All Combined
All Combined
Network security means taking steps to keep your network and data safe. Any
company or organization dealing with lots of data has ways to defend against cyber
threats. Network security includes actions to keep your data and network safe and
Recently, it's become a major focus in cybersecurity, and many organizations are
looking for people skilled in this area. Network security solutions help protect
computer systems from vulnerabilities like users, locations, data, devices, and
applications.
Ensuring the security of our network is crucial to defend against attackers and
hackers. Network Security involves two main aspects: safeguarding data information
to prevent unauthorized access and loss and ensuring computer security to protect
data and thwart hackers. Network security isn't limited to a single network but
Now, our requirement for network security has evolved into two distinct needs:
5. Restricting users from sending messages with a third party's name prevents
deceptive practices.
protect computer systems from damage caused by the network. Viruses and spyware
3. Protection from Trojan Horses, known for their potential danger to computer
systems.
Security approaches
network and external networks that might not be reliable. They control the flow
of network traffic entering and leaving, positioned at the network's edge to filter
security policies. They can identify and halt unauthorized access or attacks in real
time.
confidentiality.
● NAC: Network Access Control (NAC) enforces rules regarding which devices can
access the network and under what conditions. It assesses the security status of
● SIEM: Security Information and Event Management (SIEM) systems collect and
analyze log data from various network devices and applications. This aids in
Program policies are like master plans for an organization’s info safety. They lay out
the program's purpose, scope, roles, and rules to follow. Also called master or
organizational policies, they're made with input from top managers and aren't tied to
Issue-specific policy
(BYOD), social media, or remote work policies. They focus on certain tech areas but
are usually broader. For instance, a remote access policy might say offsite access
needs an approved company VPN but won't name a specific VPN client. This way, the
System-specific policy
System-specific policies are super detailed IT security rules for a specific system, like
a firewall, web server, or even one computer. Unlike issue-specific policies, these are
more for tech folks maintaining them. NIST says they should have both security goals
and operational rules. IT and security teams help make, enforce, and implement
them, but top managers make the big decisions and rules.
1.4 Summary
2.1 Types of attacks
Various types of attacks target network security. Let's explore the most common
ones:
systems, damage networks, and gain unauthorized access for stealing data or
2. Virus: Also, a malicious software, a virus needs user interaction to harm the
often through malicious links like email attachments containing harmful code.
Clicking on such links can corrupt files and lead to personal information theft.
don't require a host file and can infiltrate a system through applications,
where the attacker employs many systems to flood the victim's server with
is tricky because they originate from different infected systems and are
● Connection flooding
● Vulnerability attacks
● Bandwidth flooding
6. Phishing: Phishing is a sneaky trick used by hackers. They send fake emails to
fool people into giving away personal info like credit card details, online
banking info, usernames, and passwords. These emails look legit but have
computers do what the hacker wants, all working to attack different systems
information.
10. Packet Sniffer: These tools capture and save transmission packets in a
details, financial data, trade secrets, user IDs, and passwords by intercepting
network packets.
2.2 Services
When we discuss network security, the CIA triad emerges as a crucial model guiding
Confidentiality
Confidentiality is about making sure only authorized people can access data. It's the
responsibility of users to keep control systems secure, like passwords for computers
information security to avoid accidentally sharing data. It's crucial to limit data
Physical restrictions are equally important. Unauthorized access to your building can
lead to unauthorized data access. Door codes should never be written down, and
from using your details to gain access. Areas with sensitive information may have
Integrity
trustworthiness and conscientiousness depend on the integrity of its data. One of the
and responsibilities for data integrity helps ensure everyone takes it seriously.
Availability
Availability ensures authorized personnel can reliably access information. Data must
supports efficient business processing and benefits the organization. Every user is
responsible for organising desktop documents for future access. Paper copies should
2.3 Summary
damage networks, and gain unauthorized access for stealing data or personal
information.
private information or changes it between two gadgets, like a user's device and a
server.
❖ DDoS is a complex type of DoS attack where the attacker employs many systems
to flood the victim's server with traffic, leading to malfunctions and blocking
3.1 Encryption Techniques
Encryption is a way to safeguard information by turning it into code that can only be
understood by someone with the correct key. It appears chaotic and unreadable if
When we talk about encryption, it's the process of changing data from a readable
form to a scrambled one. This is done to stop anyone from peeking at sensitive data
while it's being transmitted. Encryption can be applied to various things like
Plain Text
In simple terms, encrypted communication transforms regular text into code using
cyphers or encryption methods. Plain text is any information that can be read
or already encrypted is considered plain text. A cryptographic system takes this plain
text, processes it, and produces code known as ciphertext. Algorithms help convert
ciphertext back into plain text and vice versa. This process ensures that only the
Protecting plain text stored in computer files is crucial because unauthorized access
can expose the information, leading to potential actions based on that data. To
ensure security, the storage medium, the device, its components, and any backups
must be secured.
Ciphertext
Ciphertext is the result of using encryption methods, often called ciphers. If someone
or something doesn't have the correct cipher, the data appears encrypted and cannot
be understood. The cipher is essential for interpreting the data. Algorithms are used
to transform regular text into ciphertext and vice versa, involving encryption and
decryption processes.
In simpler terms, substitution ciphers replace letters or groups of letters with other
In the Substitution Cipher technique, characters are replaced with other characters
or symbols, changing their identity but not their position in the string. This method
encrypts text by substituting letters or units of text. While basic substitution ciphers
became easy for computers to crack, some concepts persist in modern encryption.
permutation of the plaintext. One example is the Rail Fence encryption, where the
plaintext is written on imaginary "rails" of a fence and then read in a series of rows.
