CHAPTER#1
CHAPTER#1
Introduction to Cryptography
Chapter5- Sections & Objectives
security goals
security attacks
security services
To define security services and how they are related to the three
security goals
The C.I.A. triangle has been considered the industry standard for computer security since the
development of the mainframe. It was solely based on three characteristics that described the utility
of information:
Confidentiality.
Integrity.
Availability.
The C.I.A. triangle has expanded into a list of critical characteristics of information.
Security Goals
— Data confidentiality : 1 Assures that private or confidential information is not made available or disclosed to unauthorized individuals.
—Privacy : Assures that individual's control or influence what information related to them may be collected and stored and by whom and
Confidentiality prevents the disclosure of information to unauthorized people, resources and processes. Another term for
confidentiality is privacy.
Organizations need to train employees about best practices in safeguarding sensitive information to protect themselves and
the organization from attacks.
Methods used to ensure confidentiality include data encryption, authentication, and access control.
Security Goals
o Integrity is the accuracy, consistency, and trustworthiness of data during its entire life cycle.
o Another term for integrity is quality .
o Methods used to ensure data integrity include hashing, data validation checks, data consistency checks,
and access controls.
Security Goals
o Data integrity : Assures that information and programs are changed only in a specified and authorized
manner.
o System integrity : Assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system.
Security Goals
o Methods used to ensure availability include system redundancy, system backups, increased system
resiliency (flexibility), equipment maintenance, up-to-date operating systems and software,
and
plans in place to recover quickly from unforeseen disasters.
Security Goals
Cryptography -- from the Greek for "secret writing" -- is the mathematical "scrambling" of data so that only
someone with the necessary key can "unscramble" it.
Cryptology is the science of making and breaking secret codes. Cryptography is a way to store and transmit data
so only the intended recipient can read or process it.
It refers to the science of transforming information into a secure form while it is being transmitted or stored so
that unauthorized users cannot access it
Cryptography allows secure transmission of private information over insecure channels (for example packet-
switched networks).
Secure communication
What Is Cryptography?
Secure storage
Cryptography Components
Cryptography Components
Goal Description
Confidentiality Keeping information secret and allow only authorized parties to access it .
Integrity Ensuring that information is correct and has not been altered by unauthorized person or
a malicious software .
Non-repudiation Proving that a user performed an action and preventing him/her from denying the
performed action (e.g: sender/receiver sent/received a message) .
Basic Cryptographic Scheme
Encryption algorithm often relay on a mechanism known as a key, such that the relationship between
plaintext and ciphertext depends upon the algorithm and the key.
Cryptographic system characteristics
Ciphers
Keyed Keyless
Asymmetric Symmetric
Classical Stream
Transposition
Substitution
Cryptanalysis
Techniques used for deciphering a message without any knowledge of the enciphering details
Goals of cryptanalysis :
Deduce the key(or equivalent) so that future messages can be easily broken.
Objective
General approaches:
• cryptanalytic attack
• brute-force attack
Cryptanalytic Attacks
ciphertext only : only know algorithm & ciphertext, is statistical, know or can identify plaintext
Is one in which the letters of plaintext are replaced by other letters or by numbers or symbols
If the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext
Is a substitution cipher in which each plaintext letter is replaced by one and only one
ciphertext character.
Monoalphabetic Ciphers :
Caesar Cipher.
Playfair Cipher.
Hill Cipher.
Modern Symmetric-key Ciphers
• Symmetric-key:
•A shared secret key is used for both encryption and decryption.
• Block Ciphers:
• Each block of data is encrypted at once
• Examples: DES, AES
• Stream Ciphers:
• Small unit of data (bit, byte, character) is encrypted individually.
• Examples: RC4, A5/1
Data Encryption Standard (DES)
• Asymmetric encryption, also called public-key encryption, uses one key for encryption
that is different from the key used for decryption. A criminal cannot calculate the
decryption key based on knowledge of the encryption key, and vice versa, in any
reasonable amount of time.
uses the product of two very large prime uses the U.S. government standard for digital
numbers with an equal length of between 100 signatures. This algorithm is free to use
and 200 digits. Browsers use RSA to establish because no one holds the patent.
a secure connection.
Asymmetric-Key Cryptography
provides an electronic exchange method to uses elliptic curves as part of the algorithm.
share the secret key. Secure protocols, In the U.S., the National Security Agency
such as Secure Sockets Layer (SSL), uses E C C for digital signature generation
Transport Layer Security (TLS), Secure and key exchange.
Shell (SSH), and Internet Protocol Security
(IPsec), use Diffie- Hellman.
Asymmetric-Key Cryptography
Based on the security requirement, the key size This encryption technique uses large-sized keys. The
Length of Keys
can range between 128 to 256 bits. recommended key size for RSA is 2048 bits or higher.
It is less secure than asymmetric encryption as It is safer than symmetric key encryption as there is no need
Security
the secret key is shared in it. for key distribution.
The algorithms used in symmetric encryption are The algorithms used in asymmetric encryption are RSA,
Algorithms
AES, DES, 3DES, and IDEA, TLS/SSL. DSA, E C C , Diffie-Hellman, and TLS/SSL
Steganography
Steganography
Steganography conceals data (the message) in another file such as a graphic, audio, or other text file.
The advantage of steganography over cryptography is that the secret message does not attract any
special attention. No one would ever know that a picture contained a secret message by viewing the
file either electronically or in hardcopy.
Steganography
image or stego-audio).
o Data obfuscation - is the use and practice of data masking and steganography techniques in the
cybersecurity and cyber intelligence profession:
o Obfuscation is the art of making the message confusing, ambiguous, or harder to understand.
o A system may purposely scramble messages to prevent unauthorized access to sensitive
information.
o Software watermarking protects software from unauthorized access or modification.
o Software watermarking inserts a secret message into the program as proof of ownership.
o The secret message is the software watermark. If someone tries to remove the watermark, the result is
nonfunctional code.
End O F Chapter