CRYPTOGRAPHY
AND
NETWORK SECURITY
1
Network Security
• This is the age of universal electronic connectivity, where
activities like hacking, viruses, electronic fraud are very
common.
• Unless security measures are taken, a network conversation or a
distributed application can be compromised easily.
• Some simple examples are:
– Online purchases using a credit/debit card.
– A customer unknowingly being directed to a false website.
– A hacker sending a message to a person pretending to be
someone else
2
Definitions
• Computer Security - generic name for the collection of
tools designed to protect data over a device and to thwart
(prevent) hackers.
• Network Security - measures to protect data during
their transmission.
• Internet Security - measures to protect data during their
transmission over a collection of interconnected
networks.
3
4
Confidentiality
Confidentiality is probably the most common aspect of
information security. We need to protect our confidential
information. An organization needs to guard against those
malicious actions that endanger the confidentiality of its
information.
5
Integrity
Information needs to be changed constantly. Integrity means
that changes need to be done only by authorized entities and
through authorized mechanisms.
6
Availability
The information created and stored by an organization
needs to be available to authorized entities. Information
needs to be constantly changed, which means it must be
accessible to authorized entities.
7
The OSI Security Architecture
• ITU-T (The International Telecommunication Union (ITU)
Telecommunication) Recommended X.800, Security
Architecture for OSI, defines a systematic approach for
defining the requirements for security and characterizing the
approaches to satisfy those requirements.
• The OSI security architecture focuses on
1. Security Attacks
2. Security Mechanisms
3. Security Services 8
Security Attacks
• Security Attack: Any action that compromises the
security of information.
• A useful means of classifying security attacks, used
both in X.800 and RFC 2828, is in terms of passive
attacks and active attacks
➢ A passive attack attempts to learn or make use
of information from the system but does not
affect system resources.
➢ An active attack attempts to alter system
resources or affect their operation.
9
Passive Attacks
Passive attacks are in the nature of eavesdropping on, or monitoring of,
transmissions.
• Passive attacks are very difficult to detect because they do not
involve any alteration of the data.
• Typically, the message traffic is sent and received in an
apparently(seeming) normal fashion and neither the sender nor
receiver is aware that a third party has read the messages or observed
the traffic pattern
• Two types of passive attacks are
1. Release of message contents
2. Traffic analysis
10
Passive Attacks
• The release of message contents is easily understood
– A telephone conversation, an electronic mail
message, and a transferred file may contain
sensitive or confidential information, which may be
known to a third party.
• We would like to prevent an opponent from learning
the contents of these transmissions.
11
Passive Attacks
• Traffic analysis: Masking the contents of messages or other information
traffic so that opponents, even if they captured the message, could not extract the
information from the message. The common technique for masking contents is
encryption.
• If we had encryption protection in place, an opponent might still be
able to observe the pattern of these messages. The opponent
could determine the location and identity of communicating
hosts and could observe the frequency and length of messages
being exchanged.
• This information might be useful in guessing the nature of the
communication that was taking place. 12
Active attacks
• Active attacks involve some modification of the data
stream or the creation of a false stream and can be
subdivided into four categories:
1. Masquerade
2. Replay
3. Modification of messages
4. Denial of service.
13
Active attacks
Masquerade:
• A masquerade takes place when one entity pretends to
be a different entity.
• For example, authentication sequences can be captured
and replayed after a valid authentication sequence has
taken place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an
entity that has those privileges.
14
Active attacks
15
Active attacks
Replay involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized
effect.
16
Active attacks
Modification of messages simply means that
some portion of a legitimate message is altered,
or that messages are delayed or reordered, to
produce an unauthorized effect.
17
Active attacks
18
Active attacks
• The denial of service prevents or inhibits (slows down) the
normal use or management of communications facilities.
• This attack may have a specific target; for example, an entity
may suppress all messages directed to a particular destination
(e.g., the security audit service).
• Another form of service denial is the disruption of an entire
network, either by disabling the network or by overloading
it with messages so as to degrade performance.
19
Active attacks
20
Security Mechanisms
A mechanism is a method that is designed to detect, prevent, or
recover from a security attack.
21
Security Mechanisms
◼ Encipherment: It refers to the process of applying
mathematical algorithms for converting data into a
form that is not intelligible. This depends on algorithm
used and encryption keys.
◼ Data Integrity: A variety of mechanisms used to
assure the integrity of a data unit or stream of data
units.
