0% found this document useful (0 votes)
25 views70 pages

L2 Information Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views70 pages

L2 Information Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 70

Information Security

Technologies and Tools used in Information


Security.
• Identification, Authentication and
Authorization.
• Identification:- is a means through which a user
claims identity (who it is) on a system.
• Authentication:- is a means through which the
validity of the claimed identity is assessed
(verified).
• Authorization defines and maintain allowed
actions on a system.
Technologies and Tools used in Information
Security.
• Identification and Authorization forms the
basis for Accountability.

• The combination of all the three;


Identification, authentication and
Authorization forms the basis for identity-
based access control.
Authentication forms
• Authentication mechanisms:
– Something the user have. (eg. Tokens)
– Something known only to the user. (like
passwords)
– Something the user is. (sampled characteristics of
the user) eg. Fingerprints.
Authentication forms
• Static:- reuses the same authenticator (eg.
Static password)
– The strength of this authenticator depends on
how secured it is both in storage and in transit.
• Dynamic:- uses cryptography or other
techniques to create one per-session
authenticator. Authenticator changes per
authentication session.
Authentication forms
• Multiple factor:- uses two or more
authentication techniques.. eg. Using a token
together with a password.
Cryptography
• Encryption is the process of scrambling the
contents of a file or message to make it
unintelligible to anyone not in possession of
the "key" required to unscramble it.

