Block 3
Block 3
Notes
Structure:
3.1 Network Security Issues
3.1.1 IT Manager and Network Administrator Role
3.1.2 Reasons of Security Issues to Networks
3.1.3 Recommended Steps for Network Safety
3.2 Threats and Solutions
3.3 Cryptography
3.3.1 Hieroglyph í The Oldest Cryptographic Technique
3.3.2 Steganography
3.3.3 Evolution of Cryptography
3.3.4 Characteristics of Modern Cryptography
3.3.5 Context of Cryptography
3.3.6 Security Services of Cryptography
3.3.7 Cryptography Primitives
3.3.8 Components of a Cryptosystem
3.3.9 Types of Cryptosystems
3.3.10 Relation between Encryption Schemes
3.3.11 Kerckhoff’s Principle for Cryptosystem
3.3.12 Details of the Encryption Scheme
3.3.13 Earlier Cryptographic Systems
3.4 Summary
3.5 Check Your Progress
3.6 Questions and Exercises
3.7 Key Terms
3.8 Check Your Progress: Answers
3.9 Case Study
3.10 Further Readings
Objectives
After studying this unit, you should be able to understand:
Ɣ Network security issues
Ɣ About cryptography algorithm
Ɣ Encryption
Ɣ Crypto analysis
Ɣ Methods for breaking cryptography algorithm
Ɣ A case study based on this unit
Overview Notes
The unprecedented connectivity of the Internet age has led to enormous social and
economic benefits, but has also introduced numerous new challenges. In a fully
connected world, security threats continue to evolve, keeping ahead of the most
advanced defenses.
Background
Network-based security threats have led to widespread identity theft and financial
fraud. Spam, viruses and spyware cause significant problems for consumers and
businesses. A security breach may irreparably damage a company’s brand or reputation.
In the US, security issues threaten to slow the national adoption of electronic medical
records. In the EU, consumer confidence regarding security and data protection is a
barrier to the more rapid expansion of e-commerce across member state borders.
Today’s information attacks are a profitable business enterprise and are often
controlled by organized crime syndicates. A growing number of sophisticated cyber crime
business models, including the emergence of criminal enterprises, are built around
selling tools and services for launching network attacks, rather than simply selling
information gained from attacks.
Security technology continues to advance, changing from passive, point
product-based to active, end-to-end approaches to security recognition, containment,
and quarantine. In addition, Internet Service Providers (ISPs) are competing on security
and consumer ISPs offer security as part of their service.
Policymakers around the world are focused on the state of the information
infrastructure. Policymakers want to ensure that users of networks employ the best
technology and process practices to make networks as secure as possible. Governments
and businesses continually update their strategies to prevent attacks, and public-private
partnerships have been formed to develop voluntary, market-based approaches to
security.
Cisco’s Position
Cisco believes that governments can help decrease cyber security threats by:
Ɣ Raising consumer and industry awareness of the importance of network security
Ɣ Educating users about best practices
Ɣ Using best practices to secure their own systems
Ɣ Funding long-term research and development
Ɣ Aggressively enforcing the laws against cyber crime and prosecuting criminals
that use or attempt to use the network for theft, fraud, extortion, or other crimes
Ɣ Increasing cooperation at an international level with other governments, law
enforcement agencies, and the private sector on the socialization of best
practices and international prosecution of cyber crime
Cisco does not believe that governments should regulate security. In general, regulation:
Ɣ Stifles innovation by picking and choosing specific technology, rather than
letting market competition develop the best and most advanced solutions
Ɣ Does not advance quickly enough to keep pace with current industry needs
and newly posed threats
Ɣ May actually decrease Internet security by creating specific points for systemic
failure
Reliable: Computer networks are reliable when safety of the data is concerned. If
Notes
one of the attached system collapse, same data can be gathered from another system
attached to the same network.
Data transmission: Data is transferred at the fast speed even in the scenarios
when one or two terminals machine fails to work properly. Data transmission is seldom
affected in the computer networks. Almost complete communication can be achieved in
critical scenarios too.
Provides broader view: First and far most important task which is required to be
done after developing a network on any scale is to protect the network. This section will
cover network security, and solutions, tips to avoid anti-spamming, trojans, viruses,
malware, etc. All networks face one or more issues mentioned above. It is computer
network administrator or IT manager job to keep himself updated regarding latest threats
and maintaining the computer networks.
It is right of the users of the network to get smooth working network system, without
any interruption by annoying messages or experience slow communication between
computers. This is only possible if network administrator keep the network secure for
malicious software, worms and other threats. Keeping different biometrics and using
authentication procedures can help to only certain levels. Hackers and intruders are
always on search to get some loopholes to exploit corporate sector including financial
data and other sensitive information. In all scenarios, data integrity and security can
never be compromised. Therefore, keeping network secure and running flawlessly,
IT manager and computer network administrator needs to be on monitoring ends all the
time.
NA should install it. Providing admin information to anyone else for assistance
Notes
can be very risky.
(e) Older known threats can attack again. It should be kept in mind of NA to keep
computer network secure from latest ones and should also be secured from
previously known attacks. Windows known services Talnet and Clipbook
should not be disabled. They have certain task to perform. Do not disable any
default service until you are sure and you know what you are doing.
(f) Create, configure and implement security policies. Implementing security
policies can be useful in keeping network secure. Keep network users
educated on these policies and make sure to send out notice to all clients if any
updates are made in these policies. These security measures are useful and
come with prices. Deploying, maintaining and implementing all these
methodologies can increase security costs. NA should be very careful in
following above-mentioned points. He should also regularly update network
users for latest threats and what should and should not be done for keep things
smooth and secure. He should also help network users to assist in unwanted
e-mails which can be risky to network administrators.
know. Be skeptical of any company that doesn’t clearly state its name, physical address
Notes
and telephone number.
Spam: Spam is the commonly used term for unsolicited e-mail or the action of
broadcasting unsolicited advertising messages via e-mail. Spam is usually harmless, but
it can be a nuisance, taking up people’s time and storage space on their computer.