This technique follows a scytale-like pattern, an ancient Greek device for constructing
transposition ciphers. The Rail Fence Cipher encrypts by coiling a ribbon around a
cylinder, and decoding happens when the ribbon is uncoiled from a cylinder with the
same diameter as the encrypting cylinder.
Encryption
Encryption is like a secret code for data. It's a way of jumbling up regular information
(plaintext) so that only the right people can unscramble it back to its original form.
This jumbled-up version is called ciphertext. The idea is to keep unauthorized folks
by a computer algorithm. Even if someone tries to crack the code without the key, it's
super hard because it takes a lot of computer smarts and time. Only the person
supposed to get the info can easily unscramble it using the key. When data is
Once data is locked up with encryption, the only way to open and reread it is by using
the right key. Encryption is crucial for keeping sensitive info safe when it's sent or
stored. There are different types of encryption, like stream ciphers that handle data
bit by bit and block ciphers that deal with larger chunks.
Decryption
Decryption is the opposite of encryption. It's the process of turning encrypted data
back to its original state. It's like using the secret codebreaker (key) to unlock the
jumbled-up info. Decryption needs this unique key or password, and only the right
When info travels on the internet, there's a risk of sneaky people trying to peek at it.
That's why we use encryption – to stop data from being stolen. Email, text files,
pictures, and more can be encrypted to keep them safe. When someone needs to
decrypt the info, they usually get a pop-up or window asking for the password. This
ensures that only authorized users can access the protected data.
So, these attacks focus on cryptographic or cipher systems that hide data so only a
few people can see it. There are six main types of these attacks, depending on the
● Brute force attacks: In brute force attacks, the person trying to break into a
system tests different keys to uncover a coded message. For instance, if the
critical size is 8 bits, there are 256 potential keys (2^8). To succeed, the
attacker must know the algorithm and test all 256 keys.
hold of a bunch of coded messages. Even though they can't directly access
the original message, they can deduce it from the coded collection. This
trying to link the coded message to the original one, aiming to guess the key
● Known plaintext attack: This occurs when the attacker already knows the
techniques.
● Dual key and algorithm attack: The attacker tries to recover the key used for
Besides these six types, cryptographic attacks can be either passive or active.
● Key range: In cryptography, the key range refers to all the potential values a
cryptographic key can have. A sufficiently sizable key range is crucial to make
● Key Size: The key Size, usually measured in bits, is a specific numeric value
within the key range. It shows the length or complexity of the cryptographic
key. In simple terms, a larger key size means a higher level of security. For
instance, a 128-bit key offers more possible combinations than a 64-bit key,
3.4 Summary
❖ Encryption is a way to safeguard information by turning it into code that can only
❖ When we talk about encryption, it's the process of changing data from a readable
text.
❖ A cryptographic system takes this plain text, processes it, and produces code
known as ciphertext.
Symmetric Encryption:
The simplest way to keep information safe is using symmetric encryption. In this
method, a single secret key is used to both lock and unlock the data. It's an old but
random bunch of letters. This key mixes with the original message, changing its
content in a specific manner. To make this work, both the sender and receiver must
know the secret key for locking and unlocking the messages. Examples of symmetric
encryption methods are Blowfish, AES, RC4, DES, RC5, and RC6, with AES-128,
AES-192, and AES-256 commonly used. However, there's a catch–all parties involved
must share the key before they can unlock the information.
Pros:
● Faster: Using a single key for encryption and decryption speeds up the
process.
receiver's identity.
● Easy to execute & manage: With only one key for encryption and decryption,
Cons:
● Secure key sharing is challenging, making it difficult to share keys securely.
various users.
Asymmetric Encryption:
method compared to symmetric encryption. This technique utilizes two keys for
encrypting plain text and exchanging secret keys over the Internet or a network. This
prevents malicious individuals from misusing the keys. Notably, anyone possessing
the secret key can decrypt the message, prompting using two related keys to
enhance security. A public key is shared openly for message-senders, while the
second private key remains confidential. Messages encrypted with a public key
require a private key for decryption, and vice versa. With its heightened security,
channels, especially over the Internet. Examples include EIGamal, RSA, DSA, Elliptic
Pros:
shared key between the sender and receiver. While it's a faster and simpler system,
securely exchanging the key is the challenge. Notable examples of symmetric critical
● Hash Function
Hash Functions, on the other hand, don't use any key. They calculate a fixed-length
hash value based on the plaintext, making it nearly impossible to recover the original
content. Many operating systems employ hash functions for password encryption.
In asymmetric key cryptography, also called public-key cryptography, there are two
keys: a private one for the receiver and a public one for everyone. These keys, linked
by math, come in pairs. The public key is open to everyone, while the private key is
● Digital Signatures
signatures and serve as electronic verifications of the sender. Digital signatures find
non-repudiation, ensuring someone can't deny validity; and Integrity, maintaining the
cipher with a 56-bit key length. Over time, DES has been a critical player in ensuring
data security. However, its popularity has slightly waned due to discovering
DES operates as a block cipher when processing data, working on 64-bit blocks. This
and decryption employ the same algorithm and key, and the key has a critical length
of 56 bits.
International Data Encryption Algorithm (IDEA):
encryption that keeps digital information safe. It uses a 64-bit block size and a 128-bit
key length. To transform regular text into a secret ciphertext code, IDEA uses
operations. It's good at defending against different attacks, like differential and linear
cryptanalysis. One of IDEA's strong points is that it works well in software and
hardware applications.
IDEA's speed, low memory requirement, and modest processing power make it
algorithms like AES, IDEA remains secure and is still used in some legacy systems and
applications.
format without access to the actual key. Unlike brute force attacks, cryptanalysis
Linear Cryptanalysis:
encryption process.
