Lecture 1
Lecture 1
6CCS3CIS / 7CCSMCIS
Department of Informatics
King’s College London, UK
Lecture 1
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 1
Pleased to meet you
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 2
About myself: Research (and teaching)
Deduction systems
and combination
of logics Analysis of
"
"
""
"
"" distributed
Security protocol "
"
"
"
"
"
""
"
""
"
"
"
"
"
" security
analysis tools (OFMC,"""
"
"
""
"
"
architectures
"
""
"
"
"
""
AVANTSSAR, ...)
"
"
Theoretical research
Formal Methods: Techniques and tools based on mathematics and logic that support
the specification, construction and analysis of hardware and software systems.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 3
About myself: wordle of my research papers
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 4
And you are?
Programmes: BSc, MSci, MSc
BSc Computer Science, Year 3
BSc Computer Science with Management, Year 3
BSc Computer Science with Management and a Year
Abroad, Year 4
BSc Computer Science with Management and a Year in
Industry, Year 4
BSc Computer Science with a Year Abroad, Year 4
MSci in Computer Science, Year 3
BSc Computer Science with a Year in Industry, Year 4
Mathematics and Computer Science, Year 3
MSc in Advanced Computing
MSc in Computing & Internet Systems
MSc in Computing & Security
MSc in Computing, IT Law & Management
MSc in Web Intelligence
MSci Computer Science
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 5
Coordinates
Credit level: 6 / 7 Credit value: 15 Exam: Written examination (2 hours)
KEATS: slides, exercises and general material
Slides available before lectures
Watch for corrections (new versions with errata lists)
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 6
Objectives: for you
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 7
Objectives: for me
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 8
Learning aims & outcomes
Format: mainly frontal lectures, but some practicals and exercises
Learning aims & outcomes:
To introduce both theoretical and practical (and technological)
aspects of cryptography and information security.
On successful completion of this module, students should be able to
understand the relevant mathematical techniques associated with
cryptography;
understand the principles of cryptographic techniques and perform
implementations of selected algorithms in this area; and
appreciate the application of security techniques in solving real-life
security problems in practical systems.
Please note that this module contains several advanced mathematical techniques.
This should not be a problem for students with a reasonable mathematical
background. Explanations are given during the lectures/tutorials and examples are
studied in detail.
Nevertheless, an in-depth understanding of these techniques is required for the
examination and personal work should be anticipated.
Complementary (and introductory) to other modules in security.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 9
Syllabus and general information
Basic terminology and concepts:
Goals of cryptography, terminology and notation, players
Basic cryptographic functions
Number theory:
Congruent modulo n, equivalent class modulo n
Integer modulo n (Zn)
Multiplicative inverse
Relatively prime
Euler’s theorem
Fermat’s little theorem
EEA (Extended Euclidean Algorithm)
CRT (Chinese Remainder Theorem)
Ciphers:
Block ciphers (substitution, transposition, product)
Stream ciphers
Modes of operation (ECB, CBC, CFB, OFB)
Cryptosystems:
Block cipher: DES (Data Encryption Standard), AES (Advanced Encryption
Standard)
Public-key: RSA (Rivest-Shamir-Adleman), El Gamal
One-way hash function: SHA and MD5 (Message Digest 5)
Password hashing and salting
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 10
Syllabus and general information
Key-establishment protocols:
Symmetric and asymmetric techniques (Diffie-Hellman, Needham-Schroeder,
Otway-Rees)
Public-key encryption
Basic and advanced Kerberos protocols
Authentication and identification:
Concepts
Fiat-Shamir and Feige-Fiat-Shamir protocols
Zero-knowledge identification protocol
Digital signatures:
Classification
Digital signature schemes: RSA; EI-Gamal; DSA (Digital Signature Algorithm) and
DSS (Digital Signature Standard)
Information Security:
Password systems: number of acceptable passwords for a given password policy,
exhaustive search password ageing
Introduction to viruses, secure communication, social engineering (phishing),
firewall, buffer overflow, denial of services
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 11
Recommended reading
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 12
Calendar
To be revised as the weeks go by... lecture will include (and sometimes
be substituted by) tutorials
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 13
Outline
1 Motivation
E-Government as an example
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 14
Motivation
Table of contents I
1 Motivation
E-Government as an example
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 15
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 18
Motivation
The only truly secure system is one that is powered off, cast in
a block of concrete and sealed in a lead-lined room with armed
guards — and even then I have my doubts.