Security Tools: Once you understand the threats, putting the proper safeguards in
place becomes much easier. You have an extensive choice of technologies, ranging from
anti-virus software packages to firewalls for providing protection. With all the options
currently available, it is possible to implement proper computer security without
compromising the need for quick and easy access to information.
Anti-virus Software: Virus protection software can counter most virus threats if the
software is regularly updated and correctly maintained. Anti-virus software relies on a
vast network of users to provide early warnings of new viruses, so that antidotes can be
developed and distributed quickly. With thousands of new viruses being generated every
month, it is essential that the virus database be kept up-to-date. The virus database is the
record held by the anti-virus package that helps it identify known viruses when they
attempt to strike. The software can prompt users to periodically collect new data. It is
essential to update your anti-virus software regularly.
Security Policies: Organizations, both large and small, need to craft computer
security policies. Security policies can be rules that are electronically programmed and
stored within computer security equipment as well as written or verbal regulations by
which an organization operates. Written policies as basic as warning computer users
against posting their passwords in work areas can often pre-empt security breaches.
Customers or suppliers with access to certain parts of the network need to be adequately
regulated by the policies as well.
Passwords: Making sure that your computer system is password protected is the
simplest and most common way to ensure that only those that have permission can enter
your computer or certain parts of your computer network. However, the most powerful
network security infrastructures are virtually ineffective if people do not protect their
passwords. Many users choose easily remembered numbers or words as passwords,
such as birthdays, phone numbers, or pets’ names, and others never change their
passwords and are not very careful about keeping them secret. The golden rules, or
policies for passwords are:
Ɣ Make passwords as meaningless as possible
Ɣ Change passwords regularly
Ɣ Never divulge passwords to anyone
Firewalls: A firewall is a hardware or software solution to enforce security policies.
In the physical security analogy, a firewall is equivalent to a door lock on a perimeter door
or on a door to a room inside of the building – it permits only authorized users such as
those with a key or access card to enter. A firewall has built-in filters that can disallow
unauthorized or potentially dangerous material from entering the system. It also logs
attempted intrusions.
Make sure you have anti-virus software on your computer! Anti-virus software is
designed to protect you and your computer against known viruses. So, you don’t have to
worry. But with new viruses emerging daily, anti-virus programs need regular updates, like
annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software
regularly! The more often you keep it updated, say once a week, the better. Check with the
website of your anti-virus software company to see some sample descriptions of viruses
and to get regular updates for your software. Stop viruses in their tracks!
install the patches! Check your software vendors’ websites on a regular basis for new
Notes
security patches or use the new automated patching features that some companies offer.
If you don’t have the time to do the work yourself, download and install a utility program to
do it for you. There are available software programs that can perform this task for you.
Stay informed!
Check your security on a regular basis: When you change your clocks for
daylight savings time, reevaluate your computer security. The programs and operating
system on your computer have many valuable features that make your life easier, but
can also leave you vulnerable to hackers and viruses. You should evaluate your
computer security at least twice a year – do it when you change the clocks for daylight
savings! Look at the settings on applications that you have on your computer. Your
browser software, for example, typically has a security setting in its preferences area.
Check what settings you have and make sure you have the security level appropriate for
you. Set a high bar for yourself!
Make sure your family members and/or your employees know what to do if
your computer becomes infected: It’s important that everyone who uses a computer
be aware of proper security practices. People should know how to update virus protection
software, how to download security patches from software vendors and how to create a
proper password. Make sure they know these tips too!
3.3 Cryptography
The art of cryptography is considered to be born along with the art of writing. As
civilizations evolved, human beings got organized in tribes, groups, and kingdoms. This
led to the emergence of ideas such as power, battles, supremacy, and politics. These
ideas further fueled the natural need of people to communicate secretly with selective
recipient which in turn ensured the continuous evolution of cryptography as well.
The roots of cryptography are found in Roman and Egyptian civilizations.
a t t a c k a t d a w n
c v v c e m c v f c y p
Secret Message
3.3.2 Steganography
Steganography is similar but adds another dimension to Cryptography. In this
method, people not only want to protect the secrecy of an information by concealing it,
but they also want to make sure any unauthorized person gets no evidence that the
information even exists. For example, invisible watermarking.
In steganography, an unintended recipient or an intruder is unaware of the fact that
observed data contains hidden information. In cryptography, an intruder is normally
aware that data is being communicated, because they can see the coded/scrambled
message.
Embedding data
With the advances taking place in this field, government organizations, military units,
Notes
and some corporate houses started adopting the applications of cryptography. They used
cryptography to guard their secrets from others. Now, the arrival of computers and the
Internet has brought effective cryptography within the reach of common people.
Modern cryptography is the cornerstone of computer and communications security.
Its foundation is based on various concepts of mathematics such as number theory,
computational complexity theory, and probability theory.
Cryptology
Cryptography Cryptanalysis
What is Cryptography?
Cryptography is the art and science of making a cryptosystem that is capable of
providing information security.
Cryptography deals with the actual securing of digital data. It refers to the design of
mechanisms based on mathematical algorithms that provide fundamental information
security services. You can think of cryptography as the establishment of a large toolkit
containing different techniques in security applications.
Note: Cryptographic primitives are intricately related and they are often combined to achieve a set
of desired security services from a cryptosystem.
A cryptosystem is an implementation of cryptographic techniques and their
accompanying infrastructure to provide information security services. A cryptosystem is
also referred to as a cipher system.
Let us discuss a simple model of a cryptosystem that provides confidentiality to the
information being transmitted. This basic model is depicted in the illustration below:
Sender Receiver
Interceptor
The illustration shows a sender who wants to transfer some sensitive data to a receiver
in such a way that any party intercepting or eavesdropping on the communication channel
cannot extract the data.
The objective of this simple cryptosystem is that at the end of the process, only the
sender and the receiver will know the plaintext.
ciphertext
plain Decrypt plain
Encrypt
text text
Insecure Communication
Channel
Prior to 1970, all cryptosystems employed symmetric key encryption. Even today, its
relevance is very high and it is being used extensively in many cryptosystems. It is very
unlikely that this encryption will fade away, as it has certain advantages over asymmetric
key encryption.