Differential Cryptanalysis:
secret key. Cryptanalysis is crucial for breaking cryptographic security systems and
4.2 Summary
❖ The simplest way to keep information safe is using symmetric encryption. In this
method, a single secret key is used to both lock and unlock the data.
❖ To make this work, both the sender and receiver must know the secret key for
❖ Notably, anyone possessing the secret key can decrypt the message, prompting
❖ Messages encrypted with a public key require a private key for decryption, and
vice versa.
❖ Hash Functions, on the other hand, don't use any key. They calculate a
5.1 Authentication basics
to be. When someone logs into a computer system, user authentication confirms
● Token Authentication: It's like a VIP pass for your online accounts. Once you
prove you're you, you get a unique token. Once that token is ready, you can
username and a secret code (password) is the key. The trick is that the fancier
and more often you change the password, the safer your account's.
fingerprints or the unique pattern of your iris. The system checks these in real
time against what it has on file. It's easy for you and super secure.
a digital certificate as your online ID. Without the secret key, it's impossible to
fake. This can prove who you are, what device you're using, or which service
manage everything.
using two or more of the above methods. It's like having two locks instead of
one. This makes messing with your accounts way more challenging for bad
guys.
goes hand-in-hand with MFA and Single Sign-On (SSO), making your life easier
5.2 Summary
claim to be. When someone logs into a computer system, user authentication
❖ Token Authentication is like a VIP pass for your online accounts. Once you prove
❖ Users have a unique username and password. The system compares entered
Cryptography is like a secret language for messages. It's a way of hiding or changing
information so only the person meant to get the message can understand it. People
have been using cryptography to encode messages for ages. Nowadays, it's still
essential for things like bank cards, passwords, and online shopping.
In modern times, unique tricks and secret codes are called algorithms and ciphers for
encoding and decoding information. They use things like 128-bit and 256-bit keys to
keep things super safe. The Advanced Encryption Standard (AES) is one of these
When we say cryptography, we mean turning information into secret codes to make
sure only the right person can read it. This cybersecurity trick, also called cryptology,
mixes different fields like computer science, engineering, and math to make
Cryptography goes way back to ancient Egyptian hieroglyphics, but today, it's crucial
for keeping messages and information safe from nosy people. It uses fancy math and
codes to turn messages into puzzles that are tough to solve. Cryptographic keys and
digital signatures help keep data safe when we use credit cards, send emails, or
Safe money moves between different company parts, so secret codes are important.
They ensure the money info sent between branches stays private, reliable, and
accurate. These codes, called cryptography, use special tricks to keep sensitive details
safe from sneaky folks. Let's break down how cryptography keeps inter-branch
payments secure:
● Secret Codes: We use challenging secret codes to keep payment info safe
while it travels. Advanced encryption standards (AES) and secure socket layers
(SSL) are popular. These codes turn financial moves into a secret language
● Key Pairs: Public Key Infrastructure (PKI) helps in safe talking by using pairs of
keys. These keys are like special codes - one is public, and the other is private.
money moves. They check if the information is accurate and the right people
are involved. This helps stop fake money moves and keeps financial details
safe.
● Token Magic: To make things even safer, we can replace important info like
account numbers with tokens. Even if someone snatches the data, it's only
valid with the particular token system. This extra step helps protect against
● Double Check with MFA: For an added layer of safety, we use Multi-Factor
Authentication (MFA). This means users have to show multiple IDs before
making a money move. It keeps the system safe, even if someone knows the
login info.
● Safe Talk: Using secure ways to talk online (like HTTPS) or for big data
transfers adds more safety. These methods ensure the info stays unchanged
checks, audits, and quick updates to secret codes help catch and stop new
threats. It's like staying one step ahead to keep the codes solid and ready for
anything.
● Key Care: Taking good care of secret keys is super important. Keep them safe,
change them often, and make sure only the right people can use them. This
way, we stop bad guys from getting in and messing things up.
In conventional encryption, also called symmetric-key encryption, folks use the same
key for locking and unlocking info. This means both the person sending the message
and the one getting it need to know this secret key to keep their chat private. The key
● Stream Ciphers: These encrypt bits of info one by one. They're handy for live
● Block Ciphers: These encrypt chunks of data with a set size. The data gets split
into blocks, and each block gets its code. Some popular ones are the
Message Confidentiality:
One of the big aims of secret codes is to ensure messages stay private. This means
nobody who isn't supposed to can peek at or figure out what's in the locked-up
message. When folks use regular encryption, the message looks like a bunch of
method, there's a single key for both locking and unlocking the message. There are
Symmetric-Key Encryption
key for locking and unlocking. Both the sender and receiver need to have this secret
key.
There are two types of symmetric-key encryption: stream ciphers and block ciphers.
● Stream Ciphers: In stream ciphers, data gets encrypted one bit or byte at a
time as it's sent. The key usually mixes with the original message to create the
● Block Ciphers: Block ciphers lock in fixed-size chunks of data (like 64 or 128
message to create the coded message. The key shows how to rearrange the
characters. An example is the Rail Fence cipher, where characters zigzag in writing
to processing lots of data. However, a big challenge is getting the key to both
parties safely. If someone intercepts the key during transmission, they can
unlock the entire conversation. Transposition ciphers are simpler but less
strong than modern block ciphers. They are vulnerable to frequency analysis.
● Key Management: Taking care of symmetric keys is vital for keeping encrypted
distribution systems help ensure that keys are shared safely between those
talking.
Conventional Encryption works by changing average messages into secret ones only
the intended receiver can understand. The sender and receiver agree on a private key
for encoding and decoding. Usually, they send this secret key using public essential
encryption methods.
