Information Security
Information Security
TECHNIQUES
INFORMATION SECURITY
BS_CS 6TH 1
MULTI-LEVEL SECURITY (MLS)
4
WHAT IS A SECURITY MODEL?
Introduce in 1973
Air-Force was concerned with security in time-sharing systems
Many OS bugs
Accidental misuse
Main Objective:
Enable one to formally show that a computer system can securely process classified
information
6
THE BLP SECURITY MODEL
7
ELEMENTS OF THE BLP MODEL
Lm: Max Lc: Current L: Class.
Sec. Level Sec. Level Level
Subjects Objects
Current
Accesses
Trusted
Subjects
Access Matrix 8
9
BASIC TERMINOLOGY
10
Deciphering or decryption: recovering plaintext from ciphertext
11
Cipher or cryptographic system : a scheme for encryption and decryption
12
Cryptography
Basics
16
Encryption
Cipher
Key A Key B
19
SYMMETRIC ENCRYPTION
Mathematically:
Y = EK(X) or Y = E(K, X)
X = DK(Y) or X = D(K, Y)
X = plaintext
Y = ciphertext
K = secret key
E = encryption algorithm
D = decryption algorithm
Both E and D are known to public
20
Secure Communication
Needs and Requirements
22
BRUTE-FORCE ATTACK
On average, need to try half of all possible keys
Time needed proportional to size of key space
128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years
168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years
26 characters 26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years
(permutation) 23
BRUTE-FORCE ATTACK
24
BRUTE-FORCE ATTACK
25
SIMPLE BRUTE FORCE ATTACKS
26
DICTIONARY ATTACKS
27
HYBRID BRUTE FORCE ATTACKS
28
REVERSE BRUTE FORCE ATTACKS
Known-plaintext attack
Chosen-plaintext attack
Chosen-ciphertext attack
31
CIPHERTEXT-ONLY ATTACK
Given: a ciphertext c
Q: what is the plaintext m?
An encryption scheme is completely insecure if it
cannot resist ciphertext-only attacks.
32
KNOWN-PLAINTEXT ATTACK
33
CHOSEN-PLAINTEXT ATTACK
34
EXAMPLE: CHOSEN-PLAINTEXT ATTACK
36
CLASSICAL CIPHERS
38
CAESAR CIPHER
Mathematically, map letters to numbers:
a, b, c, ..., x, y, z
0, 1, 2, ..., 23, 24, 25
Then the general Caesar cipher is:
c = EK(p) = (p + k) mod 26
p = DK(c) = (c – k) mod 26
Can be generalized with any alphabet.
39
Substitution Ciphers
Caesar Cipher
DEFGHIJKLMNOPQRSTUVWXYZABC
Decryption
Key (3)
Key (3)
How many different keys are possible?
CRYPTANALYSIS OF CAESAR CIPHER
42
MONO-ALPHABETIC SUBSTITUTION CIPHER
Shuffle the letters and map each plaintext letter to a
different random ciphertext letter:
Plaintext: ifwewishtoreplaceletters
Ciphertext: WIRFRWAJUHYFTSDVFSFUUFYA
43
MONO-ALPHABETIC CIPHER SECURITY
44
Mono-alphabetic Cipher Security
ABCDEFGH I JKLMNOPQRSTUVWXYZ
Key
LANGUAGE STATISTICS AND
CRYPTANALYSIS
Human languages are not random.
46
ENGLISH LETTER FREQUENCIES
47
STATISTICS FOR DOUBLE & TRIPLE LETTERS
Double letters:
th he an in er re es on, …
Triple letters:
the and ent ion tio for nde, …
48
USE IN CRYPTANALYSIS
To attack, we
calculate letter frequencies for ciphertext
compare this distribution against the known one
49
EXAMPLE CRYPTANALYSIS
Given ciphertext:
UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZ
VUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSX
EPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ
50
LETTER FREQUENCIES IN CIPHERTEXT
51