The salient features of cryptosystem based on symmetric key encryption are í
Ɣ Persons using symmetric key encryption must share a common key prior to
exchange of information.
Ɣ Keys are recommended to be changed regularly to prevent any attack on the
system.
Ɣ A robust mechanism needs to exist to exchange the key between the
communicating parties. As keys are required to be changed regularly, this
mechanism becomes expensive and cumbersome.
Ɣ In a group of n people, to enable two-party communication between any two
persons, the number of keys required for group is n × (n – 1)/2.
Ɣ Length of Key (number of bits) in this encryption is smaller and hence, process
of encryption-decryption is faster than asymmetric key encryption.
Ɣ Processing power of computer system required to run symmetric algorithm is
less.
Challenges of Symmetric Key Cryptosystem
There are two restrictive challenges of employing symmetric key cryptography.
Ɣ Key establishment í Before any communication, both the sender and the
receiver need to agree on a secret symmetric key. It requires a secure key
establishment mechanism in place.
Ɣ Trust Issue í Since the sender and the receiver use the same symmetric key,
there is an implicit requirement that the sender and the receiver ‘trust’ each
other. For example, it may happen that the receiver has lost the key to an
attacker and the sender is not informed.
These two challenges are highly restraining for modern day communication. Today,
people need to exchange information with non-familiar and non-trusted parties. For
example, a communication between online seller and customer. These limitations of
symmetric key encryption gave rise to asymmetric key encryption schemes.
Repository
Reliable
Host 1 (Sender) Host 2 (Receiver)
Distribution
Private Key Channel Private Key
Public Key
(Host 1) (Host 2) (Host 2)
plain plain
Encrypt Decrypt text
text
Asymmetric Key Encryption was invented in the 20th century to come over the
necessity of pre-shared secret key between communicating persons. The salient
features of this encryption scheme are as follows:
Ɣ Every user in this system needs to have a pair of dissimilar keys, private key
and public key. These keys are mathematically related í when one key is
used for encryption, the other can decrypt the Ciphertext back to the original
plaintext.
Ɣ It requires to put the public key in public repository and the private key as a
well-guarded secret. Hence, this scheme of encryption is also called Public
Key Encryption.
Ɣ Though public and private keys of the user are related, it is computationally not
feasible to find one from another. This is a strength of this scheme.
Ɣ When Host1 needs to send data to Host2, he obtains the public key of Host2
from repository, encrypts the data, and transmits.
Ɣ Host2 uses his private key to extract the plaintext.
Ɣ Length of Keys (number of bits) in this encryption is large and hence, the
process of encryption-decryption is slower than symmetric key encryption.
Ɣ Processing power of computer system required to run asymmetric algorithm is
higher.
Symmetric cryptosystems are a natural concept. In contrast, public key cryptosystems
are quite difficult to comprehend.
You may think, how can the encryption key and the decryption key are ‘related’, and
yet it is impossible to determine the decryption key from the encryption key? The answer
lies in the mathematical concepts. It is possible to design a cryptosystem whose keys
have this property. The concept of public key cryptography is relatively new. There are
fewer public key algorithms known than symmetric algorithms.
Due to the advantages and disadvantages of both the systems, symmetric key and
public key cryptosystems are often used together in the practical information security
systems.
Availability of Ciphertext
We know that once the plaintext is encrypted into ciphertext, it is put on unsecure
public channel (say e-mail) for transmission. Thus, the attacker can obviously assume
that it has access to the Ciphertext generated by the cryptosystem.
Cryptographic Attacks
The basic intention of an attacker is to break a cryptosystem and to find the plaintext
from the ciphertext. To obtain the plaintext, the attacker only needs to find out the secret
decryption key, as the algorithm is already in public domain.
Hence, he applies maximum effort towards finding out the secret key used in the
cryptosystem. Once the attacker is able to determine the key, the attacked system is
considered as broken or compromised.
Based on the methodology used, attacks on cryptosystems are categorized as
follows:
Ɣ Ciphertext Only Attacks (COA): In this method, the attacker has access to a
set of ciphertext(s). He does not have access to corresponding plaintext. COA is
said to be successful when the corresponding plaintext can be determined from
a given set of ciphertext. Occasionally, the encryption key can be determined
Practicality of Attacks
The attacks on cryptosystems described here are highly academic, as majority of
them come from the academic community. In fact, many academic attacks involve quite
unrealistic assumptions about environment as well as the capabilities of the attacker. For
example, in chosen-Ciphertext attack, the attacker requires an impractical number of
deliberately chosen plaintext-Ciphertext pairs. It may not be practical altogether.
Nonetheless, the fact that any attack exists should be a cause of concern,
particularly if the attack technique has the potential for improvement.
Caesar Cipher
It is a mono-alphabetic cipher wherein each letter of the plaintext is substituted by
another letter to form the ciphertext. It is a simplest form of substitution cipher scheme.
This cryptosystem is generally referred to as the Shift Cipher. The concept is to
replace each alphabet by another alphabet which is ‘shifted’ by some fixed number
between 0 and 25.
For this type of scheme, both sender and receiver agree on a ‘secret shift number’
for shifting the alphabet. This number which is between 0 and 25 becomes the key of
encryption.
The name ‘Caesar Cipher’ is occasionally used to describe the Shift Cipher when
the ‘shift of three’ is used.
Process of Shift Cipher
Ɣ In order to encrypt a plaintext letter, the sender positions the sliding ruler
underneath the first set of plaintext letters and slides it to LEFT by the number
of positions of the secret shift.
Ɣ The plaintext letter is then encrypted to the Ciphertext letter on the sliding ruler
underneath. The result of this process is depicted in the following illustration for
an agreed shift of three positions. In this case, the plaintext ‘tutorial’ is
encrypted to the Ciphertext ‘WXWRULDO’. Here is the Ciphertext alphabet for
a Shift of 3:
Plaintext Alphabet a b c d e f g h i j k l m n o p q r s t u v w x y z
Notes
Ciphertext Alphabet D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Ɣ On receiving the ciphertext, the receiver who also knows the secret shift,
positions his sliding ruler underneath the Ciphertext alphabet and slides it to
RIGHT by the agreed shift number, 3 in this case.