• Cryptography is the science of writing in secret


code.
Purpose of cryptography
• Within the context of any application-to-
application communication, there are some
specific security requirements, including:
• Authentication: The process of proving one's
identity. (The primary forms of host-to-host
authentication on the Internet today are
name-based or address-based, both of which
are notoriously weak.)
Purpose of cryptography
• Privacy/confidentiality: Ensuring that no one
can read the message except the intended
receiver.
• Integrity: Assuring the receiver that the
received message has not been altered in any
way from the original.
• Non-repudiation: A mechanism to prove that
the sender really sent this message.
Purpose of cryptography
• cryptography is necessary when
communicating over any untrusted medium,
which includes just about any network,
particularly the Internet.
cryptosystem
• A cryptosystem or algorithm is the process or
procedure to turn plaintext into cryptotext.
• A crypto algorithm is also known as a "cipher."
Elements of effective cryptosystem
• First and foremost it must be reversible.
– A crypto algorithm is of no practical use if once
you have scrambled your information, you cannot
unscramble it.
• The security of the cryptosystem should be
dependent on the secrecy and length of the
key and not on the details of the algorithm.
Elements of effective cryptosystem
– knowing the algorithm should not make it
significantly easier to crack the code (restricted
versus unrestricted).
• A cipher should generate ciphertext roughly
equivalent in size
Cipher
• Below is an example of a cipher; to scramble a
message with this cipher, simply match each
letter in a message to the first row and convert
it into the number or letter in the second row.
• To unscramble a message, match each letter
or number in a message to the corresponding
number or letter in the second row and
convert it into the letter in the first row.
Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
1 2 3 4 5 6 A B C D E F G H I J K L M N O P Q R S T
Cipher
• Ciphers usually fall into one of two categories:
• stream ciphers.
• block ciphers
Stream ciphers
• Stream cipher algorithms process plaintext to
produce a stream of ciphertext.
– The cipher inputs the plaintext in a stream and
outputs a stream of ciphertext.
Plaintext: Let us talk one to one.
Ciphertext: F5n om n1fe ih5 ni ih5
Stream ciphers
Weaknesses
• The most crucial shortcoming of stream
ciphers is the fact that patterns in the plaintext
can be reflected in the ciphertext.
• NB:
– Knowing that certain words repeat makes
breaking the code easier.
– certain words in the English language appear with
predictable regularity.
Stream ciphers
– Letters of the alphabet also appear in predictable
regularity. The most
– commonly used letters of the alphabet in the
English language are E, T, A, O, N, and I.
– least commonly used letters in the English
language are J, K, X, Q, and Z.
– The most common combination of letters in the
English language is "th." As a result, if a code
breaker is able to find a "t" in a code, it doesn't
take long to find an "h."
Stream ciphers
• Another weakness of stream ciphers is that they
can be susceptible to a substitution attack even
without breaking the code.
– This is a type of replay attack where someone can
simply copy a section of an old message and insert it
into a new message. You don't need to break the
code to insert the old section into a new message.
• Examples of stream ciphers include the Vernam
cipher, Rivest cipher #4 (RC4), and one-time
pads.
Block ciphers
• Block ciphers encrypt and decrypt information
in fixed size blocks rather than encrypting and
decrypting each letter or word individually.
• A block cipher passes a block of data or
plaintext through its algorithm to generate a
block of ciphertext.
• A block cipher ideally should generate
ciphertext roughly equivalent in size (in terms
of number of blocks) to the cleartext.
Block ciphers
• Another requirement of block ciphers is that
the ciphertext should contain no detectable
pattern.
• Examples of well-known block ciphers include
– Data Encryption Standard (DES),
– International Data Encryption Algorithm (IDEA),
and
– SKIPJACK.
Breaking ciphers
• For as long as ciphers have existed, there have
been people trying to break them.
• There are many methods employed to break
cipher. Some methods are ingenious. Some
are sophisticated and technical in nature,
while others are more crude in nature.
widely used techniques employed in
breaking ciphers.
1. Known Plaintext Attack
– This method relies on the code breaker knowing in
advance the plaintext content of a ciphertext
message.
– Having both the plaintext and the ciphertext the
code breaker reengineers the cipher and the key
used to create the ciphertext.
widely used techniques employed in
breaking ciphers.
2. Chosen Plaintext Attack
– This method relies on the ability of the code
breaker to somehow get a chosen plaintext
message encrypted.
3. Cryptanalysis
– Technically, any method employed to break a cipher
or code is cryptanalysis.
– cryptanalysis is employing mathematical analysis to
break a code. This method requires a high level of
skill and sophistication.
widely used techniques employed in
breaking ciphers.
– It is usually only employed by academics and
governments. Today it relies very heavily on the
use of ultrafast super computers.
– Probably the most active and successful
organization in the world, dedicated to breaking
codes, is the National Security Agency (NSA).
widely used techniques employed in
breaking ciphers.
• This is the largest and most secret spy agency
in the United States. It is sometimes referred
to as the Puzzle Palace, because the group
spends so much time and energy on codes
and cipher.
widely used techniques employed in
breaking ciphers.
4. Brute Force
– The brute force method tries every possible
combination of keys or algorithms to break a
cipher.
– Requires tremendous resources. Usually, this type
of attack requires computer assistance. If the
algorithm is simple or the key is small, then the
CPU resources required could be provided by a
simple PC
widely used techniques employed in
breaking ciphers.
5. Social Engineering
– This method relies on breaking a cipher by getting
someone knowledgeable about the cipher to
reveal information on how to break it.
– Bribing someone, tricking him or her into divulging
information, or threatening him or her with harm
to reveal information.
– When the threat of harm is employed it is
sometimes referred to as rubber-hose
cryptanalysis.
widely used techniques employed in
breaking ciphers.
6. Substitution:
– This is a type of replay attack where a previous message, in
part or in whole, is inserted into a legitimate message.
– An attacker does not need to break the cipher for this type of