In regular encryption, figuring out the original message from the secret one without
the key is impossible. So, it's super important to keep the key a secret.
These encryption methods are commonly used because they're good at encoding
and decoding quickly. But they have weaknesses. One weakness is related to the
number of keys available to choose from. More extensive key options make it harder
for attackers to guess the right one. Another area for improvement is the length of
the key, as longer keys make it more challenging for patterns to show up in the secret
message. The main aim of regular encryption is to create personal messages that are
truly random, making it challenging for someone to figure them out by analysing the
6.3 Summary
changing information so only the person meant to get the message can
understand it.
❖ In modern times, unique tricks and secret codes are called algorithms and ciphers
❖ Cryptography goes way back to ancient Egyptian hieroglyphics, but today, it's
crucial for keeping messages and information safe from nosy people.
❖ Cryptographic keys and digital signatures help keep data safe when we use credit
1. Key Management
In the world of secret codes, sharing keys between the person sending the message
and the one receiving it is tricky. The security plan falls apart if a sneaky third person
gets hold of the key (like a copycat or someone listening in). That's why it's essential
● Public Announcement: This is like shouting the public key to everyone. The
problem here is anyone can pretend to be someone else and trick others. They
can keep fooling people until someone figures out the trick.
● Publicly Available Directory: In this way, the public key is saved in a public list.
People trust these lists with details like who's signed up, who can see what, and
the key they use. Even though these lists can be checked online, they're still at
● Public Key Authority: It's a bit like the directory, but safer. It makes sure only the
right people get the keys from the list. Users have to know the public key for the
list. When they need the keys, they check the list in real time to get the one they
want.
● Public Certification: This is where a special authority gives a certificate (it ties a
name to the public key). This way, people can share keys without always checking
the main list. The certificate has extra info like how long it's suitable for and what
it can be used for. The certificate authority's private key signs everything in the
When two people want to talk safely, they both ask the certificate authority for a
certificate. This certificate has a public key and more details. Then, they swap
2. Key distribution
Sharing secret keys is crucial in cryptography. In the symmetric critical approach, both
parties need a private key. Getting this key to each other used to be tricky. People
had to meet face-to-face, use a trusted courier, or send the key through an existing
encryption channel. The first two are often not practical and always risky, while the
Public key cryptography solves this differently. Public keys are shared through public
key servers. When someone creates a key pair, they keep one key private and upload
the other, called the public key, to a server. Anyone can access it to send the user a
Secure Sockets Layer (SSL) uses Diffie–Hellman key exchange when the client lacks a
public-private key pair and a published certificate in the public key infrastructure. If
the user has both keys and the credential, Public Key Cryptography is used.
Key distribution is a big deal in wireless sensor network (WSN) design. Various
schemes exist in the literature to ensure easy and secure communication among
sensor nodes. The most accepted method in WSNs is key redistribution. This involves
placing secret keys in sensor nodes before deployment. These private keys create the
network once the nodes are in the target area.
KDC
A Key Distribution Center (KDC) is a system that automatically shares keys to enable
Each user has a unique master key that they share with the KDC.
To grasp how a KDC works, we first need to understand key hierarchies. Key
The master key is used to identify the user, and a second key, known as the session
key, encrypts user communication. The session key gets encrypted using the master
Each session has a unique key, providing an extra layer of security because different
If an attacker acquires one key, they won't be able to decrypt all messages—only
In cases with numerous users, it might be necessary to have multiple KDCs. This can
When users in different areas or under different KDCs need to communicate, the
request goes to a higher hierarchical level KDC, responsible for sharing the session
However, there are drawbacks to using a KDC. The main one is that the KDC must be
trustworthy and protected at all levels. If the KDC's security is compromised, all
distribution, which, while not practical for large networks, can be helpful in a local
network.
various servers in a network. This is especially crucial when numerous users need
access to services spread across different servers. Kerberos functions like a KDC in
this scenario, generating session keys to establish secure connections between users
and services.
Kerberos
Kerberos is like a security guard for computer networks. It's a protocol that checks if
requests for services between computers are legit, especially when sending
messages over an unsafe place like the Internet. To do this, it uses secret codes and a
trusted helper to ensure that you are who you say you are when you're using apps or
services.
MIT, the clever folks at the Massachusetts Institute of Technology, came up with
Kerberos in the late 1980s. Now, it's the go-to security tech for Microsoft Windows,
and you can find it in other systems like Apple OS, FreeBSD, UNIX, and Linux.
What does Kerberos do?
Kerberos ensure the right people get into a network. Whether it's a company's
network, a school's network, or even an Internet service, Kerberos has three main
jobs:
● User Check: Kerberos ensures the people trying to access the network are
legit. Only the approved folks access specific services, systems, or data.
● Single Sign-On (SSO): This nifty feature lets you log in just once, and then you
can use many different services without repeatedly entering your info.
● Central Control: Kerberos makes things easy by having a central hub, like a
Kerberos keeps things safe when your computer talks to a server. Here's how it
works:
● Ask the Authentication Server (AS): Your computer kicks things off by asking
the Authentication Server to get the party started. It shows who you are.
● Get the Ticket: If all is good, the AS checks you out and hands you a special
pass called a Ticket Granting Ticket (TGT). Your secret password helps lock it
up.
● Service Time: When you want to use a specific service, like checking your
email, you show the TGT to the Ticket Granting Server (TGS).
● Get the Service Ticket: The TGS checks your TGT and hands you a Service
Ticket (ST) for your desired service. It's locked up with that service's secret
code.
● Let's Do This: You show the ST to the service, and they ensure it's legit by
checking it with the AS. You get a secret key to start the party if all goes well.