Ɣ He then replaces the Ciphertext letter by the plaintext letter on the sliding ruler
underneath. Hence, the Ciphertext ‘WXWRULDO’ is decrypted to ‘tutorial’. To
decrypt a message encoded with a Shift of 3, generate the plaintext alphabet
using a shift of ‘–3’ as shown below:
Ciphertext Alphabet A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Plaintext Alphabet x y z a b c d e f g h i j k l m n o p q r s t u v w
Security Value
Caesar Cipher is not a secure cryptosystem because there are only 26 possible
keys to try out. An attacker can carry out an exhaustive key search with available limited
computing resources.
Plaintext Alphabet A b c d e f g h i j k l m n o p q r s t u v w x y z
Ciphertext Alphabet K D G F N S L V B W A H E X J M Q C P Z R T Y I U O
Ɣ On receiving the ciphertext, the receiver, who also knows the randomly chosen
permutation, replaces each Ciphertext letter on the bottom row with the
corresponding plaintext letter in the top row. The Ciphertext ‘MJBXZ’ is
decrypted to ‘point’.
Security Value
Simple Substitution Cipher is a considerable improvement over the Caesar Cipher.
The possible number of keys is large (26!) and even the modern computing systems are
not yet powerful enough to comfortably launch a brute force attack to break the system.
Playfair Cipher
In this scheme, pairs of letters are encrypted, instead of single letters as in the case
of simple substitution cipher.
In playfair cipher, initially a key table is created. The key table is a 5 × 5 grid of
alphabets that acts as the key for encrypting the plaintext. Each of the 25 alphabets must
be unique and one letter of the alphabet (usually J) is omitted from the table as we need
only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced by I.
The sender and the receiver deicide on a particular key, say ‘tutorials’. In a key table,
the first characters (going left to right) in the table is the phrase, excluding the duplicate
letters. The rest of the table will be filled with the remaining letters of the alphabet, in
natural order. The key table works out to be:
T U O R I
A L S B C
D E F G H
K M N P Q
V W X Y Z
Ɣ If both letters are in the same row, take the letter to the right of each one (going
back to the left if at the farthest right).
T U O R I Notes
A L S B C
‘D’ and ‘E’ are in same row, hence take letter to the right of them
D E F G H
to replace. DE ĺ EF.
K M N P Q
V W X Y Z
Ɣ If neither of the preceding two rules are true, form a rectangle with the two
letters and take the letters on the horizontal opposite corner of the rectangle.
T U O R I ‘M’ and ‘O’ nor on same column or same row, hence from
A L S B C rectangle as shown, and replace letter by picking up opposite
corner letter on same row MO ĺ NU.
D E F G H
K M N P Q
V W X Y Z
Using these rules, the result of the encryption of ‘hide money’ with the key of
‘tutorials’ would be:
QC EF NU MF ZV
Decrypting the Playfair cipher is as simple as doing the same process in reverse.
Receiver has the same key and can create the same key table, and then decrypt any
messages made using that key.
Security Value
It is also a substitution cipher and is difficult to break compared to the simple
substitution cipher. As in case of substitution cipher, cryptanalysis is possible on the
Playfair cipher as well, however it would be against 625 possible pairs of letters (25 × 25
alphabets) instead of 26 different possible alphabets.
The Playfair cipher was used mainly to protect important, yet non-critical secrets, as
it is quick to use and requires no special equipment.
Vigenere Cipher
This scheme of cipher uses a text string (say, a word) as a key, which is then used
for doing a number of shifts on the plaintext.
For example, let’s assume the key is ‘point’. Each alphabet of the key is converted to
its respective numeric value: In this case,
p ĺ 16, o ĺ 15, i ĺ 9, n ĺ 14, and t ĺ 20.
Thus, the key is: 16 15 9 14 20.
Process of Vigenere Cipher
Ɣ The sender and the receiver decide on a key. Say ‘point’ is the key. Numeric
representation of this key is ‘16 15 9 14 20’.
Ɣ The sender wants to encrypt the message, say ‘attack from south east’. He will
arrange plaintext and numeric key as follows:
a t t a c k f r o m s o u t h e a s t
16 15 9 14 20 16 15 9 14 20 16 15 9 14 20 16 15 9 14
Ɣ He now shifts each plaintext alphabet by the number written below it to create
Ciphertext as shown below:
a t t a c k f r o m s o u t h e a s t
Notes
16 15 9 14 20 16 15 9 14 20 16 15 9 14 20 16 15 9 14
Q I C O W A U A C G I D D H B U P B H
Ɣ Here, each plaintext character has been shifted by a different amount – and
that amount is determined by the key. The key must be less than or equal to
the size of the message.
Ɣ For decryption, the receiver uses the same key and shifts received Ciphertext
in reverse order to obtain the plaintext.
Q I C O W A U A C G I D D H B U P B H
16 15 9 14 20 16 15 9 14 20 16 15 9 14 20 16 15 9 14
a t t a c k f r o m s o u t h e a s t
Security Value
Vigenere Cipher was designed by tweaking the standard Caesar cipher to reduce
the effectiveness of cryptanalysis on the Ciphertext and make a cryptosystem more
robust. It is significantly more secure than a regular Caesar Cipher.
In the history, it was regularly used for protecting sensitive political and military
information. It was referred to as the unbreakable cipher due to the difficulty it posed to
the cryptanalysis.
Variants of Vigenere Cipher
There are two special cases of Vigenere cipher:
Ɣ The keyword length is same as plaintext message. This case is called Vernam
Cipher. It is more secure than typical Vigenere cipher.
Ɣ Vigenere cipher becomes a cryptosystem with perfect secrecy, which is called
One-time Pad.
One-time Pad
The circumstances are:
Ɣ The length of the keyword is same as the length of the plaintext.
Ɣ The keyword is a randomly generated string of alphabets.
