Infosec 1
Infosec 1
UNIVERSITY COLLEGE.
SCHOOL OF TECHNOLOGY
COMPUTER INFORMATION SECURITY
LEVEL 300
BY
MR ANDRENE ADDY
INFORMATION SECURITY
Active attacks: the contents of the original message are modified in some
ways.
INFORMATION SECURITY
ELEMENTARY CRYPTOGRAPHY: SUBSTITUTION CIPHER
Encryption is the process of encoding a message so that its meaning is not
obvious;
Decryption is the reverse process, transforming an encrypted message back
into its normal, original form.
Alternatively, the terms encode and decode or encipher and decipher are used
instead of encrypt and decrypt.
That is, we say that we encode, encrypt, or encipher the original message to
hide its meaning.
Then, we decode, decrypt, or decipher it to reveal the original message. A
system for encryption and decryption is called a cryptosystem.
INFORMATION SECURITY
The original form of a message is known as plaintext, and the encrypted
form is called cipher text. For convenience, we denote a plaintext
message P as a sequence of individual characters P =<p1,p2 ……pm> .
Similarly, cipher text is written as C = <c1,c2, ……….cm>
INFORMATION SECURITY
For instance, the plaintext message "I want cookies" can be denoted as the message
string . . It can be transformed into cipher text C =<c1,c2 ……c14>, and
the encryption algorithm tells us how the transformation is done.
We use this formal notation to describe the transformations between plaintext
and cipher text. For example: we write C = E (P) and P = D(C), where C
represents the cipher text, E is the encryption rule, P is the plaintext, and D is
the decryption rule.
P = D (E(P))
INFORMATION SECURITY
In other words, we want to be able to convert the message to protect it from an
intruder, but we also want to be able to get the original message back so that the
receiver can read it properly.
The cryptosystem involves a set of rules for how to encrypt the plaintext and how to
decrypt the cipher text.
The encryption and decryption rules, called algorithms, often use a device called a
key, denoted by K, so that the resulting cipher text depends on the original plaintext
message, the algorithm, and the key value.
We write this dependence as C =E (K, P). Essentially, E is a set of encryption
algorithms, and the key K selects one specific algorithm from the set.
INFORMATION SECURITY
There are many types of encryption. In the next sections we look at two simple forms
of encryption: substitutions in which one letter is exchanged for another and
transpositions, in which the order of the letters is rearranged.
Cryptanalyst: cryptanalyst is a person who studies encryption and encrypted
message and tries to find the hidden meanings (to break an encryption).
Confusion: it is a technique for ensuring that ciphertext has no clue about the original
message.
Diffusion: it increases the redundancy of the plaintext by spreading it across rows
and columns.
INFORMATION SECURITY
Substitutions Cipher: It basically consists of substituting every plaintext character for a
different cipher text character. It is of two types
I. Mono alphabetic substitution cipher
II. II. Poly alphabetic substitution cipher
Mono alphabetic substitution cipher: Relationship between cipher text symbol and plain text
symbol is 1:1.
1. Additive cipher: Key value is added to plain text and numeric value of key ranges from 0 –
25.
Example: Plain text(P)- H E L LO (H=7,E=4,L=11,L=11,O=14) Key
(K)=15
Cipher text (C)= 7+15,4+15,11+15,11+15,14+15
= 22,19, 26,26,(29%26)=3
= W T A AD
INFORMATION SECURITY
2. Affine cipher:
INFORMATION SECURITY
Polyalphabetic substitution cipher In polyalphabetic cipher each occurrence of a
character may have different substitution. The relationship between characters in
plain text and cipher text is 1 to many.
Auto key cipher
Playfair cipher
Vigegeire cipher
Hill cipher
Auto key cipher:
In this cipher, key is stream of subkeys in which subkey is used to encrypt the
corresponding character in the plain text.
Here 1st subkey is predefined and 2nd subkey is the value of the 1 st character of
the plain text 3rd subkey is the value of the 2nd plain text and so on.
INFORMATION SECURITY
Auto key cipher
PASSWORDS AUTHENTICATION
There are three main concerns with the use of passwords for authentication:
Will the user disclose the password to another person intentionally,
accidentally, or because they were deceived?
Will the user be able to regularly enter the password correctly?
Will users be able to remember their passwords or will they have to record
them somewhere or choose easily guessed passwords?
When an attacker obtains a password directly from its user by deceit the attack
is known as social engineering.
PASSWORDS AUTHENTICATION
Attacks on passwords can be broadly classified as:
A targeted attack on one account: The attacker tries to obtain a particular user’s
password. Attempt to penetrate any account on a system: The attacker tries to steal any
password for the system, for example, by a dictionary attack. • Attempt to penetrate any
account on any system: This is when an attacker is seeking access to any system within a
given domain.
Service denial attack: An attacker may want to prevent a specific user from using the
system.
Access control lists are used to simplify access rights management by storing the access
control matrix a column at a time along with the resource to which the column refers.
ACLs are widely used in environments where the users manage the security of their own
files such as UNIX systems
ACCESS CONTROL LISTS