Revised Network Security

Embed Size (px)

Citation preview

  • 7/31/2019 Revised Network Security

    1/31

    1

    Cryptography and NetworkSecurity

    EVANGELINE PRICILLA

  • 7/31/2019 Revised Network Security

    2/31

    2

    Benjamin Franklin once said

    Three people can keep a secret

    if two of them are dead!

  • 7/31/2019 Revised Network Security

    3/31

    3

    Security is Not Easy to Achieve Human tendency

    Problems of storage and communication

    Trust in all the parties

  • 7/31/2019 Revised Network Security

    4/31

    4

    Network Security ModelTrusted ThirdParty

    principal principal

    Securitytransformation

    Securitytransformation

    attacke

    r

  • 7/31/2019 Revised Network Security

    5/31

    Cryptography and NetworkSecurity 5

    Attacks, Services and MechanismsSecurity Attacks

    Action compromises the information security

    Could be passive or active attacks

    Security Services Actions that can prevent, detect such attacks.

    Such as authentication, identification, encryption, signature,secret sharing and so on.

    Security mechanism The ways to provide such services

    Detect, prevent and recover from a security attack

  • 7/31/2019 Revised Network Security

    6/31

    Cryptography and NetworkSecurity 6

    Attacks Passive attacks Interception

    Release of message contents

    Traffic analysis

    Active attacks

    Interruption, modification, fabrication

    Masquerade Replay

    Modification

    Denial of service

  • 7/31/2019 Revised Network Security

    7/31

    Cryptography and NetworkSecurity 7

    Information Transferring

  • 7/31/2019 Revised Network Security

    8/31

    Cryptography and NetworkSecurity 8

    Attack: Interruption

    Cut wire

    lines,Jam wirelesssignals,Droppackets,

  • 7/31/2019 Revised Network Security

    9/31

    Cryptography and NetworkSecurity 9

    Attack: Interception

    Wiring,eavesdrop

  • 7/31/2019 Revised Network Security

    10/31

    Cryptography and NetworkSecurity 10

    Attack: Modification

    intercept

    Replaced info

  • 7/31/2019 Revised Network Security

    11/31

    Cryptography and NetworkSecurity 11

    Information Transferring

  • 7/31/2019 Revised Network Security

    12/31

    Cryptography and NetworkSecurity 12

    Attack: Interruption

    Cut wire

    lines,Jam wirelesssignals,Droppackets,

  • 7/31/2019 Revised Network Security

    13/31

    Cryptography and NetworkSecurity 13

    Attack: Interception

    Wiring,eavesdrop

  • 7/31/2019 Revised Network Security

    14/31

    Cryptography and NetworkSecurity 14

    Attack: Modification

    intercept

    Replaced info

  • 7/31/2019 Revised Network Security

    15/31

    Cryptography and NetworkSecurity 15

    Attack: Fabrication

    Also called impersonation

  • 7/31/2019 Revised Network Security

    16/31

    16

    Need for Security

    Authentication Do you trust the sender of a message?

    Integrity Is the message changed during transit?

    Confidentiality

    Is the message seen by someone else?

    Non-repudiation Can the sender refute the message?

  • 7/31/2019 Revised Network Security

    17/31

    17

    Authentication

    A B

    C

    I am user A

    Who am I?

  • 7/31/2019 Revised Network Security

    18/31

    18

    Integrity

    Has the Message Changed?

    A B

    C

    Transfer $100to C Transfer $1000

    to C

    Ideal route of the message

  • 7/31/2019 Revised Network Security

    19/31

    19

    Confidentiality

    Has someone seen it?

    A B

    C

    Secret

  • 7/31/2019 Revised Network Security

    20/31

    20

    Non-repudiation

    A BI never sent

    that

    message!

    A sends a message and refutes it later

  • 7/31/2019 Revised Network Security

    21/31

    21

    How to achieve Security?

    Use Cryptography

    Art of transforming messages

    Messages become unreadable

  • 7/31/2019 Revised Network Security

    22/31

    Cryptography and NetworkSecurity 22

    Cryptography

    Cryptography is the study of

    Secret (crypto-) writing (-graphy)

    Concerned with developing algorithms:

    Conceal the context of some message fromall except the sender and recipient (privacy

    or secrecy), and/orVerify the correctness of a message to the

    recipient (authentication)

  • 7/31/2019 Revised Network Security

    23/31

    23

    Cryptography Basics

    Plain text

    All understandable messages

    Example: My name is Simson

    Cipher text

    All non-understandable messages

    Example: G%er@17*0-1>-

  • 7/31/2019 Revised Network Security

    24/31

    24

    Cryptography Mechanisms

    Substitution Techniques

    Replace one or more characters with other

    characters Example: Replace each a with d, b with e, etc

    Transposition Techniques

    Rearrange the text

    Example: Replace 1st character with 4th, 2nd with5th, etc

    Combinational Technique: Mostly used

  • 7/31/2019 Revised Network Security

    25/31

    25

    Cryptography is simple!

    Hi Simson,

    Hope you are doing fine.

    How about meeting at thetrain station this Friday at

    5 pm? Please let me know

    if it is ok with you.

    Regards.Pricilla

    Kl Dplw,

    Krsh brx duh grlqj ilqh. Krz

    derxw phhwlqj dw wkhwudlq vwdwlrq wklv Iulgdb

    dw 5 sp? Sohdvh ohw ph

    nqrz li lw lv rn zlwk brx.

    Uhjdugv.

    Dwxo

  • 7/31/2019 Revised Network Security

    26/31

    26

    Encryption and Decryption

    Encryption Conversion ofplain textinto cipher text

    Decryption Conversion ofcipher textinto plain text

    Two Aspects Algorithm

    Key

  • 7/31/2019 Revised Network Security

    27/31

    27

    Encryption

    Plain text

    Encrypt

    Cipher text

    My name is Simy

    Encrypt

    G%er@17*

  • 7/31/2019 Revised Network Security

    28/31

    28

    Decryption

    Cipher text

    Decrypt

    Plain text

    G%er@17*

    Decrypt

    My name is Simy

  • 7/31/2019 Revised Network Security

    29/31

    29

    Algorithm and Key

    Encryption/Decryption Algorithm Specifies the operations to be performed

    Examples: DES, IDEA, AES Known to everybody

    Key Must be kept secret

    Usually at least 56 bits

  • 7/31/2019 Revised Network Security

    30/31

    30

    Key Range

    A 2-bit binary number has four possible states:00011011

    If we have one more bit to make it a 3-bit binary number, the number of possible statesalso doubles to eight, as follows:000001010011100101110111

    In general, if ann bit binary number hask possible states, ann+1 bit binary number willhave2k possible states.

  • 7/31/2019 Revised Network Security

    31/31

    31

    Brute Force Attack

    Cipher text

    R$9O0-=-P;. Decrypt

    Try with key = 0

    Plain text

    V^510->o2

    Cipher text

    R$9O0-=-P;. Decrypt

    Try with key = 1

    Plain text

    7/5vc_=;a1

    Cipher text

    R$9O0-=-P;. Decrypt

    Try with key =

    90,171,451,191Plain text

    To: Payroll