Академический Документы
Профессиональный Документы
Культура Документы
Modern
Cryptography
Prepared By: Shaikh Amrin
Cryptography
Its
Should
easily be
available to
authorized
user.
3.
Availability
Hello
Receive
r
Sender
Eavesdropper
Preventing
Information
from
unauthorize
d
modification
Hiding
Information
from
unauthorize
d person
1.
Confidentialit
2.
Goals of Cryptography
Confidentiality
2. Integrity
3. Availability
1.
1. Confidentiality
Information
is exchanged over
un-trusted
network
While
exchange, Information should
remain secret.
When
we
are
storing
an
information it should not open up
by eve.
Confidentiality=
information
storage
transmission
of
2. Integrity
Information
is always changing
but can changed by only
authorized user.
ex: bank account withdraw can
performed by account holder.
3. Availability
Data
must be available to
authorized user.
Confidentiality
and
integrity
should not hinder the availability
of data.
Cryptographic Attacks
Cryptanalytic attack
2. Non-Cryptanalytic attack
1.
1. Cryptanalytic attack
Cryptography: Science of making cipher.
Cryptanalysis: Science of breaking cipher.
Cryptology: cryptography+ Cryptanalysis.
These
attacks
are
combination
of
statistical and algebraic techniques to
retrieve secret key of a cipher.
2. Non-Cryptanalytic attack
Thread to Confidentiality
1.
Snooping
hello
hello
Solution:
Use encryption to make
intelligible for snooper
information
non-
2. Traffic Analysis
E(hello
)
E(hello
)
Thread to Integrity
i,
H
E(
1)
k
E(
2) E(
Hi
,
k1
),k
1. Modification
bank
2. Masquerading or spoofing
Fake
bank
3. Replaying
Eve copies a message sent by
different user and later tries to
replay it.
Solution: Timestamp, Sequence
number
4. Repudiation:
Alice or Bob may later deny that
message sent by him/her.
Ex: you purchase a product &
does online payment but you are
claiming bank that you did not
purchase or attempted any
product or you did not do any
online transaction.
Thread to Availability
1. Denial
of service
Slow down or totally disable the
system
so
no
authenticate
person can access it.
Ex:
.Sent so many bogus requests
to server.
.Delete servers response to
client.
.Feel client that server is not
Categorization of attacks
Passive Attack
2. Active Attack
1.
1. Passive Attack
Eves
2. Active Attack
May
change message
May Harm system
Attacks
Passive/Active
Goals Threatened
Snooping
Passive
Confidentiality
Traffic Analysis
Passive
Modification
Active
Masquerading
Active
Replaying
Active
Repudiation
Active
Denial of service
Active
Integrity
Availability
How to achieve
this security goals?
Security Services
ITU-T(X.800)
International
Telecommunication
UnionTelecommunication Standardization Sector has
defined Five services and some mechanisms to
implement those services.
Data
Confidentiality
Data Integrity
Non Repudiation
Authentication
Access Control
Data
Confidentiality
Integrity
Protect
data
from
modification,
insertion, deletion & replay.
Non
Repudiation:
Authentication
Control:
Security Mechanism
It
1.Encipherment
Hiding
information by encryption
or
by
other
means
like
steganography.
It can provide confidentiality.
Two
techniques
enciphering
1. Cryptography
2. steganography
used
for
2. Data Integrity
A
If
resistant.
3. Digital signature
Sender
4. Authentication
Exchange
Alice
and
Bob
exchange
information to prove each other
that they are communicating and
not being masquerading
5. Traffic Padding
Inserting
6. Routing Control
Continuously
changing different
available routes between Alice
and Bob to prevent Bob from
eavesdropping on a particular
route. So, the task of Eve will be
harder.
7. Notarization
Select
8. Access Control
It
Mechanism
Encipherment
Data Integrity
Digital signature
Authentication
Exchange
Traffic Padding
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali
ty
Data
Integrity
Encipherment
NonRepudiation
Authenticati
on
Access
Control
Encipherment
Data Integrity
Digital signature
Authentication
Exchange
Traffic Padding
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali
ty
Data
Integrity
Encipherment
Data Integrity
NonRepudiation
Data Integrity
Authenticati
on
Encipherment
Access
Control
Digital signature
Authentication
Exchange
Traffic Padding
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali
ty
Data
Integrity
Encipherment
Data Integrity
Digital signature
NonRepudiation
Data Integrity
Digital signature
Authenticati
on
Encipherment
Digital signature
Access
Control
Authentication
Exchange
Traffic Padding
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali
ty
Data
Integrity
Encipherment
Data Integrity
Digital signature
NonRepudiation
Data Integrity
Digital signature
Authenticati
on
Encipherment
Digital signature
Authentication
Exchange
Access
Control
Traffic Padding
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali Traffic Padding
ty
Data
Integrity
Encipherment
Data Integrity
Digital signature
NonRepudiation
Data Integrity
Digital signature
Authenticati
on
Encipherment
Digital signature
Authentication
Exchange
Access
Control
Routing Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali Traffic Padding
ty
Routing Control
Data
Integrity
Encipherment
Data Integrity
Digital signature
NonRepudiation
Data Integrity
Digital signature
Authenticati
on
Encipherment
Digital signature
Authentication
Exchange
Access
Control
Notarization
Access Control
Mechanism
Data
Encipherment
Confidentiali Traffic Padding
ty
Routing Control
Data
Integrity
Encipherment
Data Integrity
Digital signature
NonRepudiation
Data Integrity
Digital signature
Notarization
Authenticati
on
Encipherment
Digital signature
Authentication
Exchange
Access
Control
Access Control
Mechanism
Data Confidentiality
Encipherment
Traffic Padding
Routing Control
Data Integrity
Encipherment,
Data Integrity
Digital signature
Non-Repudiation
Data Integrity
Digital signature
Notarization
Authentication
Encipherment
Digital signature
Authentication Exchange
Access Control
Access Control
Security
mechanisms are
theoretical recipes to implement
security.
Actually security goals need
some techniques
1. Cryptography (Secret Writing)
1. Symmetric key Encipherment
2. Asymmetric key Encipherment
3. Hashing
2.
Cryptography vs
Steganography
Cryptography
Steganography
Secret writing
Cover writing
History:
Message is carved on wood
that were later dipped into
wax to cover writing.
Use invisible ink.
Modern:
Text/audio/video/image can
be digitized and covered with
message.
Thank you