ICS Short Notes
ICS Short Notes
Viraj Dissanayake
Lecture 1
Confidentiality – make sure to allow only authorized parties to access data/information (Privacy &
confidentiality are not the same. Privacy comes under confidentiality and it only protect personal
data/information)
Availability – make sure that the service is available for authorized parties
Attack – A threat in action. Two type (active attacks- alter system information | passive attacks- doesn’t
alter information)
The person who does the attack is known as Threat agent (adversary)
RFC 2828
1. Specification(policy)
2. Implementation(mechanism)
3. Correctness (assurance)
Security implementation
Detection – If prevention failed, need to detect the attack (Intrusion detection systems)
Response – If the attack got detected, then we have to response for that.
Recovery – If the attack detection failed, which means we got attacked, we need to have a way to
recover the system as it was (Keeping backups)
Lecture 2
Transposition – Change the order(rearrange) of the text pattern (Eg: Scytale, Rail fence, DES, 3DES)
Two types of substitutions – mono alphabetic substitution (The key consists one character (key=3))
Onetime pad – The key can be used only for a one time. One-time pad immune to cipher text attacks
Two types of cipher
1. Symmetric cipher – both parties use same key to encrypt and decrypt (key need to be shared)
2. Asymmetric cipher – use one key to encrypt and use another key to decrypt
DES and AES / Rijndael are symmetric ciphers. RSA and Diffie-Hellman are asymmetric ciphers.
1. Block cipher
2. Stream cipher
Key size – If key = 101, key size = 3 (number of bits for the key)
Key space – 2Key size (if key size is 3, then key space= 23)
Stream cipher example
Let’s assume the binary value of Athma is 1001101. The key is 1101001 (key will be given in the
exam)
To encrypt, perform the XOR opration.
1) Brute force method – Attacker tries every possible key for the decryption algorithm.
2) Cipher text only attack – Attacker use statistical analysis to crack the key (Attacker doesn’t know
the plain text. He has cipher text of several messages which uses same encryption.)
3) Known plain text attack – Attacker use brute force attack (attacker has information of the plain
text and has cipher text of several messages)
4) Chosen plain text attack – Attacker observe the cipher text output
This attack is not practical because the it’s impossible to capture both plain
text and cipher text
5) Chosen cipher txt attack - Attacker chooses different cipher text to be decrypted and has access
to the decrypted plaintext
This attack is not practical because the it’s impossible to capture both plain
text and cipher text
Best method use for the cracking code is the brute force attack
Cryptology = cryptography(developing codes) + cryptanalysis(breaking codes)
Nonrepudiation
Authentication protocols (PPP CHAP)
Message integrity check proof
Confirming download files have not altered
Hash message authentication code(HMAC) - Use hash function to calculate a message authentication
code. Has a secret key. The key makes assurance of authentication and integrity. Output depends on
input and the secret key.
Cryptographic strength of the HMAC depend on size of the key and size of the hash output