Cybersecurity 2
Cybersecurity 2
SECURITY IN
COMPUTING,
FIFTH EDITION
Topic 2: Symmetric Key Cryptography
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
2
Objectives for
Topic 2
• Survey authentication mechanisms
• List available access control implementation options
• Explain the problems encryption is designed to solve
• Public Key (Symmetric) Cryptography
• Understand the various categories of encryption tools
as well as the strengths, weaknesses, and applications
of each
• Learn about certificates and certificate authorities
3
• Single-factor
authentication
• Two (Dual) -factor
authentication
• Multifactor authentication
7
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
9
Password Storage
Plaintext Concealed
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
10
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
11
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
12
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Single Sign-On (SSO) Authentication
• A single system (can be a set of servers) holds
authentication information
• When a user, host or process has a credential, it is said to
have a security context
14
Access Control
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Access Control Methods
• The three major access control
methods
• Discretionary Access Control (DAC)
• Mandatory Access Control (MAC)
• Role-Based Access Control (RBAC)
• You must understand the details of
each of these models, as well as how
they relate to operating systems that
you may administer
Discretionary Access Control (DAC)
• Users control access to resources (in other words,
objects) they own; at owners discretion
• Essential concepts
• Ownership
• Permissions
• Access control list (ACL)
• Capabilities
• Common permissions and inheritance
• DAC strengths and weaknesses
Mandatory Access Control (MAC)
• Systems that use Mandatory Access
Control (MAC) are not based on user
ownership of resources; ownership is
controlled by the operating system, not
the individual user
• Three essential MAC principles
• Access policy
• Label
• Access level
• Understanding access levels
Role-Based Access Control (RBAC)
• Operating systems and services
that use Role-Based Access
Control (RBAC) manage users
and services based on the
function of that user or service in
a particular organization
• Based on MAC
• RBAC and the health-care
industry
• Based on role: Doctor, Nurse,
Therapist etc
21
Access Policies
• Goals:
• Check every access
• Enforce least privilege
• Verify acceptable usage
• Track users’ access
• Enforce at appropriate
granularity
• Use audit logging to track
accesses
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
22
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Cryptography/Cryptology
Access Control covers authorized access. How do we protect
against UNauthorized access
24
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
25
Encryption Terminology
• Sender
• Recipient
• Transmission medium
• Interceptor/intruder
• Encrypt, encode, or encipher
• Decrypt, decode, or decipher
• Cryptosystem
• Plaintext
• Ciphertext
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
November 1, 2004 Slide #8-26
Cryptography
• The word cryptography comes from two Greek words
meaning “secret writing” and
• It is the art and science of concealing meaning.
• Cryptanalysis is the breaking of codes.
• The basic component of cryptography is a
cryptosystem.
Caesar Cipher
• Caesar cipher is the
widely known cipher in
which letters are shifted.
• For example, if the key is
3, the letter A becomes
D, B becomes E, and so
• forth, ending with Z
becoming C. So the word
“HELLO” is enciphered as
KHOOR.
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Classical Cryptography
• Classical cryptosystems (also called single-key or
symmetric cryptosystems) are cryptosystems that
use the same key for encipherment and
decipherment.
• Sender, receiver share common key
• Keys may be the same, or trivial to derive from
one another
• Sometimes called symmetric cryptography
• Two basic types
• Transposition ciphers
• Substitution ciphers: Like Caesar Cypher
• Combinations are called product ciphers
Transposition Cipher (TC)
• Rearrange letters in plaintext to produce ciphertext
• Example (Rail-Fence Cipher)
• The rail fence cipher is composed by writing the plaintext in two rows,
proceeding down, then across, and reading the ciphertext across, then
down.
• TC breaks the patterns in language
• Plaintext is HELLO WORLD
• Rearrange as
HLOOL
ELWRD
• Ciphertext is HLOOL ELWRD
LAB ASSIGNMENT:
Cryptography
November 1, 2004 Slide #8-33
Polyalphabetic Cipher
Based on substitution, but used multiple substitution alphabets. Invented by
Leon Battista Alberti in 1467.Alberti would use a common Caesar cipher to
encrypt messages, but would switch alphabet keys, indicating switch by
capitalizing the first letter of the new alphabet.
Vigènere Cipher
• Like Cæsar cipher, but use a phrase
• Because this requires several different key letters, this
type of cipher is called polyalphabetic.
• Example
• Message THE BOY HAS THE BALL
• Key VIG
• Encipher using Cæsar cipher for each letter:
key VIGVIGVIGVIGVIGV
plain THEBOYHASTHEBALL
cipher OPKWWECIYOPKWIRG
Encryption/Decryption Process
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
37
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
38
Stream Ciphers
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
39
Block Ciphers
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
40
Stream Block
Advantages Speed of High diff usion
transformation
Immunity to
Low error insertion of
propagation symbol
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
41
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
42
Symmetric
Overview
DES
Invented by IBM
In 1976 became an official Federal Information
Processing Standard (FIPS) NIST
Effective key length 56-bit (Key used was 64 bit)
Double DES, Triple DES
Controversy
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Symmetric: Rise of the AES
49
Second place
Designed by Ross Anderson, Eli
Biham and Lars Knudsen
Substitution-Permutation Network
• S-boxes: transform input bits into
output bits
• P-boxes: permute or transpose bits
across S-box inputs.
50
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
54
Digital Signature
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Cryptographic Checksums
• A checksum is a count of the number of bits in a transmission unit
that is included with the unit so that the receiver can check to see
whether the same number of bits arrived. If the counts match, it's
assumed that the complete transmission was received.
• Mathematical function to generate a set of k bits from a set of n
bits (where k ≤ n).
56
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
58
Summary
• Users can authenticate using something they know,
something they are, or something they have
• Systems may use a variety of mechanisms to implement
access control
• Encryption helps prevent attackers from revealing,
modifying, or fabricating messages
• Symmetric and asymmetric encryption have
complementary strengths and weaknesses
• Certificates bind identities to digital signatures
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.
Cryptography/Cryptology
Quiz Goes Live at 3 PM!