Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views20 pages

NSM Notes - Unit 1

The document provides an overview of network security and management, focusing on various security mechanisms, terms, and types of attacks. It discusses the importance of protecting data through concepts like the CIA triad (Confidentiality, Integrity, Availability) and outlines different types of viruses, antivirus software, and intruders. Additionally, it explains security attacks, including passive and active attacks, and describes security services and mechanisms essential for safeguarding information systems.

Uploaded by

ahesan.agk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views20 pages

NSM Notes - Unit 1

The document provides an overview of network security and management, focusing on various security mechanisms, terms, and types of attacks. It discusses the importance of protecting data through concepts like the CIA triad (Confidentiality, Integrity, Availability) and outlines different types of viruses, antivirus software, and intruders. Additionally, it explains security attacks, including passive and active attacks, and describes security services and mechanisms essential for safeguarding information systems.

Uploaded by

ahesan.agk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

NETWORK SECURITY & MANAGEMENT

UNIT-1
INTRODUCTION TO SECURITY MECHANISMS
1.1 VARIOUS SECURITY TERMS
1.1.1 Introduction
Computer data often travels from one computer to another, leaving the safety of its protected physical
surroundings. Once the data is out of hand, people with bad intentions could modify or forge your data, either
for amusement or for their benefit.
In many cases information is sensitive so we need to take care that only authorized parties can get that data.
For its maintenance, we require some mechanism or physical device which ensures that it is safe. Such a
mechanism is known as a Security System.
Computer Security: The generic name for the collection of tools designed to protect data and prevent hackers
is Computer Security.
Network Security: Network Security refers to the measures taken by any enterprise or organization to
secure its computer network and data using both hardware and software systems. Network security measures
are needed to protect data during their transmission.
Internet Security: Internet security refers to security designed to protect systems and the activities of
employees and other users while connected to the internet, web browsers, web apps, websites and networks.
Internet security solutions protect users and corporate assets from cybersecurity attacks and threats.
Threat: A potential for violation of security, which exists when there is a circumstance, capability, action, or
event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a
vulnerability.
Attack: An attack is an information security threat that involves an attempt to obtain, alter, destroy, remove,
implant or reveal information without authorized access or permission.
Hacker: A hacker is a person who makes use of a computer system to gain unauthorized access to another
system for data or who makes another system unavailable.

1.1.2 Virus
A virus is a type of code that enters the system along with any file or program and carries out malfunctions in
the system. The virus-affected program will be a replica of the existing program. They enter the system through
any file and when the file runs, parallelly the virus also runs in the background.
There are many ways in which the virus gets into the system. Some of them are through mail attachments, by
clicking inappropriate advertisements and by downloading any software or files from unauthorized websites.
The main objective of viruses is to spread them along different hosts. They steal the personal data and other
credentials of the system. Various types of viruses are explained as follows:
NETWORK SECURITY & MANAGEMENT

1) Parasitic Virus: The traditional and still most common form of virus. A parasitic virus attaches itself
to executable files and replicates, when the infected program is executed, by finding other executable
files to infect.
2) Memory-Resident Virus: Lodges in main memory as part of a resident system program. From that
point on, the virus infects every program that executes.
3) Boot Sector Virus: Infects a master boot record or boot record and spreads when a system is booted
from the disk containing the virus.
4) Stealth Virus: A form of virus explicitly designed to hide itself from detection by antivirus software.
5) Polymorphic Virus: A virus that mutates with every infection, making detection by the "signature" of
the virus impossible.
6) Metamorphic Virus: As with a polymorphic virus, a metamorphic virus mutates with every infection.
The difference is that a metamorphic virus rewrites itself completely at each iteration, increasing the
difficulty of detection. Metamorphic viruses may change their behavior as well as their appearance.

How can a computer be protected from viruses?


• Install an anti-malware program to stop software from installing without your knowledge.
• Never download and install software from the Internet unless you are certain it is from a trusted source.
• Do not open email attachments unless you have scanned them first, even a picture can carry a virus.
• Do not trust cracked or hacked software as they often contain malware or Trojans.
• The most suitable way of making your computer virus-free is by installing an Anti-virus software.
Such software helps in removing viruses from the device. It should be kept up to date and should
regularly run scans. It can be installed on a computer via two means: Online download, Buying an
Anti-virus software, and installing it.