Ɣ The keyword is used only once.
Security Value
Let us compare Shift cipher with one-time pad.
Shift Cipher í Easy to Break
In case of Shift cipher, the entire message could have had a shift between 1 and 25.
This is a very small size, and very easy to brute force. However, with each character now
having its own individual shift between 1 and 26, the possible keys grow exponentially for
the message.
One-time Pad í Impossible to Break
Let us say, we encrypt the name “point” with a one-time pad. It is a 5-letter text. To
break the Ciphertext by brute force, you need to try all possibilities of keys and conduct
computation for (26 × 26 × 26 × 26 × 26) = 265 = 11881376 times. That’s for a message
with 5 alphabets. Thus, for a longer message, the computation grows exponentially with
every additional alphabet. This makes it computationally impossible to break the
Ciphertext by brute force.
Transposition Cipher
Notes
It is another type of cipher where the order of the alphabets in the plaintext is
rearranged to create the ciphertext. The actual plaintext alphabets are not replaced.
An example is a ‘simple columnar transposition’ cipher where the plaintext is written
horizontally with a certain alphabet width. Then the Ciphertext is read vertically as shown.
For example, the plaintext is “golden statue is in eleventh cave” and the secret
random key chosen is “five”. We arrange this text horizontally in table with number of
column equal to key value. The resulting text is shown below.
g o l d e
n s t a t
u e i s i
n e l e v
e n t h c
a v e
The Ciphertext is obtained by reading column vertically downward from first to last
column. The Ciphertext is ‘gnuneaoseenvltiltedasehetivc’.
To decrypt, the receiver prepares similar table. The number of columns is equal to
key number. The number of rows is obtained by dividing number of total Ciphertext
alphabets by key value and rounding of the quotient to next integer value.
The receiver then writes the received Ciphertext vertically down and from left to right
column. To obtain the text, he reads horizontally left to right and from top to bottom row.
Digital data is represented in strings of binary digits (bits) unlike alphabets. Modern
cryptosystems need to process this binary strings to convert in to another binary string.
Based on how these binary strings are processed, a symmetric encryption schemes can
be classified into:
Block Ciphers
In this scheme, the plain binary text is processed in blocks (groups) of bits at a time;
i.e., a block of plaintext bits is selected, a series of operations is performed on this block
to generate a block of Ciphertext bits. The number of bits in a block is fixed. For example,
the schemes DES and AES have block sizes of 64 and 128, respectively.
Stream Ciphers
In this scheme, the plaintext is processed one bit at a time, i.e., one bit of plaintext is
taken, and a series of operations is performed on it to generate one bit of ciphertext.
Technically, stream ciphers are block ciphers with a block size of one bit.
Plaintext
Block n Plaintext
Plaintext Ciphertext
Block 2 Encryption
Block 1 Block n Ciphertext
Function
Block 2 Ciphertext
Block 1
Stream Cipher
Key
Key
Generator
Bit stream 101011000101110110010
Bit Ciphertext
Plaintext 110010001010
Function 100110101101
Plaintext block
(Divide into two halves, L and R)
Round Keys
L R
K1
Round1
F(K,R)
L R
K2
Round2
F(K,R)
L R
Kn
Roundn
F(K,R)
Ciphertext block
Ɣ The input block to each round is divided into two halves that can be denoted as
L and R for the left half and the right half.
Ɣ In each round, the right half of the block, R, goes through unchanged. But the
left half, L, goes through an operation that depends on R and the encryption
key. First, we apply an encrypting function ‘f’ that takes two input í the key K
and R. The function produces the output f(R,K). Then, we XOR the output of
the mathematical function with L.
Ɣ In real implementation of the Feistel Cipher, such as DES, instead of using the
whole encryption key during each round, a round-dependent key (a subkey) is
derived from the encryption key. This means that each round uses a different
key, although all these subkeys are related to the original key.
Ɣ The permutation step at the end of each round swaps the modified L and
unmodified R. Therefore, the L for the next round would be R of the current
round. And R for the next round be the output L of the current round.
Ɣ Above substitution and permutation steps form a ‘round’. The number of
rounds are specified by the algorithm design.
Ɣ Once the last round is completed, then the two subblocks, ‘R’ and ‘L’ are
Notes
concatenated in this order to form the Ciphertext block.
The difficult part of designing a Feistel Cipher is selection of round function ‘f’. In
order to be unbreakable scheme, this function needs to have several important
properties that are beyond the scope of our discussion.
Decryption Process
The process of decryption in Feistel cipher is almost similar. Instead of starting with
a block of plaintext, the Ciphertextblock is fed into the start of the Feistel structure and
then the process thereafter is exactly the same as described in the given illustration.
The process is said to be almost similar and not exactly same. In the case of
decryption, the only difference is that the subkeys used in encryption are used in the
reverse order.
The final swapping of ‘L’ and ‘R’ in last step of the Feistel Cipher is essential. If these
are not swapped, then the resulting Ciphertextcould not be decrypted using the same
algorithm.
Number of Rounds
The number of rounds used in a Feistel Cipher depends on desired security from the
system. More number of rounds provide more secure system. But at the same time, more
rounds mean the inefficient slow encryption and decryption processes. Number of rounds
in the systems, thus, depend upon efficiency-security trade-off.
The Data Encryption Standard (DES) is a symmetric key block cipher published by
the National Institute of Standards and Technology (NIST).
DES is an implementation of a Feistel Cipher. It uses 16 round Feistel structure. The
block size is 64-bit. Though key length is 64-bit, DES has an effective key length of
56 bits, since 8 of the 64 bits of the key are not used by the encryption algorithm (function
as check bits only). General Structure of DES is depicted in the following illustration:
64-bit plaintext
DES
Initial permutation
K1
Round 1
48-bit
Round-key generator
K2
Round 2
48-bit 56-bit cipher key
K16
Round 16
48-bit
Final permutation
64-bit ciphertext
1 2 8 25 40 58 64
Initial
Permutation
1 2 8 25 40 58 64
16 Round
1 2 8 25 40 58 64
Final
Permutation
1 2 8 25 40 58 64
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key
to the rightmost 32 bits to produce a 32-bit output.
