Nota Computer Security
Nota Computer Security
Symmetric Cryptosystem
Cryptanalysis
Caesar Cipher :
Asymmetric Cryptosystem
Encryption Process
Disadvantages
memorize and
implement.
*Dangerous to
perform
for
soldiers or spies.
*Obvious pattern is
major weakness
Double DES :
convert one symbol of plaintext
immediately into a symbol of ciphertext.
Vernam Cipher :
Block Ciphers
Triple DES
DES Flow
Unclassified.
Publicly disclosed.
Symmetric block cipher algorithm
for blocks of 128 bits
Rivets-Shamir-Adelman (RSA)
Encryption :
What is q(n)?
P = 19 , q = 23
396
5
79
396-395 = 1
317
396-79 =
d = 317
Buffer Flows : A buffer (or array or
estring)
x d mod
= 1 in which data can be
is aphi
space
5held.
x 317 mod 396 = 1
What can we do to avoid buffer
overflow attacks? Give 2 strategies :
Memory
File or data on an auxiliary
storage device
Hardware device
A table of the OS
Data structure such as stack
User Authentication
Authentication mechanisms use any
of three qualities to confirm users
identity:
Attacks on passwords:
Database Security
Advantages of the database:
Shared access
Data consistency
Minimal redundancy
Security Requirements :
Security in Networks
Threats in Networks Threat
precursor:
Port scan - Program that give an
information about three things:
Social engineering
Involves using social skills and personal
interaction to get someone to reveal
security-relevant information and perhaps
even do something that permits an
attack.
Reconnaissance
Gathering discrete bits of information
from various sources and then putting
them together like the pieces of a puzzle.
Availability of documentation
Vendor themselves sometimes distribute
information that is useful to an attacker.
Firewalls :
Copyrights :
Patents :
Always invoked.
Tamperproof.
Small and simple enough for
rigorous analysis.
Type of firewalls :
Security Awareness :
Security awareness program: one of least
frequently implemented, but most
effective security methods.
What is public key cryptography?
Public-key cryptography, or asymmetric
cryptography, is an encryption scheme
that uses two mathematically related, but
not identical, keys - a public key and a
private key.
What is non-repudiation in the
context of computer security?
Nonrepudiation is a method of
guaranteeing message transmission
between parties via digital signature
and/or encryption.
Describe why the DES algorithm is
generally not considered as secure.
What can be done to improve its
security?
To improve :
Lack of trust
Timesharing issues
File listings
Group Protection :
User cannot belong to two groups
Forces one person to be multiple users
Forces user to be put into all groups
User Authentication
Authentication :
Challenge-Response Systems
Impersonation of Login
Authentication Other than
Passwords