The Osi Security Architecture: Replay Involves The Passive Capture of A Data Unit and Its Subsequent
The Osi Security Architecture: Replay Involves The Passive Capture of A Data Unit and Its Subsequent
The Osi Security Architecture: Replay Involves The Passive Capture of A Data Unit and Its Subsequent
SECURITY ATTACKS
1.) A passive attack attempts to learn or make use of information from the
system but does not affect system resources.Two Types:
a)The release of message contents A telephone conversation, an
electronic mail message, and a transferred file may contain sensitive or
confidential information.
Passive attacks are very difficult to detect, because they do not involve any
alteration of the data.However, it is feasible to prevent the success of these
attacks, usually by means of encryption.Thus, the emphasis in dealing with
passive attacks is on prevention rather than detection.
Replay involves the passive capture of a data unit and its subsequent
retransmission to produce an unauthorized effect (Figure 1.3b).
Modification of messages simply means that some portion of a legitimate
message is altered, or that messages are delayed or reordered, to produce
an unauthorized effect (Figure 1.3c). For example, a message meaning Allow
John Smith to read confidential file accounts is modified to mean Allow Fred
Brown to read confidential file accounts.
Security Services:
AUTHENTICATION
The assurance that the communicating entity is the one that it claims to be.
Peer Entity Authentication
Used in association with a logical connection to provide
confidence in the identity of the entities connected.
Data-Origin Authentication
In a connectionless transfer, provides assurance that the source
of received data is as claimed.
ACCESS CONTROL
The prevention of unauthorized use of a resource (i.e., this service controls
who can have access to a resource, under what conditions access can occur,
and what those accessing the resource are allowed to do).
DATA CONFIDENTIALITY
The protection of data from unauthorized disclosure.
Connection Confidentiality
The protection of all user data on a connection.
Connectionless Confidentiality
The protection of all user data in a single data block
Selective-Field Confidentiality
The confidentiality of selected fields within the user data on a
connection or in a single data block.
Traffic-Flow Confidentiality
The protection of the information that might be derived from
observation of traffic flows.
DATA INTEGRITY
The assurance that data received are exactly as sent by an authorized entity
(i.e., contain no modification, insertion, deletion, or replay).
Connection Integrity with Recovery
Provides for the integrity of all user data on a connection and detects
any modification, insertion, deletion, or replay of any data within an
entire data sequence, with recovery attempted.
Connection Integrity without Recovery
As above, but provides only detection without recovery.
Selective-Field Connection Integrity
Provides for the integrity of selected fields within the user data of a
data block transferred over a connection and takes the form of
determination of whether the selected fields have been modified,
inserted, deleted, or replayed.
Connectionless Integrity
Provides for the integrity of a single connectionless data block and may
take the form of detection of data modification. Additionally, a limited
form of replay detection may be provided.
Selective-Field Connectionless Integrity
Provides for the integrity of selected fields within a single
connectionless data block; takes the form of determination of whether
the selected fields have been modified.
NONREPUDIATION
Provides protection against denial by one of the entities involved in
communication of having participated in all or part of the communication.
Nonrepudiation, Origin
Proof that the message was sent by the specified party.
Nonrepudiation, Destination
Proof that the message was received by the specified party.
Security Mechanisms:
Cryptograpgy:
Cryptography is the science of using mathematics to encrypt and decrypt
data. Cryptography enables you to store sensitive information or transmit it
across insecure networks (like the Internet) so that it cannot be read by
anyone except the intended recipient.
Conventional cryptography
So starting with
ABCDEFGHIJKLMNOPQRSTUVWXYZ
DEFGHIJKLMNOPQRSTUVWXYZABC
Encryption C=(M+k)mod 26
Decryption M=(C-k)mod 26
W...E...C...R...L...T...E
.E.R.D.S.O.E.E.F.E.A.O.C.
..A...I...V...D...E...N..
Then reads off:
2)Columnar transposition
In a columnar transposition, the message is written out in rows of a fixed
length, and then read out again column by column, and the columns are
chosen in some scrambled order.
632415
WEARED
ISCOVE
REDFLE
EATONC
EQKJEU
Providing five nulls (QKJEU) at the end. The ciphertext is then read off as:
632415
WEARED
ISCOVE
REDFLE
EATONC
E
This results in the following ciphertext:
EVLNA CDTES EAROF ODEEC WIREE
Steganography:
Two methods of hiding plain text
1)cryptography(encrypted)-shows the unintelligent message to the
world
2)steganography(strictly not encrypted)-hides the exiistence of
message
Steganography is the hiding of a secret message within an ordinary
message and the extraction of it at its destination.
Steganography takes cryptography a step farther by hiding an
encrypted message so that no one suspects it exists.
anyone scanning your data will fail to know it contains encrypted data.
eg the sequence of first letters of each word of the overall message spells out the
hidden message.
Hello how are you.where do you live.
message:HHAYWDYL
Fiestel Cipher:
Feistel cipher is a symmetric structure used in the construction of block ciphers.A large set
of block ciphers use the scheme, including the Data Encryption Standard (DES).
Key Generation
3 5 2 7 4 10 1 9 8 6
6 3 7 4 8 5 10 9
2 631 4 857
4 1232341
The Data Encryption Standard (DES) is a symmetric key block cipher which
takes 64-bit plaintext and 56-bit key as an input and produces 64-bit cipher
text as output. The DES function is made up of P and S-boxes. P-boxes
transpose bits and S-boxes substitute bits to generate a cipher.
(Three Diagrams)
Strength- The strength of DES lies on two facts:
The use of 56-bit keys: 56-bit key is used in encryption, there are 2^55
possible keys. A brute force attack on such number of keys is
impractical.
The nature of algorithm: Cryptanalyst can perform cryptanalysis by
exploiting the characteristic of DES algorithm but no one has
succeeded in finding out the weakness.
timimg attack
Number of attacks
(Plaintext size=64bit)diffusion and confusion is made more
complex(Avalanche effect)
S-DES(Simplified DES)