In
f (RI–1, KI)
32 bits
Expansion P-box
48 bits
48 bits
S-Boxes
32 bits
Straight P-box
32 bits
Out
Ɣ Expansion Permutation Box: Since right input is 32-bit and round key is a
48-bit, we first need to expand right input to 48-bits. Permutation logic is Notes
graphically depicted in the following illustration:
From bit 32 From bit 1
32-bit input
32 01 02 03 04 05
04 05 06 07 08 09
08 09 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 31 31 32 01
Ɣ XOR (Whitener): After the expansion permutation, DES does XOR operation
on the expanded right section and the round key. The round key is used only in
this operation.
Ɣ Substitution Boxes: The S-boxes carry out the real mixing (confusion). DES
uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the following
illustration:
48-bit input
Array of S-Boxes
32-bit output
S-box
16 07 20 21 29 12 28 17
01 15 23 26 05 18 31 10
02 08 24 14 32 27 03 09
19 13 30 06 22 11 04 25
Key Generation
The round key generator creates sixteen 48-bit keys out of a 56-bit cipher key. The
process of key generation is depicted in the following illustration:
Key with
parity bits
(64-bits
Parity drop
Rounds Shift
1, 2, 9, 16 one bit 28 bits 28 bits
Others two bits
Shift left Shift left
28 bits 28 bits
Compression
P-box
48 bits
Round Key 1
28 bits 28 bits
Compression
P-box
48 bits
Round Key 2
28 bits 28 bits
Compression
P-box
Round Key 16 48 bits
The logic for Parity Drop, Shifting and Compression P-box is given in the DES
description.
DES Analysis
Notes
The DES satisfies both the desired properties of block cipher. These two properties
make cipher very strong.
Ɣ Avalanche effect: A small change in plaintext results in the very great change
in the ciphertext.
Ɣ Completeness: Each bit of Ciphertext depends on many bits of plaintext.
During the last few years, cryptanalysis have found some weaknesses in DES when
key selected are weak keys. These keys shall be avoided.
DES has proved to be a very well designed block cipher. There have been no
significant cryptanalytic attacks on DES other than exhaustive key search.
The speed of exhaustive key searches against DES after 1990 began to cause
discomfort amongst users of DES. However, users did not want to replace DES as it
takes an enormous amount of time and money to change encryption algorithms that are
widely adopted and embedded in large security architectures.
The pragmatic approach was not to abandon the DES completely, but to change the
manner in which DES is used. This led to the modified schemes of Triple DES
(sometimes known as 3DES).
Incidentally, there are two variants of Triple DES known as 3-key Triple DES
(3TDES) and 2-key Triple DES (2TDES).
3-key Triple DES
Before using 3TDES, user first generate and distribute a 3TDES key k, which
consists of three different DES keys k1, k2 and k3. This means that the actual 3TDES key
has length 3 × 56 = 168 bits. The encryption scheme is illustrated as follows:
DES DES
cipher k1 reverse cipher
DES DES
reverse cipher k2 cipher
DES DES
cipher k1 reverse cipher
Digital Signature
Digital signatures are the public key primitives of message authentication. In the
physical world, it is common to use handwritten signatures on handwritten or typed
messages. They are used to bind signatory to the message.
Similarly, a digital signature is a technique that binds a person/entity to the digital
data. This binding can be independently verified by receiver as well as any third party.
Digital signature is a cryptographic value that is calculated from the data and a
secret key known only by the signer.
In real world, the receiver of message needs assurance that the message belongs
to the sender and he should not be able to repudiate the origination of that message. This
requirement is very crucial in business applications, since likelihood of a dispute over
exchanged data is very high.
Model of Digital Signature
As mentioned earlier, the digital signature scheme is based on public key
cryptography. The model of digital signature scheme is depicted in the following
illustration:
Signer’s Hashing
Private Function
Data Key
Equal?
Data
Hashing Signature Verification
Function Algorithm Signature Algorithm Hash
Signer’s
Hash Public
Key
Sender’s Side
Encryption using
Data Encrypted Data
Receiver’s public key
+
Digital Signature
Hashing
Function
The receiver after receiving the encrypted data and signature on it, first verifies the
Notes
signature using sender’s public key. After ensuring the validity of the signature, he then
retrieves the data through decryption using his private key.
Cryptography – Benefits
Cryptography is an essential information security tool. It provides the four most
basic services of information security:
Ɣ Confidentiality: Encryption technique can guard the information and
communication from unauthorized revelation and access of information.
Ɣ Authentication: The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
Ɣ Data integrity: The cryptographic hash functions are playing vital role in
assuring the users about the data integrity.
Ɣ Non-repudiation: The digital signature provides the non-repudiation service to
guard against the dispute that may arise due to denial of passing message by
the sender.
All these fundamental services offered by cryptography has enabled the conduct of
business over the networks using the computer systems in extremely efficient and
effective manner.
Cryptography – Drawbacks
Apart from the four fundamental elements of information security, there are other
issues that affect the effective use of information:
Ɣ A strongly encrypted, authentic, and digitally signed information can be
difficult to access even for a legitimate user at a crucial time of
decision-making. The network or the computer system can be attacked and
rendered non-functional by an intruder.
Ɣ High availability, one of the fundamental aspects of information security,
cannot be ensured through the use of cryptography. Other methods are
needed to guard against the threats such as denial-of-service or complete
breakdown of information system.
Ɣ Another fundamental need of information security of selective access control
also cannot be realized through the use of cryptography. Administrative
controls and procedures are required to be exercised for the same.
Ɣ Cryptography does not guard against the vulnerabilities and threats that
emerge from the poor design of systems, protocols, and procedures. These
need to be fixed through proper design and setting up of a defensive
infrastructure.
Ɣ Cryptography comes at cost. The cost is in terms of time and money:
Ŷ Addition of cryptographic techniques in the information processing leads
to delay.
Ŷ The use of public key cryptography requires setting up and maintenance
of public key infrastructure requiring the handsome financial budget.
