Course: Cryptography Code: CS-21123 Branch: M.Tech - IS 1 Semester
This document discusses security goals of confidentiality, integrity and availability and different types of attacks against them. It describes passive attacks like snooping and traffic analysis that obtain information without modification but can harm recipients. Active attacks like modification, masquerading and denial of service threaten integrity and availability by changing data or overloading systems, making them easier to detect. Maintaining security requires understanding these goals and attacks.
Course: Cryptography Code: CS-21123 Branch: M.Tech - IS 1 Semester
This document discusses security goals of confidentiality, integrity and availability and different types of attacks against them. It describes passive attacks like snooping and traffic analysis that obtain information without modification but can harm recipients. Active attacks like modification, masquerading and denial of service threaten integrity and availability by changing data or overloading systems, making them easier to detect. Maintaining security requires understanding these goals and attacks.
Motilal Nehru National Institute of Technology Allahabad, Prayagraj-211004 Security Trends Security Trends Security Trends Security Goals • We are living in the information age. • We need to keep information about every aspect of our lives. • In other words, information is an asset that has a value like any other asset. • As an asset, information needs to be secured from attacks. • To be secured, information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and available to an authorized entity when it is needed (availability). SECURITY GOALS SECURITY GOALS • Confidentiality • Need to protect our confidential information. • An organization needs to guard against those malicious actions that endanger the confidentiality of its information • In the military, concealment of sensitive information is the major concern. • In industry, hiding some information from competitors is crucial to the operation of the organization. • In banking, customers’ accounts need to be kept secret. • Confidentiality not only applies to the storage of the information, it also applies to the transmission of information. • When we send a piece of information to be stored in a remote computer or when we retrieve a piece of information from a remote computer, we need to conceal it during transmission SECURITY GOALS • Integrity • Information needs to be changed constantly. • In a bank, when a customer deposits or withdraws money, the balance of her account needs to be changed. • Integrity means that changes need to be done only by authorized entities and through authorized mechanisms. • Integrity violation is not necessarily the result of a malicious act. • An interruption in the system, such as a power surge, may also create unwanted changes in some information. SECURITY GOALS • Availability • The information created and stored by an organization needs to be available to authorized entities. • Information is useless if it is not available. • Information needs to be constantly changed, which means it must be accessible to authorized entities. • The unavailability of information is just as harmful for an organization as the lack of confidentiality or integrity. • Imagine what would happen to a bank if the customers could not access their accounts for transactions. ATTACKS ATTACKS Attacks Threatening Confidentiality • Snooping • Snooping refers to unauthorized access to or interception of data. • For example, a file transferred through the Internet may contain confidential information. • An unauthorized entity may intercept the transmission and use the contents for her own benefit. • To prevent snooping, the data can be made non-intelligible to the intercepter by using encipherment techniques Attacks Threatening Confidentiality • Traffic Analysis • Although encipherment of data may make it nonintelligible for the intercepter, one can obtain some other type information by monitoring online traffic.
• For example, he/she can find the electronic address (such
as the e-mail address) of the sender or the receiver.
• He/She can collect pairs of requests and responses to
help him/her guess the nature of transaction. Attacks Threatening Integrity • Modification • After intercepting or accessing information, the attacker modifies the information to make it beneficial to herself.
• For example, a customer sends a message to a bank to do
some transaction.
• The attacker intercepts the message and changes the type
of transaction to benefit herself.
• Note that sometimes the attacker simply deletes or delays
the message to harm the system or to benefit from it. Attacks Threatening Integrity • Masquerading • Masquerading, or spoofing, happens when the attacker impersonates somebody else. • For example, an attacker might steal the bank card and PIN of a bank customer and pretend that she is that customer. • Sometimes the attacker pretends instead to be the receiver entity. • For example, a user tries to contact a bank, but another site pretends that it is the bank and obtains some information from the user. Attacks Threatening Integrity • Replaying • Replaying is another attack.
• The attacker obtains a copy of a message sent by a user
and later tries to replay it.
• For example, a person sends a request to her bank to ask
for payment to the attacker, who has done a job for her.
• The attacker intercepts the message and sends it again to
receive another payment from the bank. Attacks Threatening Integrity • Repudiation • This type of attack is different from others because it is performed by one of the two parties in the communication: the sender or the receiver. • The sender of the message might later deny that she has sent the message; • The receiver of the message might later deny that he has received the message. • An example of denial by the sender would be a bank customer asking her bank to send some money to a third party but later denying that she has made such a request. • An example of denial by the receiver could occur when a person buys a product from a manufacturer and pays for it electronically, but the manufacturer later denies having received the payment and asks to be paid. Attacks Threatening Availability • Denial of Service • Denial of service (DoS) is a very common attack. • It may slow down or totally interrupt the service of a system. • The attacker can use several strategies to achieve this. • He/She might send so many bogus requests to a server that the server crashes because of the heavy load. • The attacker might intercept and delete a server’s response to a client, making the client to believe that the server is not responding. • The attacker may also intercept requests from the clients, causing the clients to send requests many times and overload the system. Passive Versus Active Attacks • Passive Attacks • In a passive attack, the attacker’s goal is just to obtain information. • This means that the attack does not modify data or harm the system. • However, the attack may harm the sender or the receiver of the message. • Attacks that threaten confidentiality, snooping and traffic analysis, are passive attacks. • The revealing of the information may harm the sender or receiver of the message, but the system is not affected. • For this reason, it is difficult to detect this type of attack until the sender or receiver finds out about the leaking of confidential information. • Passive attacks, however, can be prevented by encipherment of the data. Passive Versus Active Attacks • Active Attacks • An active attack may change the data or harm the system. • Attacks that threaten the integrity and availability are active attacks. • Active attacks are normally easier to detect than to prevent, because an attacker can launch them in a variety of ways. Passive Versus Active Attacks