).

18
Security Services
• Nonrepudiation
• Protects against repudiation by either the sender or the receiver of the data.
• In nonrepudiation with proof of the origin, the receiver of the data can later prove
the identity of the sender if denied.
• In nonrepudiation with proof of delivery, the sender of data can later prove that
data were delivered to the intended recipient.
• Access Control
• Provides protection against unauthorized access to data.
• It can involve reading, writing, modifying, executing programs, and so on.

19
Security Mechanisms

20
Security Mechanisms
• Encipherment
• Hiding or covering data, can provide confidentiality. Two techniques -cryptography and
steganography- are used for enciphering.
• Data Integrity
• Appends to the data a short checkvalue that has been created by a specific process from the
data itself.
• The receiver receives the data and the checkvalue. He creates a new checkvalue from the
received data and compares the newly created checkvalue with the one received.
• If the two checkvalues are the same, the integrity of data has been preserved.
• Digital Signature
• Sender can electronically sign the data and receiver can electronically verify the signature.
• The receiver uses the sender’s public key to prove that the message is indeed signed by the
sender who claims to have sent the message.

21
Security Mechanisms
• Authentication Exchange
• Two entities exchange some messages to prove their identity to each other.
• Ex. one entity can prove that she knows a secret that only she is supposed to know.
• Traffic Padding
• Inserting some bogus data into the data traffic to thwart the adversary’s attempt to use the
traffic analysis.
• Routing Control
• Selecting and continuously changing different available routes between the sender and the
receiver to prevent the opponent from eavesdropping on a particular route.

22
Security Mechanisms
• Notarization
• Selecting a third trusted party to control the communication between two entities.
• To prevent repudiation.
• The receiver can involve a trusted party to store the sender request in order to prevent the
sender from later denying that she has made such a request.
• Access Control
• It uses methods to prove that a user has access right to the data or resources owned by a
system. Examples of proofs are passwords and PINs.

23
Security Services and Mechanisms

24
Security Techniques
Two techniques are prevalent today: (cryptography) and (steganography).

• Cryptography: a word with Greek origins, means “secret writing”


• Symmetric-Key Encipherment
• Asymmetric-Key Encipherment
• Hashing

• Steganography: a word with Greek origins, means “covered writing”


• Text Cover
• Image Cover
• Other Covers

25
Cryptography
Symmetric-Key Encipherment

• Also called secret-key encipherment or secret-key cryptography.

• uses a single secret key for both encryption and decryption.

• Encryption/decryption can be thought of as electronic locking.

• In symmetric key enciphering, Alice puts the message in a box and locks the
box using the shared secret key; Bob unlocks the box with the same key and
takes out the message.

26
Cryptography
Asymmetric-Key Encipherment

• Also called public-key encipherment or public-key cryptography.

• There are two keys instead of one: one public key and one private key.

• To send a secured message to Bob, Alice first encrypts the message using
Bob’s public key.
• To decrypt the message, Bob uses his own private key.

27
Cryptography
Hashing
• A fixed-length message digest is created out of a variable-length message.

• The digest is normally much smaller than the message.

• To be useful, both the message and the digest must be sent to Bob.

• Hashing is used to provide checkvalues, which is used to provide data integrity.

28
Steganography
Historical Use
• In China, war messages were written on thin pieces of silk and rolled into a
small ball and swallowed by the messenger.
• In Rome and Greece, messages were carved on pieces of wood, that were
later dipped into wax to cover the writing.
• Invisible inks (such as onion juice) were also used to write a secret message
between the lines of the covering message or on the back of the paper; the
secret message was exposed when the paper was heated or treated with
another substance.

29
Steganography
Text Cover
• The cover of secret data can be text.

• The secret message can be covered under audio (sound and music) and
video.

• Both audio and video are compressed today; the secret data can be
embedded during or before the compression.

30
End of Chapter

31

You might also like