attack to be effective.
7. Timing attacks:
– Some cryptosystems can be broken if an outsider is able to
accurately measure the time required to perform the
encryption and decryption of a known ciphertext.
– The known ciphertext and the timing provide enough
information to deduce fixed exponents and factors of some
systems.
Encryption
• Encryption is the process of scrambling the
contents of a file or message to make it
unintelligible to anyone not in possession of
the "key" required to unscramble the file or
message.
• There are two types of encryption:
– symmetric (private/secret) key and
– Asymmetric (public) key encryption.
Symmetric Key Encryption
• Symmetric key, also referred to as private key
or secret key, is based on a single key and
algorithm being shared between the parties
who are exchanging encrypted information.
• The same key both encrypts and decrypts
messages.
Symmetric Key Encryption
• The strength of the scheme is largely
dependent on the size of the key and on
keeping it secret.
– Generally, the larger the key, the more secure the
scheme.
• In addition, symmetric key encryption is
relatively fast.
Symmetric Key Encryption
• The main weakness of the system is that the
key or algorithm has to be shared.
• You can't share the key information over an
unsecured network without compromising the
key.
– As a result, private key cryptosystems are not well
suited for spontaneous communication over open
and unsecured networks. In addition, symmetric
key provides no process for authentication or
nonrepudiation.
Symmetric Key Encryption
• Examples of widely deployed symmetric key
cryptosystems include DES, IDEA, Blowfish,
RC4, CAST, and SKIPJACK.
Data Encryption Standard (DES)
• DES is one of the oldest and most widely used
algorithms.
• DES was developed by IBM with the
encouragement of the NSA.
• It was originally deployed in the mid 1970s. DES
consists of an algorithm and a key.
• The key is a sequence of eight bytes, each
containing eight bits for a 64-bit key. Since each
byte contains one parity bit, the key is actually 56
bits in length.
Data Encryption Standard (DES)
• DES is widely used in automated teller
machine (ATM) and point-of-sale (POS)
networks,
• DES has been enhanced with the triple DES.
• DES has been broken.
• It is gradually being phased out of use.
International Data Encryption Algorithm
(IDEA)
• IDEA is a symmetric key block cipher
developed at the Swiss Federal Institute in the
early 1990s.
• IDEA utilizes a 128-bit key. Supposedly, it is
more efficient to implement in software than
DES and triple DES. Since it was not developed
in the United States, it is not subject to U.S.
export restrictions.
CAST
• The CAST algorithm supports variable key lengths,
anywhere from 40 bits to 256 bits in length.
• CAST uses a 64-bit block size, which is the same as
the DES, making it a suitable drop-in replacement.
• CAST has been reported to be two to three times
faster than a typical implementation of DES and six
to nine times faster than a typical implementation
of triple DES.
CAST
• The CAST algorithm was developed by Carlisle
Adams and Strafford Travares and patented by
Entrust Technologies, but a version of the
CAST algorithm is available for free
commercial and noncommercial use.
• CAST is employed in Pretty Good Privacy
(PGP).
Rivest Cipher #4 (RC4)
• Developed by Ron Rivest of RSA fame, RC4 is a
stream cipher that uses a variable size key.
– However, when used with a key of 128 bits it can
be very effective.
– Until recently, the approved export version only
used a 40-bit key.
• RC4 is used in Netscape Navigator and
Internet Explorer.
Asymmetric Key Encryption
• Asymmetric cryptography is also known as
public key cryptography.
• Public key cryptography uses two keys as
opposed to one key for a symmetric system.
• With public key cryptography there is a public
key and a private key.
Asymmetric Key Encryption
• The keys' names describe their function. One key
is kept private, and the other key is made public.
– Knowing the public key does not reveal the private
key.
• A message encrypted by the private key can only
be decrypted by the corresponding public key.
• Conversely, a message encrypted by the public
key can only be decrypted by the private key.
Public Key Cryptosystems
• There are three public key algorithms in wide
use today:
– Diffie-Hellman;
– RSA; and the
– Digital Signature Algorithm (DSA).
Public Key Cryptosystems
1. Diffie-Hellman
• The Diffie-Hellman algorithm was developed
by Whitfield Diffie and Martin Hellman at
Stanford University.
• It was the first usable public key algorithm.
• Diffie-Hellman is based on the difficulty of
computing discrete logarithms.
Public Key Cryptosystems
• It can be used to establish a shared secret key
that can be used by two parties for symmetric
encryption.
• Diffie-Hellman is often used for IPSEC key
management protocols.
Public Key Cryptosystems
For spontaneous communications with Diffie-Hellman,
– Two communicating entities would each generate a
random number that is used as their private keys.
– They exchange public keys.
– They each apply their private keys to the other's
public key to compute identical values (shared secret
key).
– They then use the shared secret key to encrypt and
exchange information
Public Key Cryptosystems
2. Rivest, Shamir, Adelman (RSA)
– The RSA public key algorithm was developed by Ron
Rivest, Adi Shamir, and Len Adelman at MIT.
– RSA multiplies large prime numbers together to
generate keys. Its strength lies in the fact that it is
extremely difficult to factor the product of large prime
numbers.
– This algorithm is the one most often associated with
public key encryption.
– The RSA algorithm also provides digital signature
capabilities.
Public Key Cryptosystems
3. Digital Signature Algorithm (DSA)
– DSA was developed as part of the Digital Signature
Standard (DSS).
– Unlike the Diffie-Hellman andRSA algorithms, DSA
is not used for encryption but for digital
signatures.
Message Integrity
• To attain a high level of confidence in the
integrity of a message or data, a process must
be put in place to prevent or detect alteration
during transit. One technique employed is
called a hash function.
• Hash function:
• A hash function takes a message of any length
and computes a product value of fixed length.
• The product is referred to as a "hash value."
Message Integrity
• The length of the original message does not
alter the length of the hash value.
• Hash functions are used to ensure the
integrity of a message or file.
• Using the actual message or file, a hash
function computes a hash value, which is a
cryptographic checksum of the message. This
checksum can be thought of as a fingerprint
for that message.
Message Integrity
• The hash value can be used to determine if
the message or file has been altered since the
value was originally computed.

