Informationsecurity Cryptography
Informationsecurity Cryptography
Business survival depends on information security. - Threat: Something that can potentially cause damage to the organisation, IT Systems or
network.
ISO 27002:2005 defines Information Security as the preservation of:
- Vulnerability: A weakness in the organization, IT Systems, or network that can be
-Confidentiality: Ensuring that information is accessible only to those authorized to have exploited by a threat.
access
Relationship between Risk, Threats, and Vulnerabilities: Threats
• Employees
• External Parties
• Low awareness of security issues
• Growth in networking and distributed computing
• Growth in complexity and effectiveness of hacking tools and viruses
• Natural Disasters eg. fire, flood, earthquake
Threat Identification
❖ Elements of threats
❖ Agent: The catalyst that performs the threat.
Human
Machine
Nature
❖ Motive : Something that causes the agent to act.
Accidental Intentional
Only motivating factor that can be both accidental and intentional is
human
❖ Results : The outcome of the applied threat. The results normally lead to the
loss of CIA
Confidentiality
Integrity
Availability
❖ Confidentiality
o protect the data that has been transmitted
o Ensuring only those who ought to have access can do so.
INFORMATION/NETWORK SECURITY
• Network security is a broad term that covers a multitude of technologies, ❖ Integrity
devices and processes. In its simplest term, it is a set of rules and configurations o Ensuring that information cannot be modified without detection
designed to protect the integrity, confidentiality and accessibility of computer
networks and data using both software and hardware technologies. Every
organization, regardless of size, industry or infrastructure, requires a degree of
network security solutions in place to protect it from the ever-growing landscape
of cyber threats in the wild today.
• The protection afforded to an automated information system in order to attain
the applicable objectives of preserving the integrity, availability and
confidentiality of information system resources (includes hardware, software,
firmware, information/data, and telecommunications) -NIST
CIA TRIAD
❖ Availability of a method or technique) to evade security services and violate the security
o Ensuring information can be accessed when needed. policy of a system.
➢ SECURITY ATTACK
➢ SECURITY SERVICE
➢ SECURITY MECHANISM
❖ SECURITY ATTACK:
- Action that compromises the security of an individual/
Organization and if the attack is succesfuly launched then the effects of
the attacks would be loss of data or corruption of data or ransomware
attacks or injections of viruses warms or malicious software into the
network or defacing the servers and many effects are possible. The
❖ Additional
attackers only knows for what he has launched the attack is basically of
o Authenticity
o Accountability two types:
o Confidentiality (example: account information) 1. PASSIVE
o Integrity ( example: patients information) 2. ACTIVE
o Availability (example : authentication service)
1. PASSIVE ATTACK
- Attempts to learn or make use of information from the system
Levels of impact of security breach
- Does not affect the system resources
o Low effect of the attacked is negligible
- Eavesdropping or monitoring of transmission
o Medium significant loss or damage to the organization or individual - Goal: obtain information that is being transmitted
o High org severe effect, complete disaster Types
• Release of message contents
Threats and Attacks (RFC 2828) • Traffic analysis
Note in passive attacks it is just unauthorized reading or monitoring the
o Threat. A potential for violation of security, which exists when there is a
messages, for example is a confidential telephony conversation or a
circumstance, capability, action or event that could breach security and
cause harm. That is, a threat is apossible danger that might exploit a confidential email is being transmitted this attacker’s intention is just to
vulnerability. know what is being transmitted.
o Attack. An assault on system security that derives from an intelligent threat;
that is, an intelligent act that is a deliberate attempt (especially in the sense
EXAMPLE: Release of Message Contents (Reads contents of message nature of the communication that is taking place between Bob and Alice
form Bob to Alice) so that will come to know about some information or darth can guess
Alice and Bob are the legitimate guys in this example we what is the data being transmitted or what kind of data that has being
consider Darth to be an attacker transmitted base on the traffic
Bob is sending some messages to Alice somehow Bob and Alice are
connected to each other it may be through the internet or any other 2. ACTIVE ATTACK
communication facility. Whatever Bob is sending to Alice, Darth is getting - Active attacks involve some modification of the data stream or
a copy of the message he is reading the contents of the message which is the creation of a false stream.
sent from Bob to Alice so what Darth is going to do is Darth is going to
understand or know what is the data that is being transmitted between Subdivided into four categories ;
the sender and the receiver. 1. Masquerade
2. Replay
How to prevent this? 3. Modification of messages
If bob is encrypting the data before sending the data as such and Alice alone 4. Denial of Service
can decrypt then Darth will have no way to see what message is being
transmitted, but if the messages are not encrypted obviously Darth will be able
to know the data that has been communicated between the sender and the Masquerade (Message from Darth appears to be from Bob)
receiver. A masquerade attack is an attack that uses a fake identity, such as a
network identity, to gain unauthorized access to personal computer information
through legitimate access identification. If an authorization process is not fully
EXAMPLE: Traffic Analysis (Observe pattern of messages from Bob protected, it can become extremely vulnerable to a masquerade attack.