1.1.3 Antivirus
An anti-virus is software that comprises programs or sets of programs that can detect and remove all harmful
and malicious software from your device. This anti-virus software is designed in a manner that they can search
through the files in a computer and determine the files that are heavy or mildly infected by a virus.
Most antivirus programs nowadays include more than just a virus scanner — they also come with features that
add additional protection, like a network firewall, phishing protection, a virtual private network (VPN), a
password manager, parental controls, as well as dedicated protections for mobile devices. Following are some
of the most commonly used anti-virus software:
1) Norton
2) Bitdefender
3) TotalAV
NETWORK SECURITY & MANAGEMENT

4) McAfee
5) Intego
6) Malwarebytes
7) Norton 360
8) Surfshark
9) Avira
10) Trend Micro

1.1.4 Intruder
An intruder (also called a hacker) is an individual who performs security attacks on another's domain in a
networked computing environment. The intruder may attempt to read privileged data (like password cracking),
perform unauthorized modification of data or disrupt normal functioning of data. There are three types of
intruders:
1) Masquerader: An individual who is not authorized to use the computer and who penetrates a system's
access controls to exploit a legitimate user's account. The masquerader is likely to be an outsider
2) Misfeasor: A legitimate user who accesses data, programs, or resources for which such access is not
authorized, or who is authorized for such access but misuses his or her privileges. Misfeasor is an
insider.
3) Clandestine User: An individual who seizes supervisory control of the system and uses this control to
evade auditing and access controls or to suppress audit collection. Clandestine users can be either
insiders or outsiders.

1.2 SECURITY BASICS


1.2.1 Pillars of Information Security
It is necessary to protect information from being stolen, compromised or attacked. The CIA triad is one of the
most important models that is designed to guide policies for information security within an organization. CIA
stands for Confidentiality, Integrity and Availability. These are considered as three pillars of Information
Security.
1) Confidentiality:
Confidentiality means that only authorized individuals/systems can view sensitive or classified information.
The data being sent over the network should not be accessed by unauthorized individuals. The attacker may
try to capture the data using different tools available on the Internet and gain access to your information.
For Example: User A sends a message to User B. Another User C gets access to this message which is not
desired and therefore defeats the purpose of confidentiality. This type of attack is called Interception and we
can say that confidentiality of the message is lost.
NETWORK SECURITY & MANAGEMENT

(Figure: Loss of Confidentiality)


To fight against confidentiality breaches, you can classify and label restricted data, enable access control
policies, encrypt data, and use multi-factor authentication (MFA) systems. It is also advisable to ensure that
all in the organization have the training and knowledge they need to recognize the dangers and avoid them.

2) Integrity:
Integrity makes sure that data has not been modified.
For Example, User A wants to send a message to User B. User C somehow manages to access the data of User
A changes its contents and sends a changed message to User B. Users A and B have no idea that the contents
of the message were changed. This type of attack is called Modification and we can say that the integrity of
the message is lost.

(Figure: Loss of Integrity)


To protect the integrity of your data, you can use hashing, encryption, digital certificates, or digital signatures.
For websites, you can employ trustworthy certificate authorities (CAs) that verify the authenticity of your
website so visitors know they are getting the site they intended to visit.

3) Availability:
Availability means that the network should be readily available to its users.
This applies to systems and data. To ensure availability, the network administrator should maintain hardware,
make regular upgrades, have a plan for fail-over and prevent bottlenecks in a network.
NETWORK SECURITY & MANAGEMENT

For Example: Due to the intentional actions of unauthorized User C, an authorized User A may not be able to
contact server computer B. This type of attack is called Interruption. Thus, proper measures should be taken
to prevent such attacks.