Benefits
● Super Safe: It ensures logins and security follow the rules, making it easier to
● Time Limits: Every pass has a timer. This helps control when people can get in,
● Team Effort: Kerberos lets both sides – you and the service – check each other
out. It's like making sure you're both who you say you are.
● Reuse Power: Once you've proven you're you, you can keep using your pass
Certificate Authorities
trusted entity responsible for creating and endorsing digital certificates, a key Public
Key Infrastructure (PKI) element. Digital certificates issued by CAs confirm the
certificates act as a way to establish credibility for those who may not directly know
Now, let's talk about website security. A certificate authority follows a set of rules to
official sources to verify the authenticity of the business. Once approved, the CA
issues a digital certificate, allowing the company to encrypt and digitally sign its
As a result, a Certification Authority helps you achieve the following for your
company:
That's where the Certification Authority comes in. CAs verify websites and
When you visit a secure website, your browser's URL bar should display a lock icon.
certificate. You can even inspect certificate details, such as who it's issued to, who
If a website shows a warning that the connection is not private and the certificate is
untrusted or invalid, it's likely a fake and unsafe to open. For the system to work
of keys that are related. Each pair has a public key and a matching private key. These
keys are made using special math functions that only go one way. The safety of
public-key cryptography depends on keeping the confidential key secret, while the
public key can be shared openly without causing any security issues.
In a public-key encryption system, anyone with the public key can make a message
secret by encrypting it, turning it into ciphertext. But only those who have the
matching private key can change the ciphertext back to the original message. For
example, a journalist might put the public key on a website, letting sources send
secret messages to the news organization in ciphertext. With the private key, the
journalist can read the messages, keeping them safe from people trying to listen.
Public-key encryption is key because it doesn't keep secret details, such as the
message's origin or send time. It doesn't reveal the sender's identity either; it simply
In a digital signature setup, the sender uses a private key and the message to create a
signature. Armed with the matching public key, the recipient can check if the
signature aligns with the message. However, a forger lacking the private key cannot
produce a valid message/signature pair. For instance, a software publisher can create
a signature key pair, incorporating the public key in installed software. Updates
signed with the private key can be verified using the public key, ensuring the
Layer Security (TLS), SSH, S/MIME, and PGP. Some algorithms facilitate key
distribution and secrecy, while others focus on digital signatures. Despite being
Applications:
confidentiality, where the sender encrypts a message using the recipient's public key.
non-repudiation protocols.
Message Authentication
Message Authentication is about ensuring a message has been kept intact while it's
being sent. It's like double-checking to be sure the message is from who it says it's
from and that it has been fixed during its trip. The whole point is to guarantee the
message is genuine and has yet to be messed with. Ensuring authentic messages
come from the right source is essential for safe communication. Let's talk about a few
● Digital Signatures: When you send a message with a digital signature, you use
your secret key to make a unique mark. The person getting it can check this
mark using your public key, making sure the message is genuine and not
messed with.
secret key. The sender uses it to make a code (MAC) for the message, and
they send it together. The receiver checks the code using the shared key,
● Hash Functions: Hash functions make a fixed-size code for a message. Even a
tiny change in the message makes a big difference in this code. People often
● Public Key Infrastructure (PKI): PKI uses digital certificates from a trusted
Certificate Authority (CA). The CA's signature on the certificate checks the
Handshake Mechanism
This is like a friendly chat between two parties to set up a secure way to talk. It goes
like this:
● Initialization: The talk starts with both sides saying they want to chat safely.
● Agreement on Parameters: They agree on how to keep the chat secret, like
● Key Exchange: They share secret keys safely so nobody else can grab them.
● Secure Communication: Once everything checks out, they start their safe chat
8.2 Summary
secret, while the public key can be shared openly without causing any security
issues.
❖ In a public-key encryption system, anyone with the public key can make a
❖ Public-key encryption is key because it doesn't keep secret details, such as the
❖ In a digital signature setup, the sender uses a private key and the message to
create a signature.
non-reputability.
confidentiality, where the sender encrypts a message using the recipient's public
key.
❖ Message Authentication is about ensuring a message has been kept intact while
9.1 Hash function
A hash function is like a virtual tool that uses math to change a bunch of letters
(called a "message") into a specific string with a set number of characters (known as
So, hashing means you're feeding an input into a formula, and it spits out an output
message with a fixed length. No matter how long the input is, the output will always
People use hashing to make sure data is accurate. If you tweak the message even a
These hash functions are essential tools in fancy computer safety (cryptography).
They help check if transactions, messages, and digital signatures are legit.
Hashing is usually a one-way thing. Turning a message into a hash is easy, but it's
hard to go backwards and get the original message. That takes a lot of computer
power.
This difficulty is crucial for things like Bitcoin. It uses proof-of-work systems, and the
● Standard Length: When you hash a message, whether your big or small file
doesn't matter. The math thing makes the output a set length.
● Ensure Data Is Real: Imagine sending a digital message or document. You want to
make sure it gets right on the way. You could send it many times for the other
person to check, but that's only possible if it's a small file. Hash functions make it
easier. They turn the data into a shorter set of characters, and the sender and
receiver can quickly check if the data is the same by looking at the hashes.
