Chapter Lecture 1 & 2
Chapter Lecture 1 & 2
CRYPTOGRAPH
Y
AND
D R. FAHEEM MUSHTAQ
NETWORK
SECURITY
Integrity:
Integrity means that changes in information needs
to be done only by authorized users and through
authorized mechanisms.
Availability:
Means the information needs to be available to
authorized entities when it is required.
Taxonomy of
ATTACKS
CRYPTOGRAPH with Relation to Security Goals
Y
AND
D R. FAHEEM MUSHTAQ
NETWORK
SECURITY
Snooping
Refers to unauthorized access to or interception of data.
Traffic analysis
Refers to obtaining some other type of information by monitoring
online traffic.
Other type of information may include email addresses of sender and
receiver, frequency of communication to help for guessing nature of
transaction.
Attacks Threatening Integrity:
Modification
Means that the attacker intercepts the message and changes it
Masquerading or spoofing
Happens when the attacker impersonates somebody else.
Replaying
Means the attacker obtains a copy of a message sent by a user and
later tries to replay it.
Repudiation Means that sender of the message might later deny that
she has sent the message; the receiver of the message might later deny
that he has received the message.
Attacks Threatening Availability:
Denial of service (DoS) is a very common attack. It may slow down
or totally interrupt the service of a system.
PASSIVE
VERSUS
CRYPTOGRAPH ACTIVE ATTACK
Y
AND
D R. FAHEEM MUSHTAQ
NETWORK
SECURITY
Cryptography
Steganography
Cryptography vs Steganography
Computational security
Cost exceed the value of information
Time exceeds the useful life of information
Cryptanalysis
General approaches:
Cryptanalytic attack
Brute-force attack
Cryptanalytic Attacks
Ciphertext only
• Only know algorithm & ciphertext, is statistical, can
identify plaintext
Known plaintext
• Also have plaintext for the ciphertext
Chosen plaintext
• Also can select plaintext and obtain ciphertext
Chosen ciphertext
• Also can select ciphertext and obtain plaintext
Brute Force Search
always possible to simply try every key
most basic attack, proportional to key size
assume either know / recognise plaintext
128 2128 = 3.4 1038 2127 µs = 5.4 1024 5.4 1018 years
years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 5.9 1030 years
years
26 characters 26! = 4 1026 2 1026 µs = 6.4 6.4 106 years
permutation 1012 years