(Figure: Loss of Availability)


To ensure availability, organizations can use redundant networks, servers and applications. These can be
programmed to become available when the primary system has been disrupted or broken. You can also enhance
availability by staying on top of upgrades to software packages and security systems. Backups and full disaster
recovery plans also help a company regain availability soon after a negative event.

1.2.2 The OSI Security Architecture


The OSI (Open Systems Interconnection) security architecture provides a systematic framework for defining
security attacks, security mechanisms and security services. As this architecture was developed as an
international standard, various vendors have developed security features for their products and services that
relate to this structured definition of services and mechanisms.
• Security Attacks: Any action that compromises the security of information owned by an organization.
• Security Mechanisms: A process (or a device incorporating such a process) that is designed to detect,
prevent or recover from a security attack.
• Security Services: A processing or communication service that enhances the security of the data
processing systems and the information transfers of an organization. The services are intended to
counter security attacks, and they make use of one or more security mechanisms to provide the service.
Security Attacks:
Security Attacks are of two types:
1) Passive Attack
2) Active Attack
Passive Attack:
In a passive attack, the attacker attempts to learn or make use of information from the system but does not
affect system resources. The goal of the opponent/attacker is to obtain information that is transmitted. Passive
attacks are of two types:
NETWORK SECURITY & MANAGEMENT

a) Release of message contents


b) Traffic analysis
a) Release of Message Contents:
A telephone conversation, an electronic mail message and a transferred file may contain sensitive or
confidential information. We would like to prevent an opponent from learning the contents of these
transmissions.

b) Traffic Analysis:
Suppose that we had a way of masking the contents of messages or other information traffic so that
opponents, even if they captured the message, could not extract the information from the message. The
common technique for masking contents is encryption. If we had encryption protection in place, an
opponent might still be able to observe the pattern of these messages. The opponent could determine the
location and identity of communicating hosts and could observe the frequency and length of messages
being exchanged. This information might be useful in guessing the nature of the communication that was
taking place.
NETWORK SECURITY & MANAGEMENT

Passive attacks are very difficult to detect because they do not involve any alteration of the data. Typically,
the message traffic is sent and received in a normal fashion and neither the sender nor receiver is aware that a
third party has read the messages or observed the traffic pattern. However, it is feasible to prevent the success
of these attacks, usually using encryption. Thus, the emphasis in dealing with passive attacks is on prevention
rather than detection.

Active Attack:
Active attacks involve some modification of the data stream or the creation of a false stream and can be
subdivided into four categories:
a) Masquerade b) Replay
c) Modification of Messages d) Denial of Service
a) Masquerade:
A masquerade takes place when one entity pretends to be a different entity.

b) Replay:
Replay involves the passive capture of a data unit and its subsequent retransmission to produce an
unauthorized effect.
NETWORK SECURITY & MANAGEMENT

c) Modification of Message:
Modification of messages simply means that some portion of a legitimate message is altered or that
messages are delayed or reordered, to produce an unauthorized effect. For example, a message meaning
"Allow John Smith to read confidential file accounts" is modified to mean "Allow Fred Brown to read
confidential file accounts."

d) Denial of Service:
The denial of service prevents or inhibits the normal use or management of communications facilities.
This attack may have a specific target. For example, an entity may suppress all messages directed to a
particular destination (e.g., the security audit service). Another form of service denial is the disruption of
an entire network, either by disabling the network or by overloading it with messages to degrade
performance.

It is quite difficult to prevent active attacks because of the wide variety of potential physical, software and
network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or
delays caused by them.
NETWORK SECURITY & MANAGEMENT

Active Attack Passive Attack


In an active attack, modification in information In a passive attack, modification in the information
takes place. does not take place.
Active Attack is a danger to integrity as well
Passive Attack is a danger to confidentiality.
as availability.
In an active attack, attention is on prevention. In a passive attack, attention is on detection.
Due to active attacks, the execution system is Due to passive attack, there is no harm to the
always damaged. system.
In an active attack, the victim gets informed about In a passive attack, the victim does not get informed
the attack. about the attack.
Active attacks are tough to restrict from entering A passive attack is easy to prohibit in comparison to
systems or networks. an active attack.
The prevention possibility of active attack is high. The prevention possibility of passive attack is low.
The duration of an active attack is short. The duration of a passive attack is long.
The purpose of an active attack is to harm the The purpose of a passive attack is to learn the
system. system.

