Information Security Chapter lecture 1 & 2
Information Security Chapter lecture 1 & 2
Key Management:
KDC, KERBEROS, Diffie-Hellman,
CA, X.509 & PKI
Security at Internet model layers:
Application layer; PGP & S/MIME
Transport layer; SSL & TLS
Network layer; IPsec
E-Commerce Security:
Dual Signature & SET protocol
Integrity:
Integrity means that changes in information needs
to be done only by authorized users and through
authorized mechanisms.
Availability:
Means the information needs to be available to
authorized entities when it is required.
Taxonomy of
ATTACKS
CRYPTOGRAPHY with Relation to Security Goals
AND
NETWORK DR. FAHEEM MUSHTAQ
SECURITY
Snooping
Refers to unauthorized access to or interception of data.
Traffic analysis
Refers to obtaining some other type of information by monitoring online
traffic.
Other type of information may include email addresses of sender and
receiver, frequency of communication to help for guessing nature of
transaction.
Attacks Threatening Integrity:
Modification
Means that the attacker intercepts the message and changes it
Masquerading or spoofing
Happens when the attacker impersonates somebody else.
Replaying
Means the attacker obtains a copy of a message sent by a user and
later tries to replay it.
Repudiation Means that sender of the message might later deny that
she has sent the message; the receiver of the message might later deny
that he has received the message.
Attacks Threatening Availability:
Denial of service (DoS) is a very common attack. It may slow down
or totally interrupt the service of a system.
PASSIVE
VERSUS
CRYPTOGRAPHY ACTIVE ATTACK
AND
NETWORK DR. FAHEEM MUSHTAQ
SECURITY
Cryptography
Steganography
Cryptography vs Steganography
Computational security
Cost exceed the value of information
Time exceeds the useful life of information
Cryptanalysis
General approaches:
Cryptanalytic attack
Brute-force attack
Cryptanalytic Attacks
Ciphertext only
• Only know algorithm & ciphertext, is statistical, can
identify plaintext
Known plaintext
• Also have plaintext for the ciphertext
Chosen plaintext
• Also can select plaintext and obtain ciphertext
Chosen ciphertext
• Also can select ciphertext and obtain plaintext
Brute Force Search
always possible to simply try every key
most basic attack, proportional to key size
assume either know / recognise plaintext
128 2128 = 3.4 1038 2127 µs = 5.4 1024 5.4 1018 years
years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 5.9 1030 years
years
26 characters 26! = 4 1026 2 1026 µs = 6.4 6.4 106 years
permutation 1012 years