0% found this document useful (0 votes)
145 views15 pages

Cryptography and Network Security Guide

This document discusses cryptography and network security. It introduces computer security, network security, and internet security. It then covers security services, mechanisms, and attacks. It defines authentication, authorization, confidentiality, integrity, and non-repudiation as key security services. Security mechanisms use cryptography to provide these services. The document classifies security attacks and describes cryptographic techniques like encryption algorithms. It presents models for network security and network access security.

Uploaded by

Anirban Bhadra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views15 pages

Cryptography and Network Security Guide

This document discusses cryptography and network security. It introduces computer security, network security, and internet security. It then covers security services, mechanisms, and attacks. It defines authentication, authorization, confidentiality, integrity, and non-repudiation as key security services. Security mechanisms use cryptography to provide these services. The document classifies security attacks and describes cryptographic techniques like encryption algorithms. It presents models for network security and network access security.

Uploaded by

Anirban Bhadra
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Cryptography and Network

Security

PREPARED BY
ANIRBAN BHADRA
CONTENTS

• INTRODUCTION
• SERVICES MECHANISM & ATTACKS
• SECURITY SERVICES
• SECURITY MECHANISM
• SECURITY ATTACKS
• CLASSIFICATION OF SECURITY ATTACKS
• MODEL OF NETWORK SECURITY
• MODEL OF NETWORK ACCESS SECURITY
INTRODUCTION
• Computer Security - generic name for
the collection of tools designed to protect
data and to thwart hackers
• Network Security - measures to protect
data during their transmission
• Internet Security - measures to protect
data during their transmission over a
collection of interconnected networks
SERVICES, MECHANISM
ATTACKS
• need systematic way to define
requirements
• consider three aspects of information
security:
– security attack
– security mechanism
– security service
• consider in reverse order
SECURITY SERVICES
– is something that enhances the security of the
data processing systems and the information
transfers of an organization
– intended to counter security attacks
– make use of one or more security
mechanisms to provide the service
– replicate functions normally associated with
physical documents
• eg. have signatures, dates; need protection from
disclosure, tampering, or destruction; be notarized
or witnessed; be recorded or licensed
SECURITY MECHANISM
• a mechanism that is designed to detect,
prevent, or recover from a security attack
• no single mechanism that will support all
functions required
• however one particular element underlies
many of the security mechanisms in use:
cryptographic techniques
• hence our focus on this area
SECURITY ATTACKS
• any action that compromises the security
of information owned by an organization
• information security is about how to
prevent attacks, or failing that, to detect
attacks on information-based systems
• have a wide range of attacks
• can focus of generic types of attacks
• note: often threat & attack mean same
CLASSIFICATION OF
SECURITY ATTACKS
• passive attacks - eavesdropping on, or
monitoring of, transmissions to:
– obtain message contents, or
– monitor traffic flows
• active attacks – modification of data stream to:
– masquerade of one entity as some other
– replay previous messages
– modify messages in transit
– denial of service
CRYPTOGRAPHY
• can be characterized by:
– type of encryption operations used
• substitution / transposition / product
– number of keys used
• single-key or private / two-key or public
– way in which plaintext is processed
• block / stream
TYPES OF CRYPTANALYTIC
ATTACKS
• ciphertext only
– only know algorithm / ciphertext, statistical, can identify
plaintext
• known plaintext
– know/suspect plaintext & ciphertext to attack cipher
• chosen plaintext
– select plaintext and obtain ciphertext to attack cipher
• chosen ciphertext
– select ciphertext and obtain plaintext to attack cipher
• chosen text
– select either plaintext or ciphertext to en/decrypt to attack
cipher
MODEL OF NETWORK
SECURITY
Model for Network Security
• using this model requires us to:
– design a suitable algorithm for the security
transformation
– generate the secret information (keys) used
by the algorithm
– develop methods to distribute and share the
secret information
– specify a protocol enabling the principals to
use the transformation and secret information
for a security service
MODEL FOR NETWORK
ACCESS SECURITY
Model for Network Access Security
• using this model requires us to:
– select appropriate gatekeeper functions to
identify users
– implement security controls to ensure only
authorised users access designated
information or resources
• trusted computer systems can be used to
implement this model

You might also like