Cryptography and Network
Security
PREPARED BY
ANIRBAN BHADRA
CONTENTS
• INTRODUCTION
• SERVICES MECHANISM & ATTACKS
• SECURITY SERVICES
• SECURITY MECHANISM
• SECURITY ATTACKS
• CLASSIFICATION OF SECURITY ATTACKS
• MODEL OF NETWORK SECURITY
• MODEL OF NETWORK ACCESS SECURITY
INTRODUCTION
• Computer Security - generic name for
the collection of tools designed to protect
data and to thwart hackers
• Network Security - measures to protect
data during their transmission
• Internet Security - measures to protect
data during their transmission over a
collection of interconnected networks
SERVICES, MECHANISM
ATTACKS
• need systematic way to define
requirements
• consider three aspects of information
security:
– security attack
– security mechanism
– security service
• consider in reverse order
SECURITY SERVICES
– is something that enhances the security of the
data processing systems and the information
transfers of an organization
– intended to counter security attacks
– make use of one or more security
mechanisms to provide the service
– replicate functions normally associated with
physical documents
• eg. have signatures, dates; need protection from
disclosure, tampering, or destruction; be notarized
or witnessed; be recorded or licensed
SECURITY MECHANISM
• a mechanism that is designed to detect,
prevent, or recover from a security attack
• no single mechanism that will support all
functions required
• however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
• hence our focus on this area
SECURITY ATTACKS
• any action that compromises the security
of information owned by an organization
• information security is about how to
prevent attacks, or failing that, to detect
attacks on information-based systems
• have a wide range of attacks
• can focus of generic types of attacks
• note: often threat & attack mean same
CLASSIFICATION OF
SECURITY ATTACKS
• passive attacks - eavesdropping on, or
monitoring of, transmissions to:
– obtain message contents, or
– monitor traffic flows
• active attacks – modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
CRYPTOGRAPHY
• can be characterized by:
– type of encryption operations used
• substitution / transposition / product
– number of keys used
• single-key or private / two-key or public
– way in which plaintext is processed
• block / stream
TYPES OF CRYPTANALYTIC
ATTACKS
• ciphertext only
– only know algorithm / ciphertext, statistical, can identify
plaintext
• known plaintext
– know/suspect plaintext & ciphertext to attack cipher
• chosen plaintext
– select plaintext and obtain ciphertext to attack cipher
• chosen ciphertext
– select ciphertext and obtain plaintext to attack cipher
• chosen text
– select either plaintext or ciphertext to en/decrypt to attack
cipher
MODEL OF NETWORK
SECURITY
Model for Network Security
• using this model requires us to:
– design a suitable algorithm for the security
transformation
– generate the secret information (keys) used
by the algorithm
– develop methods to distribute and share the
secret information
– specify a protocol enabling the principals to
use the transformation and secret information
for a security service
MODEL FOR NETWORK
ACCESS SECURITY
Model for Network Access Security
• using this model requires us to:
– select appropriate gatekeeper functions to
identify users
– implement security controls to ensure only
authorised users access designated
information or resources
• trusted computer systems can be used to
implement this model