Chapter 1
Chapter 1
Introduction
Objectives
To define three security goals
To define security attacks that threaten security
goals
To define security services and how they are
related to the three security goals
To define security mechanisms to provide security
services
To introduce two techniques, cryptography and
steganography, to implement security mechanisms.
Backgrounds
Information Security requirements have
changed in recent times
Traditionally provided by physical and
administrative mechanisms
Computer use requires automated tools to
protect files and other stored information
The use of networks and communications
links requires measures to protect data
during transmission
Definitions
Confidentiality Availability
1-1 SECURITY GOALS
RFC 2828:
“a processing or communication service
provided by a system to give a specific kind of
protection to system resources”
1.3.2 Security Services X.800
password=ucIb()w1V
mother=Jones
human with fingers pet=Caesar
and eyes
Communication
Sender Recipient
channel
encrypt decrypt
ciphertext plaintext
plaintext
shared shared
secret secret
key key
Attacker
(eavesdropping)
1.4.2 Steganography
• The word steganography, with origin in Greek, means “covered writing,” in contrast
with cryptography, which means “secret writing.”
• It involves embedding data within other, non-secret, files or media
in such a way that no one apart from the intended recipient knows
of the existence of the hidden information.