Вы находитесь на странице: 1из 60

Security

It is a process of to prevent un authorized


access
Information Security :
System Security
Database Security
Network Security
Physical security

Network Security

Cryptography and Network


Security
The main objective of Network security how
to protect data on communication channels
or between two parties ( Two parties are Alice
& Bob)

Cryptography
Cryptanalysis
Cryptology
Encryption
decryption
Plaintext
Cipher text
Keys
Crypto System

Vulnerabilities
Threat
Exploitation
Risk
Threats exploit the vulnerabilities
to damage security assets

Vulnerabilities
Database(VD)
NVD 2014
7038 (V)
80%
are coming through Third
party application
13% are on OS
4% are on Hardware devices

Top applications by vulnerabilities reported in 2014

Ubuntu
39 total vulnerabilities 7 high severity 27 medium
severity 5 low
Red Hat Enterprise
27 total vulnerabilities 6 high severity 17 medium
severity 4 low
openSUSE
20 total vulnerabilities 9 high severity 9 medium
severity 4 low
Fedora
15 total vulnerabilities 3 high severity 9 medium
severity 3 low
Windows
68 total vulnerabilities 47 high severity20 medium
severity 1 low severity
Android
6 total vulnerabilities 4 high severity 1 medium

How to Analyze Vulnerabilities on System

1.Microsoft Baseline Security


Analyzer(MBSA)
2.neXpose

Internet Security
Threats
1.
2.
3.

Malware Threats
Email- Threats
Social Engineering Threat
(Phishing)

Top 10 Threats

Security

attack

Security Mechanism :

Security service : A service that enhance the

An
action
that
Compromises the security of information system
A process that is
designed to Detect, Prevent and Recover from a
security attacks
security of information system using Security
services
Security services implement Security polices and
are implemented by using security mechanism

Security polices :

a high level business


rules define what that organization will do to
prevent system

Standards :

a detailed statements how the


organization is going to implement policies

Procedures

: a step by step method or


manual methods to implement goal of
written polices and standards

Security Attacks
There are two types of attacks
1. Passive attacks : Attempts to learn

or
make use of information from the system
with out effecting system resources

2. Active

attacks :

Attempts to alter
system resources or effect their operations

Passive Attacks
Passive attacks are in the nature of
eavesdropping
on,
monitoring
of
transmissions. The goal of the opponent is to
obtain information that is being transmitted
There are two types of passive attacks
1. Release of message contents
2. Traffic analysis
Passive attacks are very difficult to detect because they
do not involve alternation of any messages

Active attacks
Active attacks are modification of data stream
or creation of false data stream
There are four categories
1. Masquerade
2. Replay
3. Modification of message
4. Denial of service

Security services
Authentication
Access Control
Data Confidentiality
Data Integrity
Nonrepudiation : Prevent
the receiver
message

Availability

from

either sender or
denying a transmitted

Model for Network


Security

Conventional Encryption
Principles

An encryption scheme has five ingredients:

Plaintext
Encryption algorithm
Secret Key
Cipher text
Decryption algorithm

Security depends on the secrecy of the key,


not the secrecy of the algorithm

Conventional Encryption
Principles

Cryptography

Classified along three independent


dimensions:

The type of operations used for


transforming plaintext to cipher text
The number of keys used
symmetric (single key)
asymmetric (two-keys, or public-key
encryption)

The way in which the plaintext is


processed

Classical encryption
Techniques

These technique are divided into


two categories
1.Substitution Technique
2.transpostion Technique

Substitution
techniques

Caesar Cipher
Mono Alphabetic Cipher
Play fair cipher
Hill cipher

Transposition
Techniques

Rail fence Technique


Columnar Transposition

Caesar Cipher

The Caesar cipher involves


replacing each letter of the
alphabetic with the letter
standing three places further
down the alphabetic

abcdefghIjklmnopqrstuvw
xyz
defghIjklmnopqrstuvwxyz
a b c Encryption Algorithm
c=E (p) = (p+3) mod 26
Decryption Algorithm
p=D (p) = (p-3) mod 26

Plain text : meet me after the party


Cipher text: phhw ph diwhu wkh
sduwb

General Caesar cipher

A shift may be any amount


Encryption Technique :
c= E(p) = (p + k) mod 26
Decryption Technique:
p= D(p) = (p k) mod 26

Drawbacks of Caesar
cipher

The Encryption and Decryption


algorithms are known
There are only 25 keys

Mono Alphabetic
Cipher

Each letter is replaced with the


letter x position to down
Select x value randomly
The value of x between 1 to 25

abcdefghIjklmnopqrstuvwxyz
befIjacdghtsrqponklmuzyxwv
key : 2 5 6 9 10 1 3 4 7 8 20 19 18 17 16 15 14 11 12 13 21 26 25 24 23 22