Eugene H. Spafford, Purdue University, often misquoted as
The only system which is truly secure is one which is switched
off and unplugged, locked in a titanium lined safe, buried in a
concrete bunker, and is surrounded by nerve gas and very
highly paid armed guards. Even then, I wouldn’t stake my life on it.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 19
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 20
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 21
Motivation
Security Trends
4500
4000
3500
vulnerabilities 2500
2000
1000
devices 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
Response Team (CERT) 1995 1996 1997 1998 1999 2000 2001 2002 2003
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 22
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 23
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 24
Motivation
Where? Everywhere!
Computing: The net is the computer!
Must assure selective access to machines,
programs, data, computational resources, etc.
Privacy of data, activities, . . . .
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 26
Motivation
Where? Everywhere!
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 27
Motivation
Where? Everywhere!
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 28
Motivation
Where? Everywhere!
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 29
Motivation
Where? Everywhere!
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 30
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 31
Motivation
Attacker Models
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 33
Motivation
Attacker Models
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 34
Motivation
Attacker Models
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 35
Motivation
Attacker Models
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 36
Motivation
Where? Everywhere!
Infrastructures: energy, water, . . .
Transport: cars, trains, planes, . . .
See, e.g., INTEL’s Best Practices white paper on “Automotive
Security”; cf. also “How automakers can beef up cybersecurity in
the era of the Internet-connected car”, TIME magazine, 09/2015.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 37
Motivation
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 38
Motivation
Where? Everywhere!
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 39
Motivation E-Government as an example
Table of contents I
1 Motivation
E-Government as an example
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 40
Motivation E-Government as an example
What is e-government?
E-government is the use of information technology (in particular the Internet)
to create or improve services between customers and governments.
Customer
Citizens
(A2C , administration to citizen)
Internet
(Partner− )administrations, courts, ...
Administration (A2A, administration to administration)
as
Service Provider
Examples of e-government
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 42
Motivation E-Government as an example
Intranet Internet
E lectronic
Archiving Web− presentation
P aperless
Office E mail
Workflow center
Document
Management Online− Forms
Knowledge−
base
Administration Customer
=⇒
=⇒
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 44
Motivation E-Government as an example
And more!
Continent Only XSS Only SQL XSS and SQL XSS or SQL None
Africa (61) 14.75 (9) 0.00 (0) 34.43 (21) 49.18 (30) 50.82 (31)
Asia (55) 9.09 (5) 0.00 (0) 76.36 (42) 85.45 (47) 14.55 (8)
Europe (53) 7.55 (4) 0.00 (0) 83.02 (44) 90.57 (48) 9.43 (5)
North America (34) 20.59 (7) 2.94 (1) 52.94 (18) 76.47 (26) 23.53 (8)
Oceania (25) 24.00 (6) 0.00 (0) 28.00 (7) 52.00 (13) 48.00 (12)
South America (17) 17.65 (3) 0.00 (0) 52.94 (9) 70.59 (12) 29.41 (5)
Table 1: Percentages of vulnerabilities in E-Governments for each continent. Number of countries enclosed in
parenthesis. Note that some countries are counted for more than one continent, e.g. Russia belongs to both Europe
and Asia.
Country category Only XSS Only SQL XSS and SQL XSS or SQL None
Clean
1st World (32) 6.25 (2) 0.00 (0) 90.63 (29) 96.88 (31) 3.12 (1)
2nd World (31) 9.68 (3) 0.00 (0) 80.64 (25) 90.32 (28) 9.68 (3)
SQL and XSS
3rd World (50) 18.00 (9) 0.00 (0) 32.00 (16) 50.00 (25) 50.00 (25) XSS only
G8 (8) 0.00 (0) 0.00 (0) 100.00 (8) 100.00 (8) 0.00 (0)
Clean
Table 2: Percentages of vulnerabilities in E-Governments for different country categories. Number of countries
enclosed in parenthesis. Note that not all of the 244 countries are included in the statistic for 1st, 2nd, and 3rd
World, we used the countries listed on (nationsonline.org, 2005).