● Verify It's Real: Think about sending an email. It could get grabbed easily,
especially on a not-safe Wi-Fi. The person getting the email won't know if
sender signs the email with their digital signature and mixes it with the email
contents using a hash function, the receiver can check the hash data. If the hash
they make matches the one from the sender, the email is acceptable. Something
● SHA-1
● MD5
hexadecimal number. Like MD4, MD5 has some weaknesses, and people have
conducted collision attacks against it. Nowadays, it's not considered safe for
cryptographic use, and experts suggest using more secure hash functions such as
MD4 is short for Message Digest Algorithm 4. Ronald Rivest made it back in 1990,
and it's a special kind of tool for hiding information. Think of it like a magic recipe
that turns any number of words or data into a secret code with precisely 32 letters
and numbers, all in a particular format called hexadecimal. So, MD4 transforms
whatever you give it into a 128-bit hash value, like a secret code that's 32 characters
long.
Public key cryptography is crucial for keeping information private, mainly because it
deals with how keys are shared between users for secure connections. It also
Public key cryptography originated from trying to solve problems with symmetric
distribution.
On the other hand, public key cryptography uses asymmetric algorithms that rely on
two keys: one for encryption and another related key for decryption. The key
It's nearly impossible to determine the decryption key with only knowledge of the
Two related keys: one for encryption and the other for decryption.
A public key encryption system includes:
● Public and Private keys: A set of keys for encryption and decryption.
● Decryption Algorithm: Takes the ciphertext and matching key to produce the
original plaintext.
Keys in public key cryptography are extensive, such as 512, 1024, or 2048 bits, and
impersonate a legitimate user, replacing the public key with a fake one or
intercepting connections.
Public key cryptography is vital for online services like payment and e-commerce,
integrity, and non-repudiation, with the public key supporting non-repudiation and
authentication. Privacy and integrity, considered part of the encryption process, are
Digital Signature
Digital signatures are a modern way to sign documents electronically. They make sure
that the intended user sends the message without any changes from third parties
(attackers). In simple terms, digital signatures confirm the authenticity of
RSA
RSA stands for Rivest-Shamir-Adleman, and it's a popular way to encrypt messages.
It's commonly used for creating digital signatures, too. Let's break down how RSA
works for digital signatures, step by step. Imagine there's a sender (A) and a receiver
(B). A wants to send a message (M) to B, along with a digital signature (DS) calculated
● Step 1: A uses SHA-1 Message Digest Algorithm to figure out the message
● Step 2: A then encrypts the message digest with its private key, creating the
● Step 3: A sends both the digital signature (DS) and the original message (M)
to B.
● Step 4: When B gets the Original Message (M) and Digital Signature (DS) from
● Step 5: B uses A's public key to decrypt the digital signature. This results in the
● Step 6: If MD1 equals MD2, it confirms two things: B accepts the original
message as correct from A, and it proves that the message came from A, not
someone pretending to be A.
This process shows that the original message wasn't tampered with. Even if someone
tries to alter the message, they can't sign it with A's private key because only A
RSA Signature Attacks: While RSA is secure, attackers can attempt some attacks.
messages and combines them to claim the user signed a third message.
● Key-only Attack: Assumes the attacker has the public key and tries to make a
● RSA for Digital Signatures: RSA is widely used for digital signatures due to its
hashing, signing, and verification using public and private keys. RSA's security
9.3 Summary
❖ A hash function is like a virtual tool that uses math to change a bunch of letters
(called a "message") into a specific string with a set number of characters (known
❖ Hashing is usually a one-way thing. Turning a message into a hash is easy, but it's
This thing operates in the network part of the OSI Model. It looks at each packet and
checks some rules (based on what's in the IP and transport header fields). Depending
This packet filter firewall manages the entry to packets by looking at where they
come from and where they're going or by checking the specific type of transport
protocol. This happens at the OSI (Open Systems Interconnection) data link, network,
and transport layers. This packet filter firewall does its thing in the network layer of
These packet filters only care about the most basic details of each packet, and they
don't have to remember anything about the traffic because they examine each
packet on its own. That's why they can decide what to do with a packet fast.
Here's an example: You can set it up to block all those UDP things and any Telnet
connections. Doing this stops folks from logging into the inside stuff using Telnet and
application level. On a single host, multiple application gateways can run, with each
These firewalls, often referred to as application proxies, offer a high level of security
for data connections. They can inspect every layer of communication, including
application data.
Let's take the example of an FTP service. This service uses commands like getting a
file, putting a file, listing files, and navigating through a directory tree. Some system
admins may block specific commands like "put" while allowing "get" commands,
restricting the listing to specific files, or preventing the user from changing out of a
particular directory. The proxy server acts as an intermediary, mimicking both sides
of this protocol exchange. For instance, it might accept "get" commands and reject
"put" commands.
Step 1: The user connects to the application gateway using a TCP/IP application like
HTTP.
Step 2: The application gateway inquires about the remote host the user wants to
connect to and requests the user ID and password needed to access the gateway's
services.
Step 3: After confirming the user's authenticity, the application gateway accesses the
Securing networks is super important, and encrypted tunnels play a significant role.
They make a safe and private path for communication between two points, even on a
not-so-trustworthy network like the Internet. These tunnels protect your data from
prying eyes, tampering, and unauthorized access. Let's break down some critical
network stays private and untouched. They create a secure road for data to travel on,
● Site-to-Site Tunnels: Connect entire networks securely, often used for joining
branch offices.
● Remote Access Tunnels: Let individual users connect safely to a network from
a far-off place, like in VPNs for people working from home or on the go.
● VPN (Virtual Private Network): VPNs are like the practical side of encrypted
tunnels. They make a secure connection over the Internet, and you can use
them for all sorts of things, like connecting remotely, linking up different sites,
data for the trip through an encrypted tunnel. There are different ways to do
handle keys properly. This helps make sure everything stays secure.