Security Services:
Various security services are explained as follows:
1) Confidentiality: It ensures the protection of data from unauthorized disclosure.
2) Authentication: It is the assurance that the communicating entity is the one that it claims to be.
3) Integrity: It is the assurance that data received are exactly as sent by an authorized entity (i.e., contain no
modification, insertion, deletion or replay).
4) Non-repudiation: It protects against denial by one of the entities involved in a communication of having
participated in all or part of the communication.
5) Access Control: The prevention of unauthorized use of a resource (i.e., this service controls who can have
access to a resource, under what conditions access can occur and what those accessing the resource are allowed
to do).
6) Availability: It states that resources/information should be available to authorized parties at all times.

Security Mechanisms:
Security Mechanisms are classified into two types:
1) Specific Security Mechanism
2) Pervasive Security Mechanism
NETWORK SECURITY & MANAGEMENT

Specific Security Mechanism


Specific Security Mechanisms may be incorporated into the appropriate protocol layer to provide some of the
OSI security services.
a) Encipherment: The use of mathematical algorithms to transform data into a form that is not readily
intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or
more encryption keys.
b) Digital Signature: A digital signature is an authentication mechanism that enables the creator of a message
to attach a code that acts as a signature.
c) Access Control: A variety of mechanisms that enforce access rights to resources.
d) Data Integrity: A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
e) Authentication Exchange: A mechanism intended to ensure the identity of an entity by means of
information exchange.
f) Traffic Padding: The insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
g) Routing Control: Enables selection of particular physically secure routes for certain data and allows
routing changes, especially when a breach of security is suspected.
h) Notarization: The use of a trusted third party to assure certain properties of a data exchange.

Pervasive Security Mechanism


Pervasive Security Mechanisms are not specific to any particular OSI security service or protocol layer.
a) Trusted Functionality: That which is perceived to be correct with respect to some criteria (e.g., as
established by a security policy).
b) Security Label: The marking bound to a resource (which may be a data unit) that names or designates the
security attributes of that resource.
c) Event Detection: Detection of security-relevant events.
d) Security Audit Trail: Data collected and potentially used to facilitate a security audit, which is an
independent review and examination of system records and activities.
e) Security Recovery: Deals with requests from mechanisms, such as event handling and management
functions, and takes recovery actions.

1.3 TYPES OF COMPUTER AND NETWORK ATTACKS


1) Eavesdropping
Eavesdropping attacks involve the bad actor intercepting traffic as it is sent through the network. In this way,
an attacker can collect usernames, passwords, and other confidential information like credit cards.
Eavesdropping can be active or passive. With active eavesdropping, the hacker inserts a piece of software
within the network traffic path to collect information that the hacker analyses for useful data. Passive
eavesdropping attacks are different in that the hacker “listens in,” or eavesdrops, on the transmissions, looking
NETWORK SECURITY & MANAGEMENT

for useful data they can steal. Both active and passive eavesdropping are types of MITM attacks. One of the
best ways of preventing them is by encrypting your data, which prevents it from being used by a hacker,
regardless of whether they use active or passive eavesdropping.
2) Distributed Denial of Service
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted
server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet
traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources
of attack traffic. Exploited machines can include computers and other networked resources such as IoT
devices. From a high level, a DDoS attack is like an unexpected traffic jam clogging up the highway,
preventing regular traffic from arriving at its destination.
DDoS attacks can be segregated by which layer of the Open Systems Interconnection (OSI) model they attack.
They are most common in the Network (layer 3), Transport (Layer 4), Presentation (Layer 6) and Application
(Layer 7) Layers.