SQL and XSS
XSS only
AFRICA ASIA
Vulnerabilities in e-governments,
Clean V. Moen et al., University of Bergen, 2006.
Clean
XSS only
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 46
What is Information Security?
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 47
What is Information Security?
Information Security
Computer security deals with the prevention and detection of
unauthorized actions by users of a computer system.
Authorization is central to definition.
Sensible only relative to a security policy, stating who (or what) may
perform which actions.
Network security consists of the provisions made in an underlying
computer network infrastructure, policies adopted by the network
administrator to protect the network and the network-accessible
resources from unauthorized access and the effectiveness (or
lack) of these measures combined together.
Information security is (perhaps) even more general: it deals with
information independent of computer systems.
Note that information is more general than data. Data conveys
information. But information may also be revealed, without revealing
data, e.g., by statistical summaries.
Constitutes a basic right: protection of self (possessions, ...).
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 48
What is Information Security?
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 49
Dramatis personae of cryptography and information security
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 50
Dramatis personae of cryptography and information security
Internet&or&other&insecure&
communica/on&facility&
Agents (principals)
Alice& Bob&
(an&honest&principal)& (an&honest&principal)&
Charlie&
(an&a6acker)&
Following a long-standing tradition in (security) protocols, throughout the
course we’ll consider the following agents (a.k.a. principals):
Honest agents:
Alice, Bob, Carol, ... agents communicating with each other
(e.g. client and bank, bank and bank, client and online shop, ...)
Dishonest agents (a.k.a. attackers, intruders, ...):
Eve: an eavesdropper (i.e., a passive attacker who only listens)
Charlie, Mallory and Zoe: malicious, active attackers
Trusted and/or neutral:
Simon and Trent: (trusted) servers
Peggy and Victor: prover and verifier (zero-knowledge protocols)
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 51
Two common views of Information Security (and properties/goals)
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 52
Two common views of Information Security (and properties/goals)
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 53
Two common views of Information Security (and properties/goals) Security as policy compliance
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 54
Two common views of Information Security (and properties/goals) Security as policy compliance
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 55
Two common views of Information Security (and properties/goals) Security as policy compliance
In security
Specification: Policy
Implementation: Mechanism (employed in system)
Correctness: Compliance
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 56
Two common views of Information Security (and properties/goals) Security as policy compliance
Security policy states what system behavior is, and is not, allowed.
Security mechanisms are used to enforce the policy,
Returning to analogy with correctness:
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 57
Two common views of Information Security (and properties/goals) Security as policy compliance
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 59
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 60
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 61
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Internet&or&other&insecure&
communica/on&facility&
Alice& Bob&
Reads&contents&of&message&
from&Alice&to&Bob&
Charlie&(or&Eve)&
(an&a4acker)&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 62
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Internet&or&other&insecure&
communica/on&facility&
Alice& X&Cannot&read&contents&of&message&
Bob&
from&Alice&to&Bob&
Charlie&(or&Eve)&
(an&a4acker)&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 63
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Confidentiality
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 64
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Internet&or&other&insecure&
communica/on&facility&
?& ?&
Does¬&know&the&iden/ty&of&
the&sender&and&the&receiver&
Charlie((or(Eve)(
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 66
Two common views of Information Security (and properties/goals) Traditional security properties/goals
A.ack&against&integrity&(ac6ve&a.ack)&
Internet&or&other&insecure&
communica/on&facility&
Alice& Bob&
Modifies&message&
from&Alice&to&Bob&
Charlie&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 67
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Integrity&
Internet&or&other&insecure&
communica/on&facility&
X&
Alice& Bob&
Cannot&modify&message&
from&Alice&to&Bob&
Charlie&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 68
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Integrity
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 69
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Integrity
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 70
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Security properties
Confidentiality information is not learned by unauthorized principals
Integrity data has not been (maliciously) altered
Availability data/services can be accessed when desired
A.ack&against&availability&
Internet&or&other&insecure&
communica/on&facility&
X&
Alice& Bob&
Disrupts&the&communica/on&between&&
Alice&and&Bob&(e.g.,&disrupts&the&service&&
provided&by&a&server)&
Charlie&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 71
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Availability
Data or services can be accessed in a reliable and timely way
Threats to availability cover many kinds of external environmental
events (e.g., fire, pulling the server plug) as well as accidental or
malicious attacks in software (e.g., infecting a system with a
debilitating virus).