22
Security Mechanisms
◼ Digital Signature: The appended data or a
cryptographic transformation applied to any data unit
allowing to prove the source and integrity of the data
unit and protect against forgery.
◼ Authentication Exchange: A mechanism intended to
ensure the identity of an entity by means of information
exchange.
◼ Traffic Padding: The insertion of bits into gaps in a
data stream to frustrate traffic analysis attempts. 23
Security Mechanisms
◼ Routing Control: Enables selection of particular
physically secure routes for certain data and allows
routing changes once a breach of security is suspected.
◼ Notarization: The use of a trusted third party to assure
certain properties of a data exchange
◼ Access Control: A variety of techniques used for
enforcing access permissions to the system resources.
24
Security Services
• A service is one that enhances the security of data processing
systems and information transfers of an organization.
• The services are intended to counter security attacks, and they
make use of one or more security mechanisms.
• X.800 divides these services into five categories
1. Authentication (who has created or has sent the data)
2. Access control (prevent misuse of resources)
3. Data Confidentiality (privacy)
4. Data Integrity (has not been altered)
5. Non-repudiation (the order is final) 25
Security Services
• Authentication: Assurance that the communicating
entity is the one claimed
• Access Control: Prevention of the unauthorized use of a
resource
• Data Confidentiality: Protection of data from
unauthorized disclosure
• Data Integrity: Assurance that data received is as sent
by an authorized entity
• Non-Repudiation: Protection against denial by one of
the parties in a communication
26
Relation between Services and Mechanisms
27
Model for Network Security
• Data is transmitted over network between two
communicating parties, who must cooperate for the
exchange to take place.
• A logical information channel is established by
defining a route through the internet from source to
destination by use of communication protocols by the
two parties.
• Whenever an opponent presents a threat to
confidentiality, authenticity of information, security
aspects come into play.
28
Model for Network Security
29
Model for Network Security
• Two components are present in almost all the security
providing techniques.
1. A security-related transformation on the information to
be sent making it unreadable by the opponent, and the
addition of a code based on the contents of the message,
used to verify the identity of sender.
2. Some secret information shared by the two principals
and, it is hoped, unknown to the opponent. An example is an
encryption key used in conjunction with the transformation
to scramble the message before transmission and
unscramble it on reception. 30
Model for Network Security
• A trusted third party may be needed to achieve secure
transmission.
• It is responsible for distributing the secret information
to the two parties, while keeping it away from any
opponent.
• It also may be needed to settle disputes (difference of
opinions) between the two parties regarding
authenticity of a message transmission.
31
Model for Network Security
• The general model shows that there are four basic tasks
in designing a particular security service:
1. Design an algorithm for performing the security-related
transformation. The algorithm should be such that an
opponent cannot defeat its purpose
2. Generate the secret information to be used with the
algorithm (The Key)
3. Develop methods for the distribution and sharing of the
secret information
4. Specify a protocol to be used by the two principals that
makes use of the security algorithm and the secret
information to achieve a particular security service 32
Model for Network Security
• Various other threats to information system like
unwanted access still exist. The existence of hackers
attempting to penetrate systems accessible over a network
remains a concern.
• Another threat is placement of some logic in computer
system affecting various applications and utility programs.
This inserted code presents two kinds of threats.
– Information access threats that intercept or modify data
on behalf of users who should not have access to that
data
– Service threats exploit service flaws in computers to
inhibit use by legitimate users
33
Model for Network Security
• Viruses and worms are two examples of software attacks
inserted into the system by means of a disk or also across the
network.
• The security mechanisms needed to cope with unwanted
access fall into two broad categories:
– Placing a gatekeeper function, which includes a password-based
login methods that provide access to only authorized users and
screening logic to detect and reject worms, viruses etc
– An internal control, monitoring the internal system activities,
analyzes the stored information and detects the presence of
unauthorized users or intruders. 34
Model for Network Security
35
Methods of Defense
• Encryption
• Software Controls (access limitations in a data base.
In operating systems, protect each user from other
users)
• Hardware Controls (smartcard)
• Policies (frequent changes of passwords)
• Physical Controls
36
Internet standards and RFCs
(Request For Comments)
• The Internet society
– Internet Architecture Board (IAB)
– Internet Engineering Task Force (IETF)
– Internet Engineering Steering Group (IESG)
37
Internet RFC Publication Process
38
SECURITY GOALS - Recall
• There are three security goals in internet security
environment.
1. Confidentiality
2. Integrity
3. Availability
Taxonomy of Attacks in relation with
Security Goals
1.40