Play fair Cipher

Step 1:
Construct 5 * 5 Matrix by using
key value and Alphabetic
key=monarchy
Fill the matrix with key value
from
left to right and top to bottom
and remaining positions fill
with Alphabetic
the letters I/J put into one cell

i/j

Step 2: Plaintext is Encrypted two letters at a tim


According to the following rules
a. If letters are repeated separate the
letters with filler letter (filler letter is x)
b. Letters falls in same row ,each letter is
replaced by the letter on position to right
c. Letters falls in same column , each letter
is replaced by the letter on position to
down
d. Otherwise the letters replace with the
letters falls on row and column letters

Hello how are u

Cipher text:

i/j

Plain text:

Hill Cipher
Divide the plaintext into blocks of m characters
m=2
Select the key based on m
select m*m matrix
Multiply each plain text block with m*m matrix
that output is cipher text

Decryption Key

One Time pads


1.

2.

3.

4.

First choose random bit string as


a key
Then convert plain text into a bit
string
Finally compute XOR of these
two strings bit by bit
The output is cipher text

Rail fence technique


In this technique plaintext is written
down a sequence of diagonals and
read off as a sequence of rows
Plain text: meet me after one month
Cipher text
m e m a t r n m n h
e t e f e o e
o t
mematrnmnhetefeoeot

Columnar
Transposition
Step 1: Take the key value
key=4312567
Step 2: Write the plaintext from left to
right and top to bottom
Step 3: read cipher text column wise select
the column which is having minimum
value

Example
Key = 4312567
Plaintext = hello how are u
4312567
he l l o h
ow ar e
u
Cipher text: l la ew houor e h .

DES (Data Encryption


Standard)
It is Symmetric Algorithm (or)
Conventional encryption
algorithm
Symmetric Encryption:
A form of cryptosystem in which
Encryption and Decryption are
performed by single key, that key is
called Secret key

Properties of DES

It uses Transposition technique


It uses single key( Secret key)
It uses Block Cipher technique

DES uses the following


functions

Initial Permutation (IP)


Inverse Initial Permutation(IP)
Expansion Permutation (E)
Permutation Function (P)
Permuted Choice1 (PC-1)
Permuted Choice2 (PC-2)
Schedule of Left Shifts

Initial Permutation
INPUT(64Bit)
M1

M2 M3

M4 M5 M6 M7 M8

M9 M10 M11 M12 M13 M14 M15


M16
M17 M18 M19 M20 M21 M22 M23
M24
M25 M26 M27 M28 M29 M30 M31
M32
M33 M34 M35 M36 M37 M38 M39
M40
M41 M42 M43 M44 M45 M46 M47
M48
M49 M50 M51 M52 M53 M54 M55
M56

IP
M58 M50 M42 M34 M26 M18 M10
M2
M60 M52 M44 M36 M28 M20 M12
M4
M62 M54 M46 M38 M30 M22 M14
M6
M64 M56 M48 M40 M32 M24 M16
M8
M57 M49 M41 M33 M25 M17 M9
M1
M59 M51 M43 M35 M27 M19 M11
M3
M61 M53 M45 M37 M29 M21 M13

Inverse Initial
Permutation
40
39
38
37
36
35
34
33

8
7
6
5
4
3
2
1

48
47
46
45
44
43
42
41

16
15
14
13
12
11
10
9

56
55
54
53
52
51
50
49

24
23
22
21
20
19
18
17

64
63
62
61
60
59
58
57

32
31
30
29
28
27
26
25

Expansion Function
32
4
8
12
16
20
24
28

1
5
9
13
17
21
25
29

2
6
10
14
18
22
26
30

3
7
11
15
19
23
27
31

4
8
12
16
20
24
28
32

5
9
13
17
21
25
29
1

Permutation Function
16 7 20
1 15 23
2 8 24
19 13 30

21
26
14
6

29
5
32
22

12
18
27
11

28
31
3
4

17
10
9
25

Permuted Choice1(PC1)
57
1
10
19
63
7
14
21

49
58
2
11
55
62
6
13

41
50
59
3
47
54
61
5

33
42
51
60
39
46
53
28

25
34
43
52
31
38
45
20

17
26
35
44
23
30
37
12

9
18
27
36
15
22
29
4

Permuted Choice2(PC2)

14
15
26
41
51
34

17
6
8
52
45
53

11
21
16
31
33
46

24
10
7
37
48
42

1 5 3 28
23 19 12 4
27 20 13 2
47 55 30 40
44 49 39 56
50 36 29 32

9 18 22 25 35 38 43 54

Schedule of Left Shifts

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
16
112222221 2 2 2 2 2 2 1

Round
numbe
r
bits rotated

Expansion

permutation

S-Box 1 Table

S-Box 1: Substitution Box 1


Row /
Column

14 4

15 7

15 12 8

3 4

13 1 2

15 11 8

10 6

4 14 2

14 8 13 6
2 4

13 1

10 6

10 11 12 13 14 15
12 5

12 11 9

10 5

11 15 12 9

14 10 0

11 3

13

Вам также может понравиться