Cyber Security: (Prof. Ashok K. Bhateja, IIT Delhi)
Cyber Security: (Prof. Ashok K. Bhateja, IIT Delhi)
1. Introduction
With the advancement of digital technology new technologies like cyber physical systems
and Internet of Things (IoT) have emerged. These models are based on system and devices
which connect the physical and digital worlds and provide opportunities to enhance
productivity and improved decision-making capabilities. Generally, software in these systems
are not designed with adequate amount of security and therefore, the hackers succeed in
stealing the important and valuable information/data of the organization. These weaknesses in
the system which can be exploited are called cyber vulnerabilities. Cyber security deals with
the principles and practices to protect computer systems, networks, software, electronic devices
and data from unauthorized users. Cyber security helps to protect the data from the attackers
by ensuring confidentiality, integrity, and availability of the data.
Modern industries and research organizations are heavily dependent on the computers that
store and transmit sensitive information like intellectual property, financial data, personal
information, etc. whose exposure may have negative consequences. Attackers attempt to access
these sensitive informations with the aim to disable, disrupt, destroy or steal the data. Cyber
security is a necessity to govern the conduct and manners of interacting with any of the
computer system having suspicious behavior.
Security in IoT means securing devices and the networks to which the devices are
connected. The rapidly growing dependence on IoT applications and the number of devices
that are connected through internet are only growing without keeping their security in mind.
Connected devices boost the performance of an organization, but anything connected online
may be vulnerable to cyberattacks.
Encryption Decryption
Key ek Key dk
Cryptogram (c)
Message Enciphering Deciphering Message
(m) Algorithm Algorithm (m)
Interceptor
Cryptosystems is mainly divided into three categories, namely, symmetric key cryptosystems,
asymmetric key cryptosystems and hash functions.
Public key cryptosystems such as RSA, Diffie Hellman have been used as security solutions
on the Internet, but they are not practical to implement for IoT devices due to their overheads
in computations, storage and communications of security parameters such as keys. Therefore,
there is a need of an efficient public key cryptosystems specially for IoT security. Elliptic
curve-based cryptosystems can provide same amount of security (or better) with less
computing power. 160-bit ECC key provides the same amount of security as of 1024-bit RSA.
The keys required in Elliptic curve cryptography (ECC) are smaller in size and can be generated
more efficiently.
Elliptic curve is a set of points satisfying the plane curve y 2 = f (x), with f (x) a cubic
polynomial having non repeated roots. Security of ECC lies on the fact that multiplying a
point on the curve by a number produces another point on the curve, but knowing both the original
point and the result, it is computationally hard to find the number which was used.
Signer’s Hash
message
private key Function
message Equal ?
Hash
Signing
Function signature
algorithm Verification Hash
algorithm
Hash
Signer’s
Signer public key Verifier
For signing hash function with private key of an asymmetric key cryptosystem is used
and for verifying hash value with public key of the asymmetric key cryptosystem is used.
Conclusion
In today’s high technology environment, organizations are becoming more and more
dependence online technology. The threats from hackers are increasing, it is necessary to make
information secure as the assets to the organization. This needs for an organization to keep their
employees educated with the latest cyber security technologies. The exclusive use of digital
technology to store and send sensitive information raised the requirement, of cyber security, a
lot for an organization.