Module 1_part_1 - Cryptography and Network Secuirty Overview-Win23
Module 1_part_1 - Cryptography and Network Secuirty Overview-Win23
Network Security
COMP4055
Welcome
Course objectives:
Learn how Cryptography works
Learn how to use Cryptography correctly to harden network security
My recommendations:
Take notes
Patriciate in class discussions
Free practice
Read reference materials
Main Topics
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure
Email and Disk Encryption
Cryptography Attacks
Cryptanalysis Tools
Steganography
Analysis of Network Protocol Security
Cryptography and
Network Security
Module 1
Part 1
Cryptography Concepts
and Use Cases
Key Security Concepts
Why cryptography?
Cryptography is used to protect confidential data such as email
messages, chat sessions, web transactions, personal data, corporate
data, e-commerce applications etc.
It helps the conversion of data into scrambled code that is sent across a
private or public network.
Confidentiality
Integrity
Authentication
Nonrepudiation
Confidentiality
According to the International Standards Organization (ISO), confidentiality is
"ensuring that the information/data can be accessed only by those authorized."
Confidentiality is the term used to describe the prevention of revealing information
to unauthorized computers or users.
Integrity
Integrity is "ensuring that the information is accurate, complete,
reliable, and is in its original form." Valuable information is stored on
the computer. Any data corruption/modification can reduce the value
of the information. The damage that data corruption/modification can
do to an organization is unfathomable .
Authentication
Authenticity is "the identification and assurance of the origin of
information." It is important to ensure that the information on the
system is authentic and has not been tampered with. It is also
important to ensure that the computer users or those who access
information are who they claim to be.
Nonrepudiation
In digital security, nonrepudiation is the means to ensure that a message
transferred has been sent and received by the persons or parties who actually
intended to. Let us assume that party A is sending a message M with the
signature S to the party B. Then party A cannot deny the authenticity of its
signature S.
It can be obtained through the use of:
Digital signatures : A digital signature functions as unique identifier for an
individual, like a written signature. It is used to ensure that a message or
document is electronically signed by the person.
Confirmation services: It is possible to indicate that messages are received
and/or sent by creating digital receipts. These digital receipts are generated by
the message transfer agent.
Cryptography Terminologies
Cryptograph … (1/3)
• Algorithm – a precise rule (or set of rules) specifying how to solve some
problem or accomplish a specific task.
• Plaintext/Cleartext – data in unscrambled form.
• Ciphertext/Cryptogram – scrambled data.
• Cipher – algorithm for transforming plaintext to ciphertext.
- 14
Cryptograph … (2/3)
- 15
Cryptograph … (3/3)
• Key – For crypto, a secret value in the form of a sequence of characters used to
encrypt and decrypt.
• Key clustering – instance where two keys generate the same ciphertext
from same plaintext.
• Keyspace – All possible values used to construct keys. The larger keyspace
the better.
- 16
History of Cryptograph …(1/4)
• 1790: Thomas Jefferson invented wheel cipher. (The order of the disks is the key).
Thomas Jefferson Wheel Cipher
Reference: Secrets and Lies – Digital Security in a Networked World, B. Schneier, Wiley Publishing, 2004
History of Cryptograph …(2/4)
Enigma Cipher
Machine
Reference: Secrets and Lies – Digital Security in a Networked World, B. Schneier, Wiley Publishing, 2004
History of Cryptograph …(3/4)
Reference: Secrets and Lies – Digital Security in a Networked World, B. Schneier, Wiley Publishing, 2004 - 12 -
Encryption Algorithms
Types of Encryption Algorithms
Symmetric encryption (secret key cryptography)
Asymmetric encryption (public key cryptography)
Symmetric encryption (secret
key cryptography)
Q29uZ3JhdHVsYXRpb25zIGFnYWluISBOb3cgc2VuZCBtZSBhbm90aGVyIGVtYWl
sIGF0IGptaW5AZ2VvcmdlYnJvd24uY2EuIA==