Ccs Module 2
Ccs Module 2
Cyber Security
Ebey S.Raj
Introduction
The art of war teaches us to rely not on the likelihood of the
enemy's not coming, but on our own readiness to receive him;
not on the chance of his not attacking, but rather on the fact
that we have made our position unassailable.
—The Art of War, Sun Tzu
Background
• Information Security requirements have changed in recent
times
• Traditionally provided by physical and administrative
mechanisms
• Computer use requires automated tools to protect files
and other stored information
• Use of networks and communication links requires
measures to protect data during transmission.
Definitions
• Computer Security - generic name for the
collection of tools designed to protect data and to
thwart hackers
• Network Security - measures to protect data
during their transmission
• Internet Security - measures to protect data
during their transmission over a collection of
interconnected networks
Aim of Course
• Our focus is on Internet Security
• Consists of measures to deter, prevent, detect, and correct
security violations that involve the transmission & storage
of information
Security Goals
Security Goals
• Confidentiality
• Most common aspect of information security.
• Protect our confidential information
• Applies to the storage of the information as well as to
the transmission of information.
Security Goals
• Integrity
• Changes need to be done only by authorized entities
and through authorized mechanisms.
• Assurance that data received are exactly as sent by an
authorized entity.
Security Goals
• Availability
• Information created and stored by an organization
needs to be available to authorized entities.
• Information is useless if it is not available.
Security Trends
Security Trends
Security Trends
Security Trends
Security Trends
Security Trends
Security Trends
Security Trends
OSI Security Architecture
• ITU-T X.800 “Security Architecture for OSI”
• Defines a systematic way useful for managers as a way of
organizing the task of providing security.
Aspects of Security
• Security attack
• Any action that compromises the security of information
owned by an organization
• Security mechanism
• A process that is designed to detect, prevent or recover from a
security attack.
• Security service
• A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization.
THREATS AND ATTACKS
• Threats
• A potential for violation of security, which exists when there is a
circumstance, capability, action, or event that could breach
security and cause harm.
• A threat is a possible danger that might exploit a vulnerability.
• Attack
• An assault on system security that derives from an intelligent
threat
• An intelligent act that is a deliberate attempt to evade security
services and violate the security policy of a system
Security Attacks
• Any action that compromises the security of information
owned by an organization
• Information security is about how to prevent attacks, or
failing that, to detect attacks on information-based
systems
• Have a wide range of attacks
• Can focus of generic types of attacks
• passive
• active
Security Attacks
• Passive Attacks
• A passive attack attempts to learn or make use of information from
the system but does not affect system resources.
• Active Attacks
• An active attack attempts to alter system resources or affect their
operation.
Security Attacks
• Passive Attacks
• Opponents could not extract information from the message.
• Only determine the location, identity of communicating hosts,
frequency and length of messages being transmitted
• Two types
• Release of Message Contents
• Traffic Analysis
Passive Attacks
Ebey S.Raj
OSI Security Architecture
• ITU-T X.800 “Security Architecture for OSI”
• Defines a systematic way useful for managers as a way of
organizing the task of providing security.
Security Services
• Enhance security of data processing systems and information
transfers of an organization
• Intended to counter security attacks
• Using one or more security mechanisms
• often replicates functions normally associated with physical
documents
• which, for example, have signatures, dates; need protection from
disclosure, tampering, or destruction; be notarized or witnessed; be
recorded or licensed
Security Services
• X.800:
“a service provided by a protocol layer of communicating open systems,
which ensures adequate security of the systems or of data transfers”
• RFC 2828:
“a processing or communication service provided by a system to give a
specific kind of protection to system resources”
Security Services
• Security services implement security policies and are
implemented by Security mechanisms.
• X.800 has defined five services, related to the security goals
and attacks.
Security Services (X.800)
• Data Confidentiality –protection of data from
unauthorized disclosure
• Data Integrity - assurance that data received is as
sent by an authorized entity
• Authentication - assurance that the communicating
entity is the one claimed
• Non-Repudiation - protection against denial by one
of the parties in a communication
• Access Control - prevention of the unauthorized use
of a resource
Data Confidentiality
• Designed to protect data from disclosure attack.
• Encompasses
• Confidentiality of the whole message or part of a message (Prevent
snooping).
• Protection against traffic analysis (Prevent traffic analysis attack).