• Using e-mail as an example, the hash value for


a message is computed at both the sending
and receiving ends.
Message Integrity
• If the message is modified in anyway during
transit, the hash value computed at the
receiving end will not match the value
computed at the sending end.
• Hash functions must be one way only.
– In other words, there should be no way to reverse
the hash value to obtain information on the
message. Obviously, this would represent a risk.
Digital Signatures
• Another requirement of an effective one-way
hash function is that the possibility of
"collisions" is very limited, if nonexistent.
• A collision occurs when the same hash value is
computed for two or more unique messages.
If the messages are different the hash values
should be different. No two unique messages
should compute the same hash value.
Digital Signatures
• Some of the more widely implemented
hashing algorithms are:
– Message digest #4 (MD4) from RSA
– Message digest #5 (MD5) from RSA
– Secure hash algorithm-1 (SHA-1)
– RACE Integrity Primitives Evaluation (RIPE) MD-
160 (RIPEMD-160)
Digital Signatures
• MD4
– MD4 was developed by Ron Rivest of RSA.
– MD4 is a one-way hash function that takes a
message of variable length and produces a 128-bit
hash value or message digest.
– MD4 has been proven to have weaknesses.
Analysis has shown that at least the first two
rounds of MD4 are not one-way (there are three
rounds in MD4) and that the algorithm is subject
tocollisions.
Digital Signatures
• MD5
– MD5 was also created by Ron Rivest as an improvement on
MD4.
– MD5 creates a unique 128-bit message digest value derived
from the contents of a message or file. This value, which is a
fingerprint of the message or file content, is used to verify the
integrity of the message's or file's contents. If a message or file
is modified in any way, even a single bit, the MD5 cryptographic
checksum for the message or file will be different.
– Considered very difficult to alter a message or file in a way that
will cause MD5 to generate the same result as was obtained for
the original file.
Digital Signatures
• While MD5 is more secure than MD4, it too has been
found to have some weaknesses:
• Analysis has found a collision in the compression
function of MD5, although not for MD5 itself.
Nevertheless, this attack casts doubts on the whether
MD5 is truly a collision-resistant hash algorithm.
• The MD5 algorithm is intended for digital signature
applications, where a large file must be "compressed" in
a secure manner before being encrypted with a private
(secret) key under a public-key cryptosystem such as
RSA.
Digital Signatures
• Secure Hash Algorithm-1 (SHA-1)
– SHA-1 is a one-way hash algorithm used to create
digital signatures.
– SHA-1 is derived from SHA, which was developed
in 1994 by the NIST.
– SHA-1 is similar to the MD4 and MD5 algorithms
but is slightly slower than MD4 and MD5, but it is
reported to be more secure.
Digital Signatures
– The SHA-1 hash function produces a 160-bit hash
value or message digest.
– Since it produces a 160-bit message digest it is
more resistant to brute force attacks than MD4
and MD5, which produce a 128-bit message
digest.
Digital Signatures
• RIPEMD
– RIPEMD is a hash function that was developed
through the European Community's project RIPE.
– There are several extensions to RIPEMD
– RIPEMD-128, RIPEMD-160, and RIPEMD256.
– Each extension is a reference to the length of the
hash value or message digest. For example,
RIPEMD-160 is a 160-bit cryptographic hash
function, designed by Hans Dobbertin, Antoon
Bosselaers, and Bart Preneel.
Authentication