In computer security we’re concerned with protecting against the
second kind of threat, rather than providing more general forms of
fault-tolerance or dependability assurance.
Ensuring availability means preventing denial of service (DoS)
attacks, insofar as this is possible. It’s possible to fix attacks on
faulty protocols, but attacks exhausting available resources are
harder, since it can be tricky to distinguish between an attack and
a legitimate use of the service.
Example violations: the deadly distributed DoS (DDoS) attacks
against on-line services; interfering with IP routing.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 72
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Availability
Mechanism Fire-walls,
virus-scanners, backups,
redundant hardware, secure
operating systems, etc.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 73
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Accountability&
Internet&or&other&insecure&
communica/on&facility&
Alice& Bob&
“I&sent&the&message”& “I&received&the&message”&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 74
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Accountability
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 75
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Internet&or&other&insecure&
communica/on&facility&
-------------------Alice- ----------Bob-
- -
“I&did¬&send&the&message”& “I&did¬&receive&the&message”&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 76
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Internet&or&other&insecure&
communica/on&facility&
Alice& Bob&
Masquerades&as&
Alice&to&Bob&
Charlie&
“Hi,&I&am&Alice”&
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 77
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Authentication
Data or services available only to authorized identities
Authentication is verification of identity of a person or system.
Some form of authentication is a pre-requisite if we wish to allow
access to services or data to some people but deny access to
others, using an access control system.
Methods for authentication are often characterised as:
something you have, e.g. an entrycard,
something you know, e.g. a password or secret key, or
something you are, e.g. a fingerprint, signature, biometric.
Also, where you are may be implicitly or explicitly checked.
Several methods can be combined for extra security.
Examples of violation: using cryptanalysis to break a
cryptographic algorithm and learn a secret key; purporting to be
somebody else (identity theft) by faking email, IP spoofing, or
stealing a private key and signing documents.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 78
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Authentication
Example
Mechanisms
Individuals: who one is, what one has, or what one knows.
Processes, Data: cryptographic protocols, digital signatures,
etc.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 79
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Authorization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 80
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Security properties
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 81
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Distinction is fuzzy!
Properties generally high-level and abstract.
Policy may just be the conjunction of different properties.
Alternatively, policy may be more low-level and operational,
e.g., comprised of rules like “strong passwords should be used”.
Mechanisms are concrete, e.g., implementation components.
Analogy with correctness: specifications at different abstraction
levels ranging from “what” (behavior) to “how” (design/code).
Boundary with other non-security properties also fuzzy.
Functional correctness: system behaves “properly”.
Reliability: no accidental failures, even in adverse circumstances.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 82
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 83
Two common views of Information Security (and properties/goals) Traditional security properties/goals
In this crowded composition, Bingham suggests the inclusiveness of a democracy with representatives of every age and social
stratum — except, of course, African Americans, who would not enjoy the right to vote until after the Civil War, and women, whose
right to participate would not be recognized for another seventy years. The painting reveals other irregularities in the electoral
system that would not be tolerated today. Because there was no system of voter registration, the man in red at the top of the
courthouse steps swears on the Bible that he hasn’t already cast a vote. Because there was no secret (or even paper) ballot, a
voter calls out his choice to the election clerks behind the judge, who openly record it in a ledger. Because there were no
restrictions on electioneering, the well-dressed gentleman behind the voter — evidently one of the candidates – is free to hand his
card to citizens just before they cast their vote. Yet none of this appears to dull the spirit of the voting process.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 86
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 88
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Protection countermeasures
Prevention. We try to prevent security breaches by system design
and employing appropriate security technologies as defences. For
example, using a firewall to prevent external access to corporate
intranets. Prevention is the most important protection measure.
