Crypto Ch01 V3
Crypto Ch01 V3
by William Stallings
Chapter 1
Symmetric encryption
Asymmetric encryption
• Used to conceal small blocks of data, such as encryption keys and hash
function values, which are used in digital signatures
Authentication protocols
measures to deter,
prevent, detect, and
correct security
violations that involve
the transmission of
information
Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and authorized
manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system
Availability
• Assures that systems work promptly and service is not denied to authorized
users
© 2017 Pearson Education, Ltd., All rights reserved.
Key Security Concepts
• Preserving
• Guarding against • Ensuring timely and
authorized
improper reliable access to
restrictions on
information and use of
information access
modification or information
and disclosure,
destruction,
including means for
including ensuring
protecting personal
information
privacy and
nonrepudiation
proprietary
and authenticity
information
Key Security Concepts
These three concepts form what is often referred to as the CIA triad . The three
concepts embody the fundamental security objectives for both data and for
information and computing services.: confidentiality, integrity, and availability.
Accountability: Process of
tracing, or the ability to trace,
activities to a responsible
source.
Watch:
https://
www.youtube.com
/watch?
v=bRgL_Dry7uw
Authentication
• Concerned with assuring that a communication is
authentic
– In the case of a single message, assures the recipient
that the message is from the source that it claims to be
from
– In the case of ongoing interaction, assures the two
entities are authentic and that the connection is not
interfered with in such a way that a third party can
masquerade as one of the two legitimate parties
Two specific authentication services are defined in X.800:
• Peer entity authentication
• Data origin authentication
Watch:
https://www.youtube.com/
watch?v=H5ifNVeDXkg
Table 1.3
Security
Mechanisms
(X.800)
Encapsulation
Isolation
• Applies in three contexts: • Can be viewed as a specific form
– Public access systems should of isolation based on object-
be isolated from critical oriented functionality
resources to prevent • Protection is provided by
disclosure or tampering encapsulating a collection of
– Processes and files of procedures and data objects in
individual users should be a domain of its own so that the
isolated from one another internal structure of a data
except where it is explicitly object is accessible only to the
desired procedures of the protected
– Security mechanisms should subsystem, and the procedures
be isolated in the sense of may be called only at
preventing access to those designated domain entry points
mechanisms
© 2017 Pearson Education, Ltd., All rights reserved.
Fundamental Security Design Principles
Modularity Layering
• Refers both to the • Refers to the use of multiple,
development of security overlapping protection
functions as separate, approaches addressing the
protected modules and to people, technology, and
the use of a modular operational aspects of
architecture for mechanism information systems
design and implementation • The failure or circumvention
of any individual protection
approach will not leave the
system unprotected
Least astonishment
• Means that a program or user interface should
always respond in the way that is least likely to
astonish the user
• The mechanism for authorization should be
transparent enough to a user that the user has a
good intuitive understanding of how the security
goals map to the provided security mechanism
Internet Society
• ISOC is a professional membership society with world-wide organizational and individual membership
• Provides leadership in addressing issues that confront the future of the Internet and is the organization home for
the groups responsible for Internet infrastructure standards
ITU-T
• The International Telecommunication Union (ITU) is an international organization within the United Nations
System in which governments and the private sector coordinate global telecom networks and services
• The ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors of the ITU and whose
mission is the development of technical standards covering all fields of telecommunications
ISO
• The International Organization for Standardization is a world-wide federation of national standards bodies from
more than 140 countries
• ISO is a nongovernmental organization that promotes the development of standardization and related activities
with a view to facilitating the international exchange of goods and services and to developing cooperation in the
spheres of intellectual, scientific, technological, and economic activity
© 2017 Pearson Education, Ltd., All rights reserved.
Summary
• Computer security • Security services
concepts – Authentication
– Definition – Access control
– Examples – Data confidentiality
– Challenges – Data integrity
• The OSI security – Nonrepudiation
architecture – Availability service
• Security attacks • Security mechanisms
– Passive attacks • Fundamental security
– Active attacks design principles
– Attack surfaces and attack • Network security
trees © 2017 Pearson Education, Ltd., All rights reserved. model