• To have a high level of confidence and trust in the


integrity of information received over a network, the
transacting parties need to be able to authenticate each
other's identity.
• While confidentiality was ensured with the use of public
key cryptography, there was no authentication of the
parties' identities.
• . To ensure secure business transactions on unsecured
networks like the Internet, both parties need to be able
to authenticate their identities.
Authentication
• Authentication in a digital setting is a process
whereby the receiver of a message can be
confident of the identity of the sender.
• The lack of secure authentication has been a
major obstacle in achieving widespread use of
the Internet for commerce.
• One process used to authenticate the identity
of an individual or entity involves digital
signatures.
Digital Signatures
• A digital signature allows a receiver to
authenticate (to a limited extent) the identity of
the sender and to verify the integrity of the
message.
• For the authentication process, you must already
know the sender's public key, either from prior
knowledge or from some trusted third party.
• Digital signatures are used to ensure message
integrity and authentication.
Digital Signatures
• In its simplest form, a digital signature is
created by using the sender's private key to
hash the entire contents of the message being
sent to create a message digest.
• The recipient uses the sender's public key to
verify the integrity of the message by
recreating the message digest.
• By this process you ensure the integrity of the
message and authenticate the sender
Digital Signatures
• To sign a message, senders usually append
their digital signature to the end of a message
and encrypt it using the recipient's public key.
• Recipients decrypt the message using their
own private key and verify the sender's
identity and the message integrity by
decrypting the sender's digital signature using
the sender's public key
Digital Signatures
• Alice has a pair of keys, her private key
and her public key.
• She sends a message to Bob that includes
both a plaintext message and a version of
the plaintext message that has been
encrypted using her private key.
• The encrypted version of her text
message is her digital signature.
Digital Signatures
• Bob receives the message from Alice and decrypts it
using her public key.
• He then compares the decrypted message to the
plaintext message.
• If they are identical, then he has verified that the
message has not been altered and that it came from
Alice.
• He can authenticate that the message came from Alice
because he decrypted it with Alice's public key, so it
could only have been encrypted with Alice's private key,
to which only Alice has access.
Digital Signatures
• The strengths of digital signatures are that they
are almost impossible to counterfeit and they
are easily verified. However, if Alice and Bob
are strangers who have never communicated to
• each other before, and Bob received Alice's
public key, but had no other means to verify
who Alice was, other than Alice's assertion that
she was who she claimed to be, then the digital
signature is useless for authentication.
Digital Signatures
• It will still verify that a message has arrived
unaltered from the sender, but it cannot be
used to authenticate the identity of the
sender.
• In cases where the parties have no prior
knowledge of one another, a trusted third
party is required to authenticate the identity
of the transacting parties.

You might also like