Chapter 1
Chapter 1
•The same plaintext encrypts to different ciphertext with different keys. The
security of encrypted data is entirely dependent on two things: the strength of
the cryptographic algorithm and the secrecy of the key.
Need for Security
•Protect data during their transmission.
•Guarantee that data transmission are authentic.
•Consider following examples:
•User A transmits a sensitive information file to user B. The unauthorized user
C is able to monitor the transmission and capture a copy of the file during its
transmission.
•While transmitting the message between two users, the unauthorized user
intercepts the message, alters its contents to add or delete entries, and then
forwards the message to destination user.
FIGURE
Security comes with the sense of preventing
For example, once an order is placed electronically, a purchaser
cannot deny the purchase order, if non-repudiation service was
enabled in this transaction.
Message Nonrepudiation
FIGURE
Message Availability
•The principle of availability states that resources should be available to
authorized parties at all times.
•Example: The situation can be difficult for a bank if the customer could not
access their accounts for transactions.
Goals of Secure System
Encryption Techniques
•Symmetric Key encryption
One key is used for both encryption and decryption.
For a sender and receiver to communicate securely using Symmetric Key
encryption, they must agree upon a key and keep it secret between
themselves.
Encryption Techniques
•Asymmetric Key encryption
It uses a pair of keys for encryption and decryption.
A public key, which encrypts data, and a corresponding private key (secret key) for decryption.
You publish your public key to the world while keeping your private key secret.
Private key has mathematical relationship with public key and it is computationally infeasible to deduce the
private key from the public key.
Anyone who has a public key can encrypt information but cannot decrypt it.
Only the person who has the corresponding private key can decrypt the information. No other key can be
used for decryption.
Digital Certificates
Digital Signatures
Active and Passive attacks in
Information Security
• Active attacks involve some modification of the data stream or the creation of false
statements.
• Types of active attacks are as follows:
Masquerade
Modification of messages
Replay
Denial of Service
Active and Passive attacks in
Information Security
Masquerade
The opponent could determine the location and identity of communicating host and could observe the
frequency and length of messages being exchanged. This information might be useful in guessing the nature
of the communication that was taking place.
The most useful protection against traffic analysis is encryption of SIP traffic. To do this, an attacker would
have to access the SIP proxy (or its call log) to determine who made the call.
Transposition Cipher
• A transposition cipher does not substitute one symbol for another (as in substitution
cipher), but changes the location of these symbols.
•It is one of the methods employed to protect secret or sensitive data from malicious
attacks.
•Cryptography and steganography are both methods used to hide or protect secret data.
• However, they differ in the respect that cryptography makes the data unreadable, or hides
the meaning of the data, while steganography hides the existence of the data.
Steganography
•In layman’s terms, cryptography is similar to writing a letter in a secret language: people
can read it, but won’t understand what it means. However, the existence of a (probably
secret) message would be obvious to anyone who sees the letter, and if someone either
knows or figures out your secret language, then your message can easily be read.
•If you were to use steganography in the same situation, you would hide the letter inside a
pair of socks that you would be gifting the intended recipient of the letter. To those who
don’t know about the message, it would look like there was nothing more to your gift than
the socks. But the intended recipient knows what to look for, and finds the message hidden
in them.
•Public key Steganography where a public key and a private key is used for secure
Communication. The sender will use the public key during the encoding process and
only the private key, which has a direct mathematical relationship with the public
key, can decipher the secret message.
Types of Steganography
•Image Steganography
•As the name suggests, Image Steganography refers to the process of hiding
data within an image file. The image selected for this purpose is called
the cover image and the image obtained after steganography is called
the stego image.
•It can be achieved easily as a typical 16-bit file has 216 sound levels, and a few levels
difference could not be detectable by the human ear.
•The sender embeds secret data of any type using a key in a digital cover file to produce a
stego file, in such a way that an observer cannot detect the existence of the hidden
message.
•Hiding secret messages in digital sound is a much more difficult process when compared to
others, such as Image Steganography. This method hides the data in WAV, AU, and even
MP3 sound files.
Types of Steganography
•Video Steganography
•Video files are generally a collection of images and sounds, so most of the
presented techniques on images and - audio can be applied to video files too.
•The great advantage of video are the large amount of data that can be hidden
inside and the fact that it is a moving stream of images and sounds.