Cookies
When cruising the internet, a web server sends little messages called cookies to your
web browser. These cookies help the server keep tabs on what you're up to on a
specific website. A cookie is a tiny nugget of info that a website tucks away on your
computer. It comes into play when you revisit the site later. Your browser shoots this
Your web browser stashes this message in a text file, and the message returns to the
server every time your browser asks for a page from that server. The whole point of
The name "cookie" comes from these things in UNIX called magic cookies. They're
like tokens attached to a user or program, changing based on where the user or
program goes.
But don't fret about cookies causing mischief on your computer. They're just plain
text files that are not fancy plugins or programs that can be deleted anytime. Cookies
can't pull off virus shenanigans, and they can't snoop around your hard drive.
They can't peek into your hard drive to dig up info about you. However, any personal
details you hand over to a website, like credit card info, end up stored in a cookie
unless you've switched off cookies for privacy reasons. But here's the catch: the
cookie only holds info you willingly share with the website.
10.4 Web security problem
1 Securing the Web Server and Its Data: It's crucial to keep the web server
running smoothly. Also, we need to ensure that the information on the server
stays unchanged without proper authorization. Plus, we want to limit who gets
2 Securing Data Between the Web Server and the User: We want to guarantee
that the info users share with the web server (like usernames, passwords, or
3 Securing the User's Computer: It's essential to assure users that downloading
information, data, or programs won't harm their systems. If they do, they
might be able to use the service. We also want to ensure that downloaded
● Verifying User and Server Identities: Confirm that the user is who they claim
client and server should be passed promptly, reliably, and without replay.
Addressing these concerns effectively involves collaborating with our three main
10.5 Summary
❖ Packet filter firewall manages the entry to packets by looking at where they come
from and where they're going or by checking the specific type of transport
protocol.
application level.
❖ The proxy server acts as an intermediary, mimicking both sides of this protocol
exchange.
❖ The user connects to the application gateway using a TCP/IP application like HTTP.
❖ The application gateway inquires about the remote host the user wants to
connect to and requests the user ID and password needed to access the
gateway's services.
role.
❖ Encrypted tunnels are set up to ensure that data travelling between two points
❖ Connect entire networks securely, often used for joining branch offices.
11.1 The Secure Communication
multimedia, audio, and conferences. Members within and between groups can
and C cannot access or decrypt the message due to security measures. However, all
teams. For example, when a personal team member needs to send information to
the accounts team, encryption with a shared key is essential. Only the accounts team
can decrypt the information, ensuring secure communication within and between
groups.
The key issues in group communication involve key regeneration and encryption with
shared keys, particularly for inter-group applications. When a member in one team
needs to send a message readable only by another team, a new shared key is
generated and shared. However, this process can lead to communication overhead.
In the related work section, various strategies for secure group communication are
both inter-group and intra-group networks. Two types of polynomials (P and H(x)) are
used for intra-group and inter-group keys, respectively. The process involves dividing
The evaluation section examines the security and efficiency of the proposed key
management. It addresses security against passive and active attacks, the creation of
group and subgroup controllers, and the overhead involved. The use of polynomials
helps minimize storage and communication overhead, providing a more efficient and
Key management is crucial for securing data. Encryption keys play a vital role in
encrypting and decrypting data. If any encryption key is lost or compromised, it could
jeopardize the security measures in place. Keys also ensure secure data transmission
over the internet. Authentication methods, like code signing, can be exploited by
Keys also help in complying with standards and regulations, ensuring companies
There are two main types of cryptographic keys: symmetric and asymmetric.
Symmetric keys are used for data-at-rest, where data is stored in a static location, like
a database. Symmetric key encryption involves using the same key for both
encryption and decryption. Asymmetric keys, on the other hand, use two separate
keys – a public key for encryption and a private key for decryption. Asymmetric keys
unauthorized access. Keys are used by authorized users, and after encryption, they
Key rotation ensures keys are regularly replaced for enhanced security.
Compliance standards and regulations, such as NIST, PCI DSS, FIPS, and HIPAA,
require adherence to best practices for key management. Some key practices include
avoiding hard-coding keys, applying the principle of least privilege, using HSMs for
secure key storage, implementing automation for key lifecycle processes, creating
and enforcing security policies, separating duties related to key management, and
splitting keys into multiple portions for added security.
key management system. Monthly webinars cover key management, public key
infrastructure (PKI), and more. Assessments and training are provided for HSMs, PKIs,
and compliance standards. Weekly blogs offer insights into best practices for key
11.3 Summary
and intranet. Many applications and terminals share access to folders, videos,
permissions.
❖ The key issues in group communication involve key regeneration and encryption
one team needs to send a message readable only by another team, a new shared
Module: 12
Learning Objectives:
Structure:
12.2 Summary
12.3 Keywords
12.5 References
12.1 Security Assurance in Communication
that may disrupt, degrade, or destroy essential services. The evolution of information
assurance has been a crucial response to this growing threat, tracing its roots back to
the 1950s with the development of WWMCCS military decision support systems.
instant backups. The latest advancement includes distributed systems like SANs and
other's goals. They have evolved to be recognized as the pillars of Cyber Security,
mitigating risks.
instant backups.
ensuring survivability.
mitigating risks.
Measures such as backup power, spare data channels, and off-site capabilities
other. For example, increasing information availability can directly oppose the goals
The information assurance process begins with enumerating and classifying assets,
Frameworks like NIST RMF guide this process, ensuring a cost-effective approach to
managing risks.
Managing risks in business involves three key processes: Risk Assessment, Risk
Mitigation, and Evaluation & Assessment. One of the methodologies businesses use
ensuring compliance with federal and international laws, including HIPAA regulations.
Aligning information assurance with corporate strategies is crucial for effective risk
protect users from security risks. While information assurance is effective in ensuring
and speed due to their conflicting nature. Incorporating information assurance into
ensures business continuity, and promotes good governance in both public and
private sectors.