Data Integrity
• Designed to protect data from modification, insertion,
deletion and replaying by an adversary.
• May protect the whole message or part of the message.
Authentication
• Provides authentication of the party at the other end of the
line.
• In connection-oriented communication,
• Provides authentication of the sender or receiver during the
connection establishment.(Peer entity Authentication)
• In connection less communication,
• Provides authentication of the source of the data(Data origin
authentication).
Non-Repudiation
• Protects against repudiation by either the sender or the receiver
of the data.
• Nonrepudiation with proof of the origin
• Receiver of the data can later prove the identity of the sender if
denied.
• Nonrepudiation with proof of delivery
• Sender of the data can later prove that data were delivered to the
intended recepient.
Access Control
• Provides protection against unauthorized access.
• Ability to limit and control the access to host systems and
applications via communications links.
• Each entity trying to gain access must first be identified, or
authenticated.
Security Mechanism
• Mechanisms designed to detect, prevent, or recover from a
security attack
• No single mechanism will support all services required.
Security Mechanism
Security Mechanisms
• Encipherment
• Hiding or covering data for providing confidentiality
• Use of mathematical algorithms to transform data into a form
that is not readily intelligible.
• Two techniques
• Cryptography
• Steganography
Security Mechanisms
• Data integrity
• Mechanisms used to assure the integrity of a data unit or
stream of data units.
• Appends to the data, a short check value that has been created
from the data itself using a specific process.
• Receiver, upon receiving data and the check value, creates new
check value from the data and compare it with the received
check value.
• If the two check values are same, the integrity of the data has
been preserved.
Security Mechanisms
• Digital signatures
• Means by which the sender can electronically sign the data and
the receiver can electronically verify the signature.
• Sender owns a public key, which was already publicly
announced, and a related private key.
• Sender uses its private key for signing the data and the receiver
uses the sender’s public key for verifying the data.
Security Mechanisms
• Authentication exchange
• Two communicating entities exchange some messages to prove
their identity to each other.
• Eg: one entity can prove that she knows a secret that only she
is supposed to know.
• Traffic padding
• Insertion of some bogus data into the data traffic to prevent
adversary’s attempt to use the traffic analysis.
Security Mechanisms
• Routing control
• Selecting and continuously changing different available routes
between the sender and the receiver to prevent the opponent
from eavesdropping on a particular route.
• Notarization
• Use of a trusted third party to control the communication
between two entities, to prevent repudiation.
• Access Control
• Use methods to prove that a user has access right to the data or
resources owned by a system.
• Eg: Passwords and PINs
Relation between services and mechanisms
Security Services Security Mechanisms
Data Encipherment and Routing control
Confidentiality
Data Integrity Encipherment, Digital signature and Data integrity
Authentication Encipherment, Digital signature and Authentication
Exchange
Nonrepudiation Digital signature, Data integrity and Notarization
Access control Access control mechanisms
References
• Behrouz A. Forouzan and Debdeep Mukhopadhyay,
Cryptography & Network Security, Second Edition, Tata
McGraw Hill, New Delhi, 2010
• W. Stallings, “Cryptography and Network Security Principles
and practice”, 3/e, Pearson Education Asia, 2003.
Cryptography
Ebey S.Raj
Introduction
• Human being from ages had two inherent needs
• to communicate and share information and
• to communicate selectively.
• Only the intended people could have access to the information.
7
Classification of Cryptosystems
• Fundamentally, there are two types of cryptosystems
• Symmetric Key Cryptosystem
• Asymmetric Key Cryptosystem
9
Symmetric Key Cryptosystem
• General idea of Symmetric Key Cryptosystem
13
Asymmetric Key Cryptosystems
• Most significant advance in the 3000 year history of
cryptography
• Encryption key and Decryption key are different.
19
Cryptanalysis Attacks
• There are four common types of Cryptanalysis attacks
24
Chosen-plaintext Attack
28
Confusion
• Makes relationship between the statistics of the cipher text and
the value of the encryption key as complex as possible.
• It should be difficult to deduce the key, even if the attacker gets
29
References
• Behrouz A. Forouzan and Debdeep Mukhopadhyay,
“Cryptography & Network Security”, Second Edition, Tata
McGraw Hill, New Delhi, 2010
• https://www.tutorialspoint.com/cryptography/cryptosystems.ht