Ɣ The security of cryptographic technique is based on the computational difficulty
of mathematical problems. Any breakthrough in solving such mathematical
problems or increasing the computing power can render a cryptographic
technique vulnerable.
As key lengths increase, the number of combinations that must be tried for a brute
Notes
force attack increase exponentially. For example, a 128-bit key would have 2 ^ 128
(3.402823669209e + 38) total possible combinations. For example, to theoretically crack
the 128-bit IDEA key using brute force, one would have to:
Ɣ develop a CPU that can test 1 billion IDEA keys per second
Ɣ build a parallel machine that consists of one million of these processors
Ɣ mass produce them to an extent that everyone can own one hundred of these
machines
Ɣ network them all together and start working through the 128-bit key space
Assuming ideal performance and no downtime, one should be able to exhaustively
search the key space in over 20,000 years. A common concern amongst many is
deciding what key length is secure. There is a metronome for technological progress
called Moore’s Law which states that; “the number of components that can be packed on
a computer chip doubles every 18 months while the price stays the same”. Essentially,
this means that computing power per dollar doubles every eighteen months. Using a
derivative of this above law, one can also say that, if a key length of x is considered
safe today, in 18 months, the key length would have to be x + 1 to keep up to par
with the computing power. Recent studies performed by independent scientists have
shown that key lengths should be no less than 90-bits long to ensure complete security
for the next 20 years.
3.4 Summary
Network security is accomplished through hardware and software. The software
must be constantly updated and managed to protect you from emerging threats. A
network security system usually consists of many components. Ideally, all components
work together, which minimizes maintenance and improves security. Network security
components often include:
Ɣ Anti-virus and anti-spyware
Ɣ Firewall, to block unauthorized access to your network
Ɣ Intrusion prevention systems (IPS), to identify fast-spreading threats, such as
zero-day or zero-hour attacks
Ɣ Virtual Private Networks (VPNs), to provide secure remote access
Many network security threats today are spread over the Internet. The most
common include:
Ɣ Viruses, Worms, and Trojan horses
Ɣ Spyware and adware
Ɣ Zero-day attacks, also called zero-hour attacks
Ɣ Hacker attacks
Ɣ Denial-of-service attacks
Ɣ Data interception and theft
Ɣ Identity theft
3. The issues that deal with the collection and use of data about individuals is
Notes
__________.
(a) access
(b) property
(c) accuracy
(d) privacy
4. The ethical issue concerned with the correctness of data collected is
__________.
(a) access
(b) property
(c) exactness
(d) privacy
5. The ethical issue that involves who is able to read and use data is
__________.
(a) access
(b) property
(c) accuracy
(d) privacy
6. The vast industry involving the gathering and selling of personal data is
__________.
(a) direct marketing
(b) fund-raising
(c) information reselling
(d) government agencies
7. Identity theft is the __________.
(a) impersonation by a thief of someone with a large bank account
(b) impersonation by a thief of someone with computer skills
(c) impersonation by a thief of someone with good credit
(d) impersonation by a thief of someone’s identity for the purpose of
economic gain
8. Businesses search employees’ electronic mail and computer files using
so-called __________.
(a) Trojan horses
(b) cookies
(c) snoopware
(d) theft-ware
9. Small files that are deposited on a user’s hard drive when they visit a website
are best described as __________.
(a) cookies
(b) codes
(c) profiles
(d) trackers
10. Two types of cookies are __________.
(a) advanced and remedial
(b) traditional and natural
(c) natural and ad network
(d) ad network and traditional
Established in 2010, the CERT works with the Australian business sector – primarily
Notes
the owners and operators of systems of national interest. These are the businesses that
underpin the social and economic well-being of the nation and the economy, such as
banking and finance, communications, energy, resources, transport and water.
The CERT provides cyber security threat and vulnerability information to help these
businesses manage risk, as well as providing support with incident response. The CERT
is also a member of the Cyber Security Operations Centre and the global CERT
community. By using its government, international and industry networks, the CERT
seeks to provide the most effective and timely advice and assistance possible.
Respondents
Of the almost 450 organizations contacted, responses were received from 255,
which is approximately 60%. This is a strong response rate and reflects the trusted
relationship the CERT has with its business partners. It also reflects the willingness of
business to participate in a survey that will help government and improve understanding
of the cyber security threat environment in Australia.
Industry Sector
More than 11 industry sectors responded, with the greatest representation being
from energy (17%), defence industry (15%), communications (12%), banking and finance
(9%) and water (9%).
Security of IT Systems
Security of IT systems centers on preventing and detecting the unauthorized access
to or use of IT systems or impairment of those systems. To achieve such security,
modern organizations layer security defences in IT systems to reduce the chance of a
successful attack. This concept is known as defence-in-depth and seeks to manage risk
with multiple defensive strategies, so that if one layer of defence turns out to be
inadequate, another layer of defence will hopefully prevent a full breach. The multiple
defence mechanisms layered across an organization’s network infrastructure protect
data, networks, and users. A well-designed and implemented defence-in-depth strategy
can help system administrators identify internal and external attacks on a computer
system or network.
IT Security Technology
Organizations were asked what type of computer security technologies they used.
More than 90% of respondents reported using anti-virus software, spam filters, and
firewalls. More than 80% also reported using access control and virtual private networks
(VPNs).
IT security technology such as firewalls and spam filters are not always effective in
preventing or detecting sophisticated attacks, so security techniques are increasingly
incorporating the use of intrusion detection systems (IDS). Almost 60% of respondents
reported using a type of IDS.
Almost half the respondents also reported deploying reusable passwords and
multifactor authentication technologies such as biometrics, smartcards and tokens.
These results indicate that some organizations may need to strengthen their
IT security, by adopting a defence-in-depth approach.
IT Security Policy
According to respondents, basic security policies are being applied by the majority
of surveyed organizations. For example, 84% deploy user access management, 79%
perform media backup, 75% use documented standard operating procedures, and 73%
have external network access control.