DDoS attacks are carried out with networks of Internet-connected machines. These networks consist of
computers and other devices (such as IoT devices) that have been infected with malware, allowing them to be
controlled remotely by an attacker. These individual devices are referred to as bots (or zombies), and a group
of bots is called a botnet. Once a botnet has been established, the attacker is able to direct an attack by sending
remote instructions to each bot. When a victim’s server or network is targeted by the botnet, each bot sends
requests to the target’s IP address, potentially causing the server or network to become overwhelmed, resulting
in a denial of service to normal traffic. Because each bot is a legitimate Internet device, separating the attack
traffic from normal traffic can be difficult.
3) Malware
Malware is a general term for malicious software. Malware infects a computer and changes how it functions,
destroys data, or spies on the user or network traffic as it passes through. Malware can either spread from one
device to another or remain in place, only impacting its host device.
NETWORK SECURITY & MANAGEMENT

Several of the attack methods can involve forms of malware, including MITM attacks, Phishing, Ransomware,
SQL injection, Trojan horses, Drive-by attacks, and XSS attacks.
In a malware attack, the software has to be installed on the target device. This requires an action on the part
of the user. Therefore, in addition to using firewalls that can detect malware, users should be educated
regarding which types of software to avoid, the kinds of links they should verify before clicking, and the
emails and attachments they should not engage with.
4) Man-in-the-Middle Attack
Man-in-the-middle (MITM) type of cyber-attack refers to breaches in cybersecurity that make it possible for
an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers. It is
called a “man in the middle” attack because the attacker positions themselves in the “middle” or between the
two parties trying to communicate. In effect, the attacker is spying on the interaction between the two parties.
In an MITM attack, the two parties involved feel like they are communicating as they normally do. What they
do not know is that the person sending the message illicitly modifies or accesses the message before it reaches
its destination. Some ways to protect yourself and your organization from MITM attacks are by using strong
encryption on access points or by using a virtual private network (VPN).
For example, the attacker can re-route a data exchange. When computers are communicating at low levels of
the network layer, the computers might not be able to determine with whom they are exchanging data. If an
attacker puts himself between a client and a webpage, a Man-in-the-Middle (MITM) attack occurs. This form
of assault comes in many different ways.
For example: To intercept financial login credentials, a fraudulent banking website can be used. Between the
user and the real bank webpage, the fake site lies "in the middle."
Typically, these attacks are carried out through a two-step process known as data interception and decryption.
Data interception consists of an attacker intercepting a data transfer between a client and a server. The attacker
tricks the client and the server into believing that they are exchanging information with each other, while the
attacker intercepts the data, creates a connection to the real site, and acts as a proxy to read and insert false
information into the communication. The decryption phase is where the intercepted data is unencrypted. This
essential step enables the attacker to finally decipher and use the data to their advantage
NETWORK SECURITY & MANAGEMENT

5) Phishing
Phishing attacks are fraudulent emails, text messages, phone calls, or websites that seem to be coming from
trusted, legitimate sources in an attempt to grab sensitive information from the target. Phishing attacks are
designed to trick users into actions like the following
• Downloading malware.
• Sharing sensitive information or personal data (for example, Social Security and credit card numbers,
bank account numbers, login credentials).
• Other actions that expose themselves or their organizations to cybercrime.
Successful phishing attacks often lead to identity theft, credit card fraud, ransomware attacks, data breaches
and huge financial losses for individuals and corporations.
To execute the attack, the attacker may send a link that brings you to a website that then fools you into
downloading malware such as viruses or giving the attacker your private information. In many cases, the target
may not realize they have been compromised, which allows the attacker to go after others in the same
organization without anyone suspecting malicious activity.
You can prevent phishing attacks from achieving their objectives by thinking carefully about the kinds of
emails you open and the links you click on. Pay close attention to email headers, and do not click on anything
that looks suspicious. Check the parameters for “Reply-to” and “Return-path.” They need to connect to the
same domain presented in the email.

