Lecture 3
Lecture 3
04/29/2024
Eng. Mohamed Jaambiir
Computer Network Security
COS-413
Lecture Three
Eng. Mohamed Jaambiir
2
Cryptographic terminology
1. Plaintext
plaintext is an unencrypted, readable, plain message that anyone can read.
2. Ciphertext
Ciphertext is the result of the encryption process.
3. Encryption
is the process of applying a mathematical function to turn plaintext to cipher text
4. Decryption
turning ciphertext back to plaintext.
5. Keys
The encryption process requires a cryptographic key that tells the algorithm how to transform the plaintext into ciphertext
6. Hash
an encryption algorithm to convert your plaintext password to a hash. A hash is different from encryption in that once the
Eng. Mohamed Jaambiir 04/29/2024
data is hashed, it cannot be unhashed.
3
1. Ciphertext-Only Attack (COA)
1. Brute-Force Attack
During the brute-force attack, the intruder tries all possible keys (or passwords), and checks which
one of them returns the correct plaintext. A brute-force attack is also called an exhaustive key search
A. Dictionary Attack
Dictionary attacks are a kind of brute-force attacks, in which the intruder attempts to guess a password
by trying existing words or popular expressions.
B. Reverse Brute-Force Attack
In reverse brute-force attack, the intruder tests a single (usually popular) password against multiple
victims. Usually a popular expression, like a word 'password', is tried against a huge number of users.
The attacker does not target a specified user but rather the whole system which is used by them.
A Denial-of-Service attack (DoS attack) is an attack where an attacker attempts to disrupt the services
provided by a host, by not allowing its intended users to access the host from the Internet. If the attack
succeeds, the targeted computer will become unresponsive and nobody will be able to connect with it.
DoS Techniques
A. Reducing Performance
B. Exhausting Resources
C. Crashing
D. Targeting Layers
E. DDoS (Distributed Denial-of-Service) Attack
A distributed denial-of-service is an attack where the targeted system is attacked by large number of other
machines, often located in different places, sometimes all around the world
Eng. Mohamed Jaambiir 04/29/2024
10
3. Man-in-the-Middle Attack
During the man-in-the-middle attack, the hidden intruder joins the communication and
intercepts all messages.
First, the attacker creates two secret keys. Then, he uses the first key to start the
communication with the first side. The received answer is encrypted but the intruder can
decrypt it easily, as he knows the key. He encrypts the message again, this time with the
second key. The encrypted message is then send back to the second side. Then, after
receiving the answer from the second side, he decrypts the message, reads it, encrypts by the
first key and sends back to the first site. In this way, the whole communication moves
through the attacker. He can receive a lot of information about the whole system and even
successfully impersonate authorized persons and reach the access for hidden data.
Frequency analysis is one of the known ciphertext attacks. It is based on the study of
the frequency of letters or groups of letters in a ciphertext.
In all languages, different letters are used with different frequencies. For each
language proportions of appearance of all characters are slightly different, so texts
written in a given language have some certain common properties, which allow
to distinguish them from texts written in other languages.
During replay attacks the intruder sends to the victim the same message as was
already used in the victim's communication. The message is correctly encrypted, so
its receiver may treat is as a correct request and take actions desired by the intruder.
The attacker might either have eavesdropped a message between two sides before or
he may know the message format from his previous communication with one of
the sides. This message may contain some kind of the secret key and be used for
authentication.
I. Symmetric Encryption
II. Asymmetric Encryption
Symmetric encryption is a type of encryption key management solution where only one
key (a secret key) is used to both encrypt and decrypt.
Symmetric encryption uses a single key to encrypt and decrypt.
Some cryptography methods employ one key for data encryption and another key for
data decryption. It uses two different key to encrypt and decrypt the message.
This type of cryptography, known as “public-key” encryption,
In the Private key, the same key (secret key) is used for encryption and
decryption. In this key is symmetric because the only key is copied or
shared by another party to decrypt the cipher text. It is faster than
public-key cryptography.
In a Public key, two keys are used one key is used for encryption and
another key is used for decryption. One key (public key) is used to
encrypt the plain text to convert it into cipher text and another key
(private key) is used by the receiver to decrypt the cipher text to read the
message.
1. The private key is faster than the public key. It is slower than a private key.
The private key is Symmetrical because there is only The public key is Asymmetrical because there are two
4. one key that is called a secret key. types of keys: private and public keys.
In this cryptography, the sender and receiver need to In this cryptography, the sender and receiver do not need
5. share the same key. to share the same key.
Eng. Mohamed Jaambiir 04/29/2024
21
States of Data Encryption:
Data, whether it’s being transferred between users or stored on a server, is valuable
and must be protected at all times.
I. Data encryption in transit: Information that is actively traveling from one point
to another, such as via the internet or over a private network, is referred to as data
in transit.
II. Encryption of data at rest: Data at rest refers to information that is not actively
moving from one device to another or from one network to another, such as
information stored on a hard drive, laptop, flash drive, or archived/stored in
another way
If the password or key is lost, the user will be unable to open the encrypted
file.
Data protection solutions might be difficult to utilize when the user layers
them for contemporary systems and applications.
If a company fails to realize any of the restrictions imposed by encryption
techniques, it is possible to set arbitrary expectations and requirements that
might undermine data encryption protection.
The End
Eng. Mohamed Jaambiir 04/29/2024