Pretty Good Privacy:
PGP, or Pretty Good Privacy, was created by Phil Zimmermann with the aim of
providing comprehensive security for email communication. The four main security
transmission of emails.
encryption and public key encryption for privacy, involving one hash function, one
secret key, and two private-public key pairs in the digital signature process.
As an open-source software freely available for email security, PGP employs a digital
algorithm for compression, and radix-64 encoding scheme for EMAIL compatibility.
At the sender's end, PGP follows specific steps to create a secure email:
digest.
2. This digest is encrypted, forming a signed digest, using the sender's private key.
4. Both the original message and the signed digest are encrypted using a one-time
5. The secret key is then encrypted using the receiver's public key.
6. The encrypted secret key and the encrypted combination of message and digest
data.
other.
risk management.
❖ PGP, or Pretty Good Privacy, was created by Phil Zimmermann with the aim of
12.3 Keywords
1. PGP - Pretty Good Privacy: PGP, created by Phil Zimmermann, focuses on privacy,
comprehensive security.
more secure?
6. What's message flow confidentiality, and why does it matter for secure
communication?
8. How can using secret codes make sure messages stay private in communication?
9. Explain end-to-end encryption and why it's essential for keeping messages
secure.
10. What difficulties come up when trying to make communication systems more
private?
12.5 References
Hall/CRC.
Thomson
13.1 Knapsack algorithm
Developed in 1978 by Ralph Merkle and Martin Hellman, the Knapsack Encryption
Algorithm gained recognition during the early days of public key cryptography. It was
However, the algorithm lost favour over time. In 1982, Adleman identified a
Despite its decline, the Knapsack Encryption Algorithm played a vital role in shaping
approaches.
How it works:
The Knapsack Encryption Algorithm uses an asymmetric-key system with public and
private keys. Encryption involves converting plaintext into an unreadable form using
the public key, while decryption uses the private key to recover the original message.
The algorithm transforms information into bits multiplied with a sequence from
super-increasing integers. This produces an encrypted code, decipherable only by
The critical generation process's complexity enhances security. Private and public
a unique random private key adds another layer of protection against known
plaintext attacks.
causes over half of the encrypted bits to change randomly. Brute force attacks are
impractical due to the large number of spaces, making them secure when used
correctly.
generation and resistance to brute force attacks, make it suitable for cybersecurity
applications.
a subset of the super increasing sequence in the public key, they could crack the
system. Weak random number generators or poor code implementation may also
compromise security.
use the LLL algorithm to search for short lattice vectors. Careful implementation and
Encryption devices are super important in the world of keeping information safe
One typical spot for these guardians is where the network begins and ends, like at
routers and firewalls. These devices turn data into a secret code before it leaves a
safe zone and then decode it when it reaches its destination. This way, important info
They're also smartly placed in communication pathways like wireless networks and
internet connections. Here, the devices turn data into code as it goes between
devices. This is super handy in case someone tries to eavesdrop. Even if they
intercept it, they will only understand something with the unique key to decode it.
These encryption guardians also hang out in storage areas, like servers or cloud
platforms. They make sure data stays safe even when it's not on the move. Turning
stored data into a secret code, even if someone breaks into the storage, they can
devices are there too. They make sure your chat with the network is super secure,
especially when you're dealing with hush-hush info over public networks.
13.3 Summary
Encryption Algorithm gained recognition during the early days of public key
cryptography.
❖ The algorithm lost favour over time. In 1982, Adleman identified a vulnerability
❖ Despite its decline, the Knapsack Encryption Algorithm played a vital role in
security approaches.
form using the public key, while decryption uses the private key to recover the
original message.
evolved.
❖ The critical generation process's complexity enhances security. Private and public
14.1 Viruses and malware
Malware is software that sneaks into your computer without asking and tries to take
your private information, like your bank details and passwords. It can also be
annoying by showing pop-up ads and changing your computer settings. Malware can
1. Free downloads
A computer virus is a program that harms computer systems and deletes or damages
files. It copies itself to other programs, spreading on its own. The goal is to infect
weak systems, take control, and steal your sensitive data. Hackers create viruses to
trick online users. Signs that your computer might have a virus include:
● Slow performance.
● Boot failure.
5. Stealth: Hides after infection, making detecting it difficult, e.g., Frodo, Joshi.
6. Macro: Associated with software like Word and Excel, spreading through
Preventing Malware: Use security solutions such as firewalls, antivirus, and data leak
prevention systems to prevent malware. Regular testing against the latest attacks
ensures effectiveness. The Cortex XDR agent provides multiple prevention methods,
Malware Detection: Advanced tools like firewalls and Intrusion Prevention Systems
Malware Removal: Antivirus software removes standard infections, and Cortex XDR
❖ People often use the terms "virus" and "malware" interchangeably, but they're
different.
❖ malware is like an umbrella term for any lousy software, no matter how it works,
❖ Viruses spread by hitching a ride on legitimate files and programs. They get
❖ Adware bombards you with annoying ads, while spyware snoops around quietly
❖ To boost defences, IT pros can update and patch apps and systems. This is crucial
to fend off fileless malware, which targets app weaknesses and can't be easily
caught by antimalware.
❖ Encouraging good data security habits, like clever password use and limiting who
14.3 Keywords
1. Worms: These are solo programs that copy themselves and spread through a
network. Unlike viruses, worms don't need your help; they find weak spots in
your system or come through emails pretending to be regular files. The first
2. Boot Sector: Spreads through infected drives used to boot computers, e.g.,
3. Polymorphic: Changes with each infection, making it hard for antivirus programs