6) SQL Injection:
SQL injection is a technique used to extract user data by injecting web page inputs as statements through SQL
commands. Malicious users can use these instructions to manipulate the application’s web server. SQL
NETWORK SECURITY & MANAGEMENT

injection is a code injection technique that can compromise your database. SQL injection is one of the most
common web hacking techniques. SQL injection is the injection of malicious code into SQL statements via
web page input.
An SQL injection attack can be done with the following intentions:
• To dump the whole database of a system,
• To modify the content of the databases, or
• To perform different queries that are not allowed by the application.
This type of attack works when the applications don’t validate the inputs properly, before passing them to an
SQL statement. Injections are normally placed in address bars, search fields, or data fields. The easiest
way to detect if a web application is vulnerable to an SQL injection attack is to use the " ‘ " character in a
string and see if you get any error.

7) Session Hijacking
Session hijacking is one of multiple types of MITM attacks. The attacker takes over a session between a client
and the server. The computer being used in the attack substitutes its Internet Protocol (IP) address for that of
the client computer, and the server continues the session without suspecting it is communicating with the
attacker instead of the client. This kind of attack is effective because the server uses the client's IP address to
verify its identity. If the attacker's IP address is inserted partway through the session, the server may not suspect
a breach because it is already engaged in a trusted connection.
NETWORK SECURITY & MANAGEMENT

To prevent session hijacking, use a VPN to access business-critical servers. This way, all communication is
encrypted and an attacker cannot gain access to the secure tunnel created by the VPN.
8) Insider Threat
Sometimes, the most dangerous actors come from within an organization. People within a company’s doors
pose a special danger because they typically have access to a variety of systems and in some cases, admin
privileges that enable them to make critical changes to the system or its security policies.
In addition, people within the organization often have an in-depth understanding of its cybersecurity
architecture, as well as how the business reacts to threats. This knowledge can be used to gain access to
restricted areas, make changes to security settings, or deduce the best possible time to conduct an attack.
One of the best ways to prevent insider threats in organizations is to limit employees' access to sensitive
systems to only those who need them to perform their duties. Also, for the select few who need access, use
MFA, which will require them to use at least one thing they know in conjunction with a physical item they
have to gain access to a sensitive system.
9) Ransomware
With Ransomware, the victim’s system is held hostage until they agree to pay a ransom to the attacker. After
the payment has been sent, the attacker then provides instructions regarding how the target can regain control
of their computer. The name "ransomware” is appropriate because the malware demands a ransom from the
victim.
In a ransomware attack, the target downloads ransomware, either from a website or from within an email
attachment. The malware is written to exploit vulnerabilities that have not been addressed by either the
system’s manufacturer or the IT team. The ransomware then encrypts the target's workstation. At times,
ransomware can be used to attack multiple parties by denying access to either several computers or a central
server essential to business operations.
NETWORK SECURITY & MANAGEMENT

Affecting multiple computers is often accomplished by not initiating systems captivation until days or even
weeks after the malware's initial penetration. The malware can send AUTORUN files that go from one system
to another via the internal network or Universal Serial Bus (USB) drives that connect to multiple computers.
Then, when the attacker initiates the encryption, it works on all the infected systems simultaneously.
10) DNS Spoofing
DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website disguised to
look like a real one, to divert traffic or steal the credentials of the users. Spoofing attacks can go on for a long
period without being detected and can cause serious security issues.
In a DNS spoofing attack, the attacker takes advantage of the fact that the user thinks the site they are visiting
is legitimate. This gives the attacker the ability to commit crimes in the name of an innocent company, at least
from the perspective of the visitor.
Domain Name Server (DNS) resolves the alphabetical domain names like www.example.com into respective
IP addresses that are used for locating and communicating between nodes on the Internet. DNS spoofing is
done by replacing the IP addresses stored in the DNS server with the ones under the control of the attacker.
Once it is done, whenever users try to go to a particular website, they get directed to the false websites placed
by the attacker in the spoofed DNS server.
To prevent DNS spoofing, make sure your DNS servers are kept up-to-date. Attackers aim to exploit
vulnerabilities in DNS servers, and the most recent software versions often contain fixes that close known
vulnerabilities.
NETWORK SECURITY & MANAGEMENT