to Alice)
Bob realized that somebody may sniff the conversation or somebody ,ay EXAMPLE: What is the attack here then?
eavesdrop the conversation . Darth pretends to be Bob so the message what Darth is sending appears
What Bob and Alice have decided ? They have decided to do encryption to be from Bob. When Alice receives the message Alice thinks that the message is
before transmitting the data. Let’s assume in this example that Bob is from Bob but actually it is from the Darth.
sending some encrypted data to alice only Bob and Alice can understand
what data being transmitted because now the data is being encrypted. Replay (Capture message from Bob to Alice; later replay message to
The message is now encrypted if darth receives this encrypted message he
Alice)
will be definitely not be able to understand what is the data but still few
It is a category of network attack in which an attacker detects a data
information can be extracted like the location or the identity of the
transmission and fraudulently has it delayed or repeated. The delay or repeat of
communicating host or the length of the message that has been
the data transmission is carried out by the sender or by the malicious entity, who
transmitted between Bob and Alice. The frequency of message trasnfers
intercepts the data and retransmits it.
between Bob and Alice. This information will be useful in guessing the
❖ SECURITY SERVICE
Modification of Message (Darth modifies massage from Bob to - The processing or communication service that is provided by a
Alice) system to give a specific kind of protection to system resources; security
It is an attack on the integrity of the original data. It basically means that services implement security policies and are implemented by security
unauthorized parties not only gain access to data but also spoof the data by mechanisms.
1. AUTHENTICATION
triggering denial-of-service attacks, such as altering transmitted data packets or
2. ACCESS CONTROL
flooding the network with fake data.
3. DATA CONFIDENTIALITY
4. DATA INTEGRITY
Denial of Service (Darth disrupts service provided by the server) 5. NON- REPUDIATION
It is an attack meant to shut down a machine or network, making it
inaccessible to its intended users. DoS attacks accomplish this by flooding the 1. AUTHENTICATION
target with traffic, or sending it information that triggers a crash. - assurance that the communicating entity is the one that it claims
to be.
For example; If the entity is claiming that he/she is Alice a system could
Passive attack VS Active Attack have a authentication service proving that she is Alice.
➢ Peer entity Authentication
PASSIVE ATTACK ACTIVE ATTACK It is provided for use at the establishment of, or at times during the
• Hard to detect • Hard to prevent data transfer phase of, a connection. It attempts to provide confidence
• Neither sender nor receiver is • Difficult to prevent- that an entity is not performing either a masquerade or an unauthorized
aware of the attack physical,software and
• Encryption prevents the success network vulnerabilities replay of a previous connection.
of the passive attacks. • Detect and recover from any ➢ Data Origin Authentication
• More emphasis is on prevention disruption or delays In information security, message authentication or data origin
than detection • If the detection has a authentication is a property that a message has not been modified while
deterrent effect, it may also
contribute to prevention.
in transit (data integrity) and that the receiving party can verify the source
of the message.
2. ACCESS CONTROL
- Access control is a fundamental component of data security that
dictates who's allowed to access and use company information and
resources. Through authentication and authorization, access control
policies make sure users are who they say they are and that they have
appropriate access to company data.
- Access control is a security measure which is put in place to 5. NON REPUDIATION
regulate the individuals that can view, use, or have access to a restricted - Non-Repudiation is a term that connects a person to a fact so
environment. Various access control examples can be found in the that they cannot deny that an action was taken.
security systems in our doors, key locks, fences, biometric systems, - A service that may be afforded by the appropriate application of
motion detectors, badge system, and so forth. a digital signature. Non-repudiation refers to the assurance that the
owner of a signature key pair that was capable of generating an existing
3. DATA CONFIDENTIALITY signature corresponding to certain data cannot convincingly deny having
- Data Confidentiality deals with protecting against the disclosure signed the data.
of information by ensuring that the data is limited to those authorized or - For example Alice and Bob,
by representing the data in such a way that its semantics remain Bob transmitted data or information to Alice but in the end of this
accessible only to those who possess some critical information (e.g., a key Bob claims that he didn’t send any documents/information on the other
for decrypting the enciphered data). hand Alice claims also that she didn’t receive any documents or data.
- Confidential data is defined as any information that is not That’s were Non repudiation security services occur.
intended for public dissemination
- Confidentiality refers to all forms of information including
personal information about people using services or employees or ❖ SECURITY MECHANISM
volunteers, information about the organisation, for example, its plans or ➢ SPECIFIC SECURITY MECHANISM
finances and information about other organisations, whether the
➢ PERVASIVE SECURITY MECHANISM
information is recorded or not.
Ex:
2. Transposition Cipher
- In the transposition technique, the positions of
letters/numbers/symbols/ in plaintext is changed with one
another.
CATEGORIES OF CRYPTOGRAPHY Ex:
A. SYMMETRIC KEY CRYPTOGRAPHY
B. ASYMMETRIC KEY CRYPTOGRAPHY
APPLICATIONS
- Defense services
- Secure data manipulation
- E-commerce
- Business transactions
- Internet payment systems
- User identification systems
- Access control
- Data security
CONCLUSION: