Module 1 Introduction
Module 1 Introduction
GITAM
(Deemed to be University)
The art of secret writing
Non Readable
CRYPTOGRAPHY
Ancient Greek Language
CRYPT GRAPHY
Hidden Writing
Hidden Writing
Alice, Bob and Eve Framework
Public Network
Sender
Receiver
Attacker
CRYPTOGRAPHY
Public Network
Message
Message
Cryptography
Definition
Definition
Public Network
m
Public Network
m
E C
𝑲𝒆
When a plain text message is codifies using any suitable technique, the
resulting message is called as cipher text.
CRYPTOGRAPHY TERMINOLOGY
Public Network
m
E C
𝑲𝒆
E: Encryption Algorithm
Encryption
CRYPTOGRAPHY TERMINOLOGY
Public Network
m
E C
𝑲𝒆 C
D m
𝑲𝒅
: Decryption Algorithm
Decryption
: Decryption Key
CRYPTOGRAPHY TERMINOLOGY
Public Network
m
E C ¿
𝑲𝒆 𝐶
D error
𝑲𝒅
Public Network
m
E C
𝑲𝒆 𝐶
m : Plain Text C : Cipher Text Encryption E: Encryption Algorithm
D m
𝑲𝒅
: Encryption Key Decryption : Decryption Algorithm : Decryption Key
An Enemy , A very smart Person
Crypto System
SYMMETRIC KEY CRYPTOGRAPHY
Public Network
m
E C
𝑲𝒆 𝐶
. D m
.
𝑲𝒅
An Enemy , A very smart Person
One Key On
Key eK
e ey
On
One Key
Key On
ne eK
O ey
One Key
On ey
eK e K
ey
On
ASYMMETRIC KEY CRYPTOGRAPHY
Public Network
m
E C
𝑲𝒆 C
. D m
.
𝑲𝒅
An Enemy , A very smart Person
Public key
Public key
Public key
Key pair
Private Key
Public key
Public key
Key Pair
Key Pair
Public
keys
𝑵𝒖𝒎𝒃𝒆𝒓 𝒐𝒇 𝒌𝒆𝒚𝒔=𝟐∗ 𝑵
Key Pair
Real Time Scenario
AES ECDHE
Along with the CIA additional concepts are Authenticity and Accountability
Levels of Impact
candefine 3 levels of impact from a
security breach
Low
Moderate
High
Low Impact
The loss could be expected to have a limited adverse
effect on organizational operations, organizational
assets, or individuals.
A limited adverse effect means that, for example, the
loss of confidentiality, integrity, or availability might
(i) cause a degradation in mission capability to an
extent and duration that the organization is able to
perform its primary functions, but the effectiveness of
the functions is noticeably reduced;
(ii) result in minor damage to organizational assets;
(iii) result in minor financial loss; or
(iv) result in minor harm to individuals.
Moderate Impact
The loss could be expected to have a serious adverse effect
on organizational operations, assets, or individuals.
A serious adverse effect means that, e.g., the loss might
(i) cause a significant degradation in mission capability to
an extent and duration that the organization is able to
perform its primary functions, but the effectiveness of the
functions is significantly reduced;
(ii) result in significant damage to organizational assets;
(iii) result in significant financial loss; or
(iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
High Impact
The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
A severe or catastrophic adverse effect means that, for
example, the loss might
(i) cause severe degradation in or loss of mission
capability to an extent and duration that the
organization is not able to perform one or more of its
primary functions;
(ii) result in major damage to organizational assets;
(iii) result in major financial loss; or
(iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
Examples of Security
Requirements
confidentiality – student grades
integrity – patient information
availability – authentication service
authenticity – admission ticket
non-repudiation – stock sell order
Computer Security Challenges
1. not simple – easy to get it wrong
2. must consider potential attacks
3. procedures used counter-intuitive
4. involve algorithms and secret info
5. must decide where to deploy mechanisms
6. battle of wits between attacker / admin
7. not perceived to be of benefit until it fails
8. requires regular monitoring a process, not an
event
9. too often an after-thought
10. regarded as impediment to using system
“Unusable security is not secure”
OSI Security Architecture
Kerckhoff's Principle
Crypto System
m : Plain Text
C : Cipher Text
E: Encryption Algorithm
:Encryption Key
: Decryption Key
• Kerckhoff's principle states that Eve knows the system that Alice and Bob use for
information transfer including the coding scheme, the algorithm, the protocol,
and so on. Only unknown to Eve is Key.
Security
Attacks
Security
Attacks
Message Message
Public Network
Public Network
Message Message
Public Network
Message
Message
• Attack on Confidentiality
Public Network
Message
We won lottery
Message
I am Alice
Public Network
Message
Message
Passive
attacks Active
attacks
Passive Attack
Public Network
Message
Message
Read the
message
• Attack on Confidentiality – Read the message
Release of message
Passive attacks
(Interception)
contents
Traffic analysis
Release of message
contents
Observe
Listen the
Communication
Release of Message
Content
Message Public Network
Message
Message
• Passive attacks are difficult to detect because they do not involve any
alteration of the data.
