01) Cryptography Class 1 Introduction Cryptography 2019
01) Cryptography Class 1 Introduction Cryptography 2019
• Cryptography applications
Cryptography
“Hidden writing”
Increasingly used to protect information
Can ensure confidentiality
• Integrity and Authenticity too
History – The Manual Era
Computers!
Examples
• Lucifer
• Rijndael
• RSA
• ElGamal
Computer Security Concepts
• Before the widespread use of data processing equipment, the
security of information valuable to an organization was
provided primarily by physical and administrative means
• internet security
• Consists of measures to deter, prevent, detect,
and correct security violations that involve the
transmission of information
Security Trends
Computer Security
Availability
• Assures that systems work promptly and service is
not denied to authorized users
Integrity
• Data integrity
• Assures that information and programs are
changed only in a specified and authorized
manner
• System integrity
• Assures that a system performs its intended
function in an unimpaired manner, free from
deliberate or inadvertent unauthorized
manipulation of the system
CIA Triad
Authenticity Accountability
• Verifying that users • The security goal
are who they say that generates the
they are and that requirement for
each input arriving at actions of an entity to
the system came be traced uniquely to
from a trusted source that entity
Breach of Security
3 Levels of Impact
• The loss could be expected to have a
severe or catastrophic adverse effect
High on organizational operations,
organizational assets, or individuals
Low on organizational
operations,
organizational assets, or
individuals
Examples of Security Requirements
Integrity
Confidentiality Availability
(consistency)
Patient information
stored in a database – The more critical a
Student grade inaccurate information component or service,
information is an asset could result in serious the higher the level of
whose confidentiality is harm or death to a availability required
considered to be highly patient and expose the
important by students hospital to massive
liability A moderate availability
requirement is a public
A Web site that offers a
Web site for a
forum to registered
university
users to discuss some
specific topic would be
Regulated by the Family assigned a moderate An online telephone
Educational Rights and level of integrity directory lookup
Privacy Act (FERPA) application would be
An example of a low-
integrity requirement is an classified as a low-
anonymous online poll availability requirement
Computer Security Challenges
X.800 Recommendation:
Internet Security
Glossary, Version 2
• Authentication
• Access control
• Data confidentiality
• Data integrity
• Nonrepudiation
Security
Services
(X.800)
Authentication
• Concerned with assuring that a communication is
authentic
– In the case of a single message, assures the recipient
that the message is from the source that it claims to be
from.
– In the case of ongoing interaction, assures the are
authentic and that the connection is not interfered with in
such a way that a third party can masquerade as one of
the two legitimate parties
Two entities are considered peers if they implement the same protocol in
different systems (e.g., two TCP modules in two communicating systems).
Access Control
• The ability to limit and control the access to host systems
and applications via communications links
• To achieve this, each entity trying to gain access must first be
identified, or authenticated, so that access rights can be
tailored to the individual
Data Confidentiality
• The protection of transmitted data from passive
attacks
– Broadest service protects all user data transmitted between
two users over a period of time
– Narrower forms of service include the protection of a single
message or even specific fields within a message
• The protection of traffic flow from analysis
– This requires that an attacker not be able to observe the
source and destination, frequency, length, or other
characteristics of the traffic on a communications facility
Data Integrity
Can apply to a stream of messages, a single
message, or selected fields within a message
• Availability
– The property of a system or a system resource being
accessible and usable upon demand by an authorized
system entity, according to performance specifications for
the system
• Availability service
– One that protects a system to ensure its availability
– Addresses the security concerns raised by denial-of-
service attacks
– Depends on proper management and control of system
resources
Security Mechanisms (X.800)
1. Confidentiality
2. Integrity
3. Authentication
4. Identity
5. Timeliness
6. Proof of ownership
• Placement in a computer
system of logic that exploits Programs can
present two kinds of
vulnerabilities in the system threats:
and that can affect
application programs as
well as utility programs
Information access
Service threats
threats
Intercept or modify
Exploit service
data on behalf of
flaws in computers
users who should
to inhibit use by
not have access to
legitimate users
that data
Standards
• NIST • ISOC
• Internet Society
• National Institute of
• Professional membership society
Standards and Technology with worldwide organizational and
• U.S. federal agency that individual membership
deals with measurement • Provides leadership in
science, standards, and addressing issues that confront
the future of the Internet
technology related to U.S.
• Is the organization home for the
government use and to the groups responsible for Internet
promotion of U.S. private- infrastructure standards,
sector innovation including the Internet Engineering
Task Force (IETF) and the
• NIST Federal Information Internet Architecture Board (IAB)
Processing Standards • Internet standards and related
(FIPS) and Special specifications are published as
Publications (SP) have a Requests for Comments (RFCs)
worldwide impact
Summary
• Computer security • Security services
concepts – Authentication
– Definition – Access control
– Examples – Data confidentiality
– Challenges – Data integrity
• The OSI security – Nonrepudiation
architecture – Availability service
• Security attacks • Security mechanisms
– Passive attacks • Model for network
– Active attacks security
• Standards