Results indicate there are areas for improvement. For example, less than 50% of
respondents have plans in place for the management of removable computer media,
such as USB memory drives, and less than 25% have policies and procedures in place
for using cryptographic controls.
In addition, less than 12% of respondents reported having a forensic plan in place.
These plans help monitor use of the ICT systems, provide mechanisms to recover lost
data, and provide ways to protect information on systems.
IT Security Standards
Overall, 64% of respondents reported their organization did apply IT security
standards or guidelines.
Of the remaining respondents, 25% reported their organization did not apply
Notes
IT security standards or guidelines, and 11% did not know. These findings are a concern
and warrant future investigation.
Of the respondents who reported their organization did apply some form of
IT security standard, almost 50% followed or used as a guide, the ISO 27001. These
standard states it is mandatory for management to examine their organization’s
IT security risks to form a risk mitigation system and to ensure that the controls applied
are current for the needs of the business.
Of this same subset of respondents, just over 20% reported their organization
adhered to the Payment Card Industry Data Security Standard (PCI DDS). This is the
IT security standard commonly used by organizations using credit card data. In addition,
just over 15% used a vendor specific standard.
IT Security Qualifications
Responses indicated that 65% of participating organizations had IT security staff
with tertiary level IT qualifications. More than 50% of participating organizations had
IT security staff with some type of vendor based IT certifications. Almost 35% of
participating organizations had IT security staff with no formal training, although most of
these staff had more than five years working in the IT security industry.
These findings indicate that some organizations may need to improve the skill set of
their IT security staff.
This was supported by the additional finding that 55% of respondents thought their
organization needs to do more to ensure their IT security staff have an appropriate level
of qualification, training, experience and awareness.
These findings indicate that respondents are aware of the need for IT security staff
to keep their skills and knowledge up-to-date – which is essential, as cyber threats are
constantly evolving.
Respondents also thought their organization needs to do more to ensure other staff
has an appropriate level of IT skill and awareness:
Ɣ 70% of respondents reported this need for general staff,
Ɣ 70% of respondents reported this need for management, and
Ɣ 48% of respondents reported this need for their board of directors.
These findings indicate that respondents are aware that cyber security is a shared
responsibility. Even where networks are secure at the perimeter, security is dependent
on all staff being aware of vulnerabilities such as phishing attacks. This is a method used
to penetrate organizations without needing to breach IT security defences, by attempting
to get staff to divulge information and provide access – unwittingly – to corporate
systems.
These findings also indicate that many organizations are not confident that cyber
security is sufficiently understood and appreciated by staff, management and boards.
Cyber Incidents
Respondents were asked about the types of cyber security incidents their
organization had experienced in the previous 12 months, as well as possible motives for
the attacks, and why the attacks may have been successful.
A cyber security incident was classified as an electronic attack that harmed the
confidentiality, integrity or availability of the organization’s network data or systems.
staff or contractors, can have access to sensitive information and the opportunity to
Notes
understand critical systems and exploit potential weaknesses in security.
Expenditure on IT Security
When asked if their organization had increased expenditure on IT security in the
previous 12 months:
Ɣ 52% of respondents reported ‘yes’,
Ɣ 42% of respondents reported ‘no’, and
Ɣ 6% of respondents reported they ‘did not know’.
These findings indicate that more than half of participating organizations are
increasing their expenditure in information security. While it is unknown where this
expenditure was directed within an organization, it is a positive step demonstrating the
need for continual investment in information security.
successfully taking down the site. Some websites were brought down by the attack;
Notes
others had the infrastructure to withstand it.
The CERT located the target list for the attacks and contacted the listed companies.
As the attacks were of a criminal nature, the CERT also provided all relevant information
to the Australian Federal Police’s High Tech Crime Operations for investigation.
The sites which had the ability to mitigate the attack were not targeted for long. With
the attacks being financially motivated, the attacker seemed quick to move on to other
potential victims. However, if the company communicated with the attacker, the site
appeared on the target list for longer periods of time.
The CERT was able to identify the international source of the attacks from a sample
of the DDoS traffic provided by one of the companies – this highlights the value of
sharing information. The CERT then notified its international counterpart, asking for
assistance in having the control hub taken down. The international CERT responded
quickly and the host was shut down.
However, as is normally the case with such incidents, the control hub then moved to
another internet address and recommenced attacks. The CERT again contacted
overseas counterparts to issue further take down requests.
The CERT also continued to follow up with affected companies, providing options
and advice on mitigation techniques for possible future attacks. The companies that were
most effective in mitigating the attacks had already well-established and tested response
procedures in place for dealing with DDoS.
This case study highlights the need for organizations to develop DDoS response
plans and test them. By partnering with the CERT – ideally before an incident occurs –
business can be better prepared to mitigate cyber attacks.
Reporting of Incidents
Respondents, who indicated their organization had experienced cyber attacks in the
previous 12 months, were asked a range of questions about reporting the incidents.
Just under half the respondents (44%) said they had chosen not to report the
incidents to an outside organization. Of the respondents who did report one or more
incidents, 44% were to a law enforcement agency, and 29% were to the CERT.
These findings indicate a high level of caution from organizations in reporting
incidents – although they may also reflect the actions of the respondent, rather than the
overall practice of the organization.
When asked why they had chosen not to report a cyber security incident to a law
enforcement agency, 74% indicated that they didn’t think the incident/s warranted law
enforcement intervention. This response may indicate the incident/s suffered by these
organizations were of a minor level and/or they were unaware of the threshold level for
interest and acceptance for investigation by a law enforcement agency. In addition, 35%
of organizations didn’t believe law enforcement had the capability to effectively conduct
an investigation into the incident, while 26% didn’t think the perpetrator would get caught.
Out of those respondents who did report a cyber security incident to law
enforcement, 33% stated that it was their understanding the incident was not investigated
and 29% stated they did not know the outcome from the referral, while 8% of matters
referred to law enforcement were reported to have resulted in a person being charged.
These findings highlight that the CERT needs to articulate to business the benefits
of reporting cyber security incidents to CERT Australia and to law enforcement, and that
all information provided to the CERT is held in the strictest confidence.