• Neither the sender nor receiver is aware that a third party has read the
messages or observed the traffic pattern
Interception Confidentiality
Active attacks
Modification Integrity
Interruption Availability
Fabrication Authentication 62
Active Attacks
.
Masquerade (Fabrication)
Public Network
Message
Message
I am Alice
Replay involves the passive capture of a data unit and its subsequent retransmission
repeated.
• An attacker captures the network traffic and then sends the communication to its
Message
message to receiver that the pay Rs. 1000. Now receiver receive
the two messages and he believe that Rs. 2000 should be paid to
sender.
Modification Attack
Message
1. Interrupt
2. Fabricate An Enemy , A very smart Person
3. Sends modified
message
Alice, Bob, Eve Framework
Modification Attack
Modification Attack
one packet to 50 are more packets, and also it hides the IP address of the
attacker. If attacker uses the multiple amplifier then the attack called as
• Denial of service (DoS). It may slow down or totally interrupt the service of a system
Need of
Security
Protects
personal
Surveillance identification
information
H
4
H(P)
=?
Decision
Access Control
The prevention of unauthorized use of a resource (i.e. this service controls
who can have access to a resource, under what conditions access can occur,
and what those accessing the resource are allowed to do).
Monitor
Public Network
Data
Data
Message
Public Network
Data Data
Message
Message
Public Network
Data SSaffe Paassswoordd
Data
Message
Connectionless Integrity
1. Origin non-repudiation
It is the proof that the message was sent by the specified party.
2. Destination non-repudiation
It is the proof that the message was received by the specified party.
Origin non-repudiation
Destination non-repudiation
Security Mechanisms
Encipherment
Data Integrity
Digital Signature
Authentication Exchange
Traffic Padding
Access Control
Notarization
Routing Control
98
Encipherment
• Asymmetric encryption
• Symmetric encryption
Encipherment - Asymmetric encryption
Public Network
Data Data
Shared Key
Public Network
Data Data
Public Network
Data Data
Message
Monitor
Enables selection of particular physically secure routes for certain data and allows
routing changes, especially when a breach of security is suspected.
109
Relationship between security
services and mechanisms
110
Relationship between security
services and mechanisms
Relationship between security
services and Attacks
CRYPTANALYSIS
m Public Network
E C C
𝑲𝒆
D m
𝑲𝒅
The process of trying to break any cipher text message to obtain the
original plain text message itself is called as Cryptanalysis, and the
person attempting a cryptanalysis is called a cryptanalyst
A
CRYPTANALYSIS
Knowledge
and Methods
st
a l y
tan C m is
y p lys
Cr a
tan
yp
Cr
An Attacker , A very smart Person
The process of trying to break any cipher text message to obtain the
original plain text message itself is called as Cryptanalysis, and the
person attempting a cryptanalysis is called a cryptanalyst
A
CRYPTANALYTIC ATTACKS
1. Ciphertext Only
2. Known plaintext
3. Chosen plaintext
4. Chosen Ciphertext
CIPHERTEXT ONLY
CRYPTANALYSIS -
Knowledge
and Methods CRYPTANALYTIC ATTACK Crypto System
m
m : Plain Text
st
a l y
tan C C : Cipher Text
y p
Cr
E: Encryption Algorithm
:Encryption Key
• The attacker tries every possible key on a piece of cipher text until an intelligible
translation into plaintext is obtained. On average, half of all possible keys must be
tried to achieve success.
• If the key space is very large, brute force attack becomes impractical.
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACKS
DES
AES
Triple
DES
considers the results for a system that can process 1 million keys per microsecond.
As you can see,
at this performance level, DES can no longer be considered computationally secure
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACK
Statistical Attack
• To use this approach, the opponent must have some general idea of the
type of plaintext that is concealed, such as English or French text, an
EXE file, a Java source listing, an accounting file, and so on.
CIPHERTEXT ONLY -
CRYPTANALYTIC ATTACK
Relative frequency of the letters in English text
For Example: Letter E is the most frequently used letter in English text
Early to bed, and early to rise, makes a man healthy, wealthy and wise.
KNOWN PLAINTEXT -
Crypto System
CRYPTANALYTIC ATTACK
Knowledge
and Methods
m : Plain Text
st
a l y
tan {m, c} Key C : Cipher Text
y p
Cr
E: Encryption Algorithm
:Encryption Key
: Decryption Key
• All future and past messages encrypted with that key are compromised.
CHOSEN PLAINTEXT -
Crypto System
CRYPTANALYTIC ATTACK
Knowledge
and Methods
m : Plain Text
st
a l y
tan C : Cipher Text
yp E key
Cr
E: Encryption Algorithm
:Encryption Key
: Decryption Key
m : Plain Text
st
a l y
tan C : Cipher Text
yp D key
Cr
E: Encryption Algorithm
:Encryption Key
: Decryption Key
st
a l y
tan C m is
y p lys
Cr a
tan
yp
Cr
An Attacker , A very smart Person