Detection. In the event of a security breach, we try to ensure that
it will be detected. This is particularly pertinent in computer
security, where "theft" of a file does not imply denial of access for
the owner. Logging and MACs (file hashes to detect alteration) are
primary methods of detection, although intrusion detection
systems which actively watch for intruders are becoming more
common.
Response. In the event of a security breach, we should have
some arrangement in place to respond or recover the assets.
Responses range from restoring backups through to informing
appropriate concerned parties or law-enforcement agencies.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 89
Two common views of Information Security (and properties/goals) Traditional security properties/goals
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 90
Two common views of Information Security (and properties/goals) Security as risk minimization
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 91
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 92
Two common views of Information Security (and properties/goals) Security as risk minimization
that
Threat agents exploit
leading to
risk to
give rise to that increase
threats
to
assets
wish to abuse and/or may damage
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 94
Two common views of Information Security (and properties/goals) Security as risk minimization
Owners
Information Security impose
countermeasures
to reduce wish
to
minimize
that may be
as risk minimization (cont.) that may possess
reduced by
value
vulnerabilities
that
Threat agents exploit
leading to
risk to
give rise to that increase
threats
to
assets
wish to abuse and/or may damage
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 95
Two common views of Information Security (and properties/goals) Security as risk minimization
Threat agents
In increasing order of severity
Employees making unintentional
blunders.
Hackers driven by technical
challenge.
Disgruntled employees or customers.
Criminals interested in personal gain.
Organized crime interested in
financial gain.
Organized terrorist groups.
Foreign espionage agents.
Information-warfare operations
intended to disrupt weapons or
command structures. or ?
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 96
Two common views of Information Security (and properties/goals) Security as risk minimization
Threats
Vulnerabilities
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 98
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 99
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 102
Two common views of Information Security (and properties/goals) Security as risk minimization
Owners
Risk analysis and impose
countermeasures
to reduce wish
to
minimize
that may be
reduction steps that may possess
reduced by
value
vulnerabilities
that
Threat agents exploit
leading to
risk to
give rise to that increase
threats
to
assets
wish to abuse and/or may damage
Part I. Analysis of existing risks:
1. Identify assets you wish to protect.
What are the (information) assets and their functionalities?
2. Identify risks to these assets.
Requires understanding threat agents and their threats as
well as vulnerabilities.
Part II. Analysis of proposed security solution:
3. How well do proposed countermeasures reduce risk?
4. What other risks and tradeoffs do measures themselves
bring?
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 103
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 104
Two common views of Information Security (and properties/goals) Security as risk minimization
Evaluation of PGP as
a possible good solution:
3. Effectiveness: high provided it is used correctly.
4. New risks and tradeoffs:
Key exchange time consuming and requires some sophistication.
Users must learn, and properly apply, new mailer functionalities.
Conclusion: PGP is good solution for ensuring confidentiality of
sensitive information mailed between knowledgeable partners.
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 105
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 106
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 107
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 108
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 109
Two common views of Information Security (and properties/goals) Security as risk minimization
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 110
Conclusions
Table of contents I
1 Motivation
5 Conclusions
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 111
Conclusions
Conclusions
Security is an enabling technology.
Security is power! E.g., in e-government:
IT processes are used to model and realize government
processes. The ability to access and modify data/processes is
equal to the ability spy on the most private details of government
and its citizens as well as to change the working of the
government itself!
Security is interdisciplinary
IT Security
Legal Context Business Processes
Distributed Computing Formal Methods Software Engineering
Networks Cryptography Operating Systems
Additional bibliography
Luca Viganò (King’s College London) Cryptography and Information Security Lecture 1, First term 2015/16 113