1.4 TYPES OF CRYPTOGRAPHY


1.4.1 Introduction to Cryptography
Cryptography is a technique of securing information and communications through the use of codes so that
only those people for whom the information is intended can understand and process it. Thus, preventing
unauthorized access to information. The prefix “crypt” means “hidden” and the suffix “graphy” means
“writing”. In Cryptography, the techniques that are used to protect information are obtained from mathematical
concepts and a set of rule-based calculations known as algorithms to convert messages in ways that make it
hard to decode them. These algorithms are used for cryptographic key generation, digital signing and
verification to protect data privacy, web browsing on the internet and to protect confidential transactions such
as credit card and debit card transactions.
Cryptographic systems are characterized along three independent dimensions:
1) The type of operations used for transforming plaintext to ciphertext (Substitution and Transposition).
2) The number of keys used (Symmetric Key and Asymmetric Key).
3) The way in which the plaintext is processed (Block Cipher and Stream Cipher).

Features of Cryptography:
1) Confidentiality
2) Integrity
3) Non-repudiation
4) Authentication

1.4.2 Symmetric Cipher Model


NETWORK SECURITY & MANAGEMENT

A symmetric cipher scheme consists of 5 main components:


1) Plain Text: The original message, before being transformed, is called plaintext.
2) Encryption Algorithm: The process of transforming the plaintext into ciphertext is known as
enciphering or encryption. It takes plain text and key value as input to produce cipher text. The
encryption algorithm performs various substitutions and transformations on the plaintext.
3) Secret Key: The secret key is also input to the encryption algorithm. The key is a value independent
of the plaintext and the algorithm. The algorithm will produce a different output depending on the
specific key being used at the time. The exact substitutions and transformations performed by the
algorithm depend on the key.
4) Cipher Text: The original message after being transformed into a non-readable message is called
ciphertext. This is the scrambled message produced as output. It depends on the plaintext and the secret
key. For a given message, two different keys will produce two different ciphertexts.
5) Decryption Algorithm: The process of transforming the cipher text back into plain text is known as
deciphering or decryption. It takes cipher text and key value as input to produce plain text back.

1.4.3 Cryptanalysis
Typically, the objective of attacking an encryption system is to recover the key in use rather than simply
to recover the plaintext of a single ciphertext. There are two general approaches to attacking a conventional
encryption scheme:
1) Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge
of the general characteristics of the plaintext or even some sample plaintext ciphertext pairs. This type
of attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to
deduce the key being used.
2) Brute-force attack: The attacker tries every possible key on a piece of ciphertext until an intelligible
translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve
success.

1.4.4 Types of Cryptography


There are three types of Cryptography:
1) Symmetric Key Cryptography
2) Asymmetric Key Cryptography
3) Hash Function
Symmetric Key Cryptography:
Symmetric key cryptography is also known as secret-key cryptography, and in this type of cryptography, you
can use only a single key. The sender and the receiver can use that single key to encrypt and decrypt a message.
Because there is only one key for encryption and decryption, the symmetric key system has one major
NETWORK SECURITY & MANAGEMENT

disadvantage: the two parties must exchange the key securely. The most popular symmetric key cryptography
systems are Data Encryption System (DES), Advanced Encryption System (AES), Blowfish.

Asymmetric Key Cryptography:


Asymmetric key cryptography is also known as public key cryptography and it employs the use of two keys.
This cryptography differs from and is more secure than symmetric key cryptography. In this system, each user
encrypts and decrypts using two keys or a pair of keys (private key and public key). Each user keeps the
private key secret and the public key is distributed across the network so that anyone can use those public keys
to send a message to any other user. You can use any of those keys to encrypt the message and can use the
remaining key for decryption. The most popular symmetric key cryptography system is DSA and RSA.

Hash Function:
It is a type of cryptography in which an algorithm followed by a hash function takes an arbitrary length of the
message as input and returns a fixed length of the output. It is also referred to as a mathematical equation
because it uses numerical values as input to generate the hash message. This method does not require a key
because it operates in a one-way scenario. Each round of hashing operations considers input as an array of the
most recent block and generates the last round of activity as output. Commonly used hash algorithms include:
Message Digest 5 (MD5), SHA (Secure Hash Algorithm)
NETWORK SECURITY